From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-11.8 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI, MENTIONS_GIT_HOSTING,SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5C8F3C31E49 for ; Wed, 19 Jun 2019 14:55:17 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 33C8B2183F for ; Wed, 19 Jun 2019 14:55:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1560956117; bh=9Eub5dhLPI+uZFoHz42Gdh0VfDdk1Ojm2A5neUnwEM4=; h=Subject:To:From:Date:List-ID:From; b=dbQ8r6x+k+7f9w6DL0dxBQDNsizz/JTiIpRtSMrCPzStR8Dd/JpInDXe2VU543fMx gw5aH5wApVVPiaVUV7zEX7qNZ28lL6/T0TqJF8VAvsCThxlHSplgfNjrZnTpP15F0H dMoMeez8bUTC7ihWRd/mtAUO+wFJplVW08gLDI2o= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726238AbfFSOzQ (ORCPT ); Wed, 19 Jun 2019 10:55:16 -0400 Received: from mail.kernel.org ([198.145.29.99]:51296 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726009AbfFSOzQ (ORCPT ); Wed, 19 Jun 2019 10:55:16 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C46322147A; Wed, 19 Jun 2019 14:55:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1560956116; bh=9Eub5dhLPI+uZFoHz42Gdh0VfDdk1Ojm2A5neUnwEM4=; h=Subject:To:From:Date:From; b=TLRGsmAn+g+m46J6bSpEgY88+gz6M+l15TRUUzqr0+G6Wocq9IFBDz+aP+Myv57Em YfjlyU5nMRU86UrreAszm2IcJifKGmETKVfvpyFZ+lIpsuqbhPOvTA+vc8u+xifWE1 /F9Sd9SgW3uiVnqHibtavZNAYTHqPBnNLoytI70M= Subject: patch "firmware: improve LSM/IMA security behaviour" added to driver-core-next To: thesven73@gmail.com, TheSven73@gmail.com, gregkh@linuxfoundation.org, keescook@chromium.org, mcgrof@kernel.org, rafael@kernel.org, stable@vger.kernel.org, zohar@linux.ibm.com, zohar@linux.vnet.ibm.com From: Date: Wed, 19 Jun 2019 16:55:13 +0200 Message-ID: <1560956113230148@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=ANSI_X3.4-1968 Content-Transfer-Encoding: 8bit Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org This is a note to let you know that I've just added the patch titled firmware: improve LSM/IMA security behaviour to my driver-core git tree which can be found at git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/driver-core.git in the driver-core-next branch. The patch will show up in the next release of the linux-next tree (usually sometime within the next 24 hours during the week.) The patch will also be merged in the next major kernel release during the merge window. If you have any questions about this process, please let me know. >From 2472d64af2d3561954e2f05365a67692bb852f2a Mon Sep 17 00:00:00 2001 From: Sven Van Asbroeck Date: Mon, 17 Jun 2019 14:23:54 -0400 Subject: firmware: improve LSM/IMA security behaviour The firmware loader queries if LSM/IMA permits it to load firmware via the sysfs fallback. Unfortunately, the code does the opposite: it expressly permits sysfs fw loading if security_kernel_load_data( LOADING_FIRMWARE) returns -EACCES. This happens because a zero-on-success return value is cast to a bool that's true on success. Fix the return value handling so we get the correct behaviour. Fixes: 6e852651f28e ("firmware: add call to LSM hook before firmware sysfs fallback") Cc: Stable Cc: Mimi Zohar Cc: Kees Cook To: Luis Chamberlain Cc: Greg Kroah-Hartman Cc: "Rafael J. Wysocki" Cc: linux-kernel@vger.kernel.org Signed-off-by: Sven Van Asbroeck Reviewed-by: Mimi Zohar Signed-off-by: Greg Kroah-Hartman --- drivers/base/firmware_loader/fallback.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/base/firmware_loader/fallback.c b/drivers/base/firmware_loader/fallback.c index b5cd96fd0e77..29becea1910d 100644 --- a/drivers/base/firmware_loader/fallback.c +++ b/drivers/base/firmware_loader/fallback.c @@ -659,7 +659,7 @@ static bool fw_run_sysfs_fallback(enum fw_opt opt_flags) /* Also permit LSMs and IMA to fail firmware sysfs fallback */ ret = security_kernel_load_data(LOADING_FIRMWARE); if (ret < 0) - return ret; + return false; return fw_force_sysfs_fallback(opt_flags); } -- 2.22.0