ACK: [PATCH 3/4 v2] efi_runtime: Do not pass user addresses to firmware
IvanHu
ivan.hu at canonical.com
Fri Apr 18 07:50:12 UTC 2014
On 04/04/2014 11:26 PM, Matt Fleming wrote:
> From: Matt Fleming <matt.fleming at intel.com>
>
> Currently there's some inconsistency with how arguments are passed to
> the firmware from the efi_runtime driver. Some values have the standard
> get_user()/put_user() calls, others do not.
>
> Passing userspace pointers directly to the firmware is a bug because
> those addresses may fault. And if they are going to fault we'd like to
> know about it in the kernel rather than at some later time when
> executing in firmware context.
>
> Furthermore, beginning with v3.14 of the kernel the current tests
> actually cause the kernel to crash because firmware calls are now done
> with their own, entirely separate, page tables - no user addresses are
> mapped during execution of runtime services.
>
> This change doesn't require predication on a particular kernel version
> because the efi_runtime should really have always done this copying
> to/from userspace for every argument of the runtime services.
>
> This patch is heavily based on one from Borislav.
>
> Cc: Borislav Petkov <bp at alien8.de>
> Signed-off-by: Matt Fleming <matt.fleming at intel.com>
> ---
>
> Changes in v2:
>
> - Delete the unused put_ucs2() function
> - Rename get_ucs"* to copy_ucs2_* to dodge the reference counting
> implications of the names
> - Change function arguments to copy_ucs2_from_user_len() to mirror
> copy_from_user() instead of put_user() to avoid confusion
> - Expand comments for new helper functions
>
> efi_runtime/efi_runtime.c | 238 +++++++++++++++++++++++++++++++++++++++++-----
> 1 file changed, 214 insertions(+), 24 deletions(-)
>
> diff --git a/efi_runtime/efi_runtime.c b/efi_runtime/efi_runtime.c
> index ffe1073..4f9d554 100644
> --- a/efi_runtime/efi_runtime.c
> +++ b/efi_runtime/efi_runtime.c
> @@ -24,7 +24,7 @@
> #include <linux/init.h>
> #include <linux/proc_fs.h>
> #include <linux/efi.h>
> -
> +#include <linux/slab.h>
> #include <linux/uaccess.h>
>
> #include "efi_runtime.h"
> @@ -100,6 +100,107 @@ static void convert_to_guid(efi_guid_t *vendor, EFI_GUID *vendor_guid)
> vendor_guid->Data4[i] = vendor->b[i+8];
> }
>
> +/*
> + * Count the bytes in 'str', including the terminating NULL.
> + *
> + * Note this function returns the number of *bytes*, not the number of
> + * ucs2 characters.
> + */
> +static inline size_t __ucs2_strsize(uint16_t *str)
> +{
> + uint16_t *s = str;
> + size_t len;
> +
> + if (!str)
> + return 0;
> +
> + /* Include terminating NULL */
> + len = sizeof(uint16_t);
> +
> + while (*s++ != 0)
> + len += sizeof(uint16_t);
> +
> + return len;
> +}
> +
> +/*
> + * Allocate a buffer and copy a ucs2 string from user space into it.
> + *
> + * We take an explicit number of bytes to use for the allocation and
> + * copy, and therefore do not make any assumptions about 'src' (such as
> + * it pointing to a valid string).
> + *
> + * If a non-zero value is returned, the caller MUST NOT access 'dst'.
> + *
> + * It is the caller's responsibility to free 'dst'.
> + */
> +static inline int
> +copy_ucs2_from_user_len(uint16_t **dst, uint16_t __user *src, size_t len)
> +{
> + if (!src) {
> + *dst = NULL;
> + return 0;
> + }
> +
> + if (!access_ok(VERIFY_READ, src, 1))
> + return -EFAULT;
> +
> + *dst = kmalloc(len, GFP_KERNEL);
> + if (!*dst)
> + return -ENOMEM;
> +
> + if (copy_from_user(*dst, src, len)) {
> + kfree(*dst);
> + return -EFAULT;
> + }
> +
> + return 0;
> +}
> +
> +/*
> + * Calculate the required buffer allocation size and copy a ucs2 string
> + * from user space into it.
> + *
> + * This function differs from copy_ucs2_from_user_len() because it
> + * calculates the size of the buffer to allocate by taking the length of
> + * the string 'src'.
> + *
> + * If a non-zero value is returned, the caller MUST NOT access 'dst'.
> + *
> + * It is the caller's responsibility to free 'dst'.
> + */
> +static inline int copy_ucs2_from_user(uint16_t **dst, uint16_t __user *src)
> +{
> + size_t len;
> +
> + if (!access_ok(VERIFY_READ, src, 1))
> + return -EFAULT;
> +
> + len = __ucs2_strsize(src);
> + return copy_ucs2_from_user_len(dst, src, len);
> +}
> +
> +/*
> + * Copy a ucs2 string to a user buffer.
> + *
> + * This function is a simple wrapper around copy_to_user() that does
> + * nothing if 'src' is NULL, which is useful for reducing the amount of
> + * NULL checking the caller has to do.
> + *
> + * 'len' specifies the number of bytes to copy.
> + */
> +static inline int
> +copy_ucs2_to_user_len(uint16_t __user *dst, uint16_t *src, size_t len)
> +{
> + if (!src)
> + return 0;
> +
> + if (!access_ok(VERIFY_WRITE, dst, 1))
> + return -EFAULT;
> +
> + return copy_to_user(dst, src, len);
> +}
> +
> static long efi_runtime_get_variable(unsigned long arg)
> {
> struct efi_getvariable __user *pgetvariable;
> @@ -107,7 +208,10 @@ static long efi_runtime_get_variable(unsigned long arg)
> EFI_GUID vendor_guid;
> efi_guid_t vendor;
> efi_status_t status;
> + uint16_t *name;
> uint32_t attr;
> + void *data;
> + int rv = 0;
>
> pgetvariable = (struct efi_getvariable __user *)arg;
>
> @@ -117,8 +221,27 @@ static long efi_runtime_get_variable(unsigned long arg)
> return -EFAULT;
>
> convert_from_guid(&vendor, &vendor_guid);
> - status = efi.get_variable(pgetvariable->VariableName, &vendor,
> - &attr, &datasize, pgetvariable->Data);
> +
> + rv = copy_ucs2_from_user(&name, pgetvariable->VariableName);
> + if (rv)
> + return rv;
> +
> + data = kmalloc(datasize, GFP_KERNEL);
> + if (!data) {
> + kfree(name);
> + return -ENOMEM;
> + }
> +
> + status = efi.get_variable(name, &vendor, &attr, &datasize, data);
> +
> + kfree(name);
> +
> + rv = copy_to_user(pgetvariable->Data, data, datasize);
> + kfree(data);
> +
> + if (rv)
> + return rv;
> +
> if (put_user(status, pgetvariable->status))
> return -EFAULT;
> if (status == EFI_SUCCESS) {
> @@ -141,7 +264,10 @@ static long efi_runtime_set_variable(unsigned long arg)
> EFI_GUID vendor_guid;
> efi_guid_t vendor;
> efi_status_t status;
> + uint16_t *name;
> uint32_t attr;
> + void *data;
> + int rv;
>
> psetvariable = (struct efi_setvariable __user *)arg;
> if (get_user(datasize, &psetvariable->DataSize) ||
> @@ -151,8 +277,21 @@ static long efi_runtime_set_variable(unsigned long arg)
> return -EFAULT;
>
> convert_from_guid(&vendor, &vendor_guid);
> - status = efi.set_variable(psetvariable->VariableName, &vendor,
> - attr, datasize, psetvariable->Data);
> +
> + rv = copy_ucs2_from_user(&name, psetvariable->VariableName);
> + if (rv)
> + return rv;
> +
> + data = kmalloc(datasize, GFP_KERNEL);
> + if (copy_from_user(data, psetvariable->Data, datasize)) {
> + kfree(name);
> + return -EFAULT;
> + }
> +
> + status = efi.set_variable(name, &vendor, attr, datasize, data);
> +
> + kfree(data);
> + kfree(name);
>
> if (put_user(status, psetvariable->status))
> return -EFAULT;
> @@ -266,6 +405,8 @@ static long efi_runtime_get_nextvariablename(unsigned long arg)
> efi_status_t status;
> efi_guid_t vendor;
> EFI_GUID vendor_guid;
> + uint16_t *name;
> + int rv;
>
> pgetnextvariablename = (struct efi_getnextvariablename
> __user *)arg;
> @@ -280,9 +421,20 @@ static long efi_runtime_get_nextvariablename(unsigned long arg)
>
> convert_from_guid(&vendor, &vendor_guid);
>
> - status = efi.get_next_variable(&name_size,
> - pgetnextvariablename->VariableName,
> - &vendor);
> + rv = copy_ucs2_from_user_len(&name,
> + pgetnextvariablename->VariableName, 1024);
> + if (rv)
> + return rv;
> +
> + status = efi.get_next_variable(&name_size, name, &vendor);
> +
> + rv = copy_ucs2_to_user_len(pgetnextvariablename->VariableName,
> + name, name_size);
> + kfree(name);
> +
> + if (rv)
> + return -EFAULT;
> +
> if (put_user(status, pgetnextvariablename->status))
> return -EFAULT;
> convert_to_guid(&vendor, &vendor_guid);
> @@ -302,14 +454,18 @@ static long efi_runtime_get_nexthighmonocount(unsigned long arg)
> {
> struct efi_getnexthighmonotoniccount __user *pgetnexthighmonotoniccount;
> efi_status_t status;
> + uint32_t count;
>
> pgetnexthighmonotoniccount = (struct
> efi_getnexthighmonotoniccount __user *)arg;
>
> - status = efi.get_next_high_mono_count(pgetnexthighmonotoniccount
> - ->HighCount);
> + status = efi.get_next_high_mono_count(&count);
> if (put_user(status, pgetnexthighmonotoniccount->status))
> return -EFAULT;
> +
> + if (put_user(count, pgetnexthighmonotoniccount->HighCount))
> + return -EFAULT;
> +
> if (status != EFI_SUCCESS)
> return -EINVAL;
>
> @@ -322,6 +478,7 @@ static long efi_runtime_query_variableinfo(unsigned long arg)
> {
> struct efi_queryvariableinfo __user *pqueryvariableinfo;
> efi_status_t status;
> + uint64_t max_storage, remaining, max_size;
> uint32_t attr;
>
> pqueryvariableinfo = (struct efi_queryvariableinfo __user *)arg;
> @@ -329,10 +486,18 @@ static long efi_runtime_query_variableinfo(unsigned long arg)
> if (get_user(attr, &pqueryvariableinfo->Attributes))
> return -EFAULT;
>
> - status = efi.query_variable_info(attr,
> - pqueryvariableinfo->MaximumVariableStorageSize,
> - pqueryvariableinfo->RemainingVariableStorageSize
> - , pqueryvariableinfo->MaximumVariableSize);
> + status = efi.query_variable_info(attr, &max_storage,
> + &remaining, &max_size);
> +
> + if (put_user(max_storage, pqueryvariableinfo->MaximumVariableStorageSize))
> + return -EFAULT;
> +
> + if (put_user(remaining, pqueryvariableinfo->RemainingVariableStorageSize))
> + return -EFAULT;
> +
> + if (put_user(max_size, pqueryvariableinfo->MaximumVariableSize))
> + return -EFAULT;
> +
> if (put_user(status, pqueryvariableinfo->status))
> return -EFAULT;
> if (status != EFI_SUCCESS)
> @@ -343,21 +508,46 @@ static long efi_runtime_query_variableinfo(unsigned long arg)
>
> static long efi_runtime_query_capsulecaps(unsigned long arg)
> {
> - struct efi_querycapsulecapabilities __user *pquerycapsulecapabilities;
> + struct efi_querycapsulecapabilities __user *u_caps;
> + struct efi_querycapsulecapabilities caps;
> + EFI_CAPSULE_HEADER *capsules;
> efi_status_t status;
> + uint64_t max_size;
> + int i, reset_type;
>
> - pquerycapsulecapabilities = (struct
> - efi_querycapsulecapabilities __user *)arg;
> + u_caps = (struct efi_querycapsulecapabilities __user *)arg;
>
> - status = efi.query_capsule_caps(
> - (efi_capsule_header_t **)
> - pquerycapsulecapabilities->CapsuleHeaderArray,
> - pquerycapsulecapabilities->CapsuleCount,
> - pquerycapsulecapabilities->MaximumCapsuleSize,
> - (int *)pquerycapsulecapabilities->ResetType);
> + if (copy_from_user(&caps, u_caps, sizeof(caps)))
> + return -EFAULT;
>
> - if (put_user(status, pquerycapsulecapabilities->status))
> + capsules = kcalloc(caps.CapsuleCount + 1,
> + sizeof(EFI_CAPSULE_HEADER), GFP_KERNEL);
> + if (!capsules)
> + return -ENOMEM;
> +
> + for (i = 0; i < caps.CapsuleCount; i++) {
> + if (copy_from_user(&capsules[i],
> + (EFI_CAPSULE_HEADER *)u_caps->CapsuleHeaderArray[i],
> + sizeof(EFI_CAPSULE_HEADER)))
> + return -EFAULT;
> + }
> +
> + caps.CapsuleHeaderArray = &capsules;
> +
> + status = efi.query_capsule_caps((efi_capsule_header_t **)
> + caps.CapsuleHeaderArray,
> + caps.CapsuleCount,
> + &max_size, &reset_type);
> +
> + if (put_user(status, u_caps->status))
> return -EFAULT;
> +
> + if (put_user(max_size, u_caps->MaximumCapsuleSize))
> + return -EFAULT;
> +
> + if (put_user(reset_type, u_caps->ResetType))
> + return -EFAULT;
> +
> if (status != EFI_SUCCESS)
> return -EINVAL;
>
>
Thanks for the fix!
Acked-by: Ivan Hu <ivan.hu at canonical.com>
More information about the fwts-devel
mailing list