lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 8 Jul 2016 19:09:13 -0700 From: Mitchel Humpherys <mitchelh@...eaurora.org> To: iommu@...ts.linux-foundation.org, linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org, Robin Murphy <robin.murphy@....com>, Will Deacon <will.deacon@....com>, Marek Szyprowski <m.szyprowski@...sung.com> Cc: Jordan Crouse <jcrouse@...eaurora.org>, Jeremy Gebben <jgebben@...eaurora.org>, Patrick Daly <pdaly@...eaurora.org>, Pratik Patel <pratikp@...eaurora.org>, Mitchel Humpherys <mitchelh@...eaurora.org> Subject: [PATCH v2 0/6] Add support for privileged mappings The following patch to the ARM SMMU driver: commit d346180e70b91b3d5a1ae7e5603e65593d4622bc Author: Robin Murphy <robin.murphy@....com> Date: Tue Jan 26 18:06:34 2016 +0000 iommu/arm-smmu: Treat all device transactions as unprivileged started forcing all SMMU transactions to come through as "unprivileged". The rationale given was that: (1) There is no way in the IOMMU API to even request privileged mappings. (2) It's difficult to implement a DMA mapper that correctly models the ARM VMSAv8 behavior of unprivileged-writeable => privileged-execute-never. This series rectifies (1) by introducing an IOMMU API for privileged mappings and implements it in io-pgtable-arm. This series rectifies (2) by introducing a new dma attribute (DMA_ATTR_PRIVILEGED_EXECUTABLE) for users of the DMA API that need privileged, executable mappings, and implements it in the arm64 IOMMU DMA mapper. The one known user (pl330.c) is converted over to the new attribute. Jordan and Jeremy can provide more info on the use case if needed, but the high level is that it's a security feature to prevent attacks such as [1]. [1] https://github.com/robclark/kilroy Changelog: v1..v2 - Added a new DMA attribute to make executable privileged mappings work, and use that in the pl330 driver (suggested by Will). Jeremy Gebben (1): iommu/io-pgtable-arm: add support for the IOMMU_PRIV flag Mitchel Humpherys (5): iommu: add IOMMU_PRIV attribute Revert "iommu/arm-smmu: Treat all device transactions as unprivileged" common: DMA-mapping: add DMA_ATTR_PRIVILEGED_EXECUTABLE attribute arm64/dma-mapping: Implement DMA_ATTR_PRIVILEGED_EXECUTABLE dmaengine: pl330: Make sure microcode is privileged-executable Documentation/DMA-attributes.txt | 9 +++++++++ arch/arm64/mm/dma-mapping.c | 6 +++--- drivers/dma/pl330.c | 7 +++++-- drivers/iommu/arm-smmu.c | 5 +---- drivers/iommu/dma-iommu.c | 15 +++++++++++---- drivers/iommu/io-pgtable-arm.c | 16 +++++++++++----- include/linux/dma-attrs.h | 1 + include/linux/dma-iommu.h | 3 ++- include/linux/iommu.h | 1 + 9 files changed, 44 insertions(+), 19 deletions(-) -- Qualcomm Innovation Center, Inc. The Qualcomm Innovation Center, Inc. is a member of the Code Aurora Forum, a Linux Foundation Collaborative Project
Powered by blists - more mailing lists