Received: by 2002:a25:2c96:0:0:0:0:0 with SMTP id s144csp1704293ybs; Tue, 26 May 2020 01:20:20 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw9xWqjyxBx79/XEm3NYtin5QNDmVnVxHOCB75Cx9yfckz2fXl8QyJqB8yekfdHVdS3fA4S X-Received: by 2002:a17:906:858b:: with SMTP id v11mr123824ejx.348.1590481220529; Tue, 26 May 2020 01:20:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590481220; cv=none; d=google.com; s=arc-20160816; b=JXVEvnwX4BUAExhDQLBXoDoUryFO7d2j4AJFni+1GDeeUWsJO57Nwbim+V120W8uf2 AILZsTBF5VmCjaxB9QZINFM0sMIgf7EGfWflkRYXy8pwav+Xe3qg9LOdEXWFC65IQqcn yG/Ltm6ZPPeEVbT7R63w+ZyrmsiFgsDU5cjWlKw8LXDej/Ztmk9Pc9otVY75P85/OtGv aciHChicG3hUO7NBZf/bSmnlea58qi2uDZT31yJBHEG9oAVG4bcQTWgq+tI5ICOo61sA zDqbT+M3UPRSxgNBWPvxicn0oW+C/xhZrXEDn/zytER2tfU/ZyZO9Jih8wiCqCAMOGq5 3hMg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=Mmxj3cv+1z9oWgRpBFyc/eUiLqCYK2rK0fBzVYlJVO8=; b=FC1cKrAHBSQGY4rxXRQKR/jHG9qdmtbSw4mcFf1k79nxomIkxhbtCwvtQxkZhxDzxs RFXumXKOp/eVmWSzaWOiFE12oXoSC/g1FLP46jV2wW3oxCXjRV+CbdiwiIg3dvHEv+LC uZUTM6V4dFw4jtxB9GoHyy965vUs10L9kBME4HUqis45l0FDoRAlYpDOF26zmFyCbw+z mYtm7ViLgmkW5f507mRNawCE2Pv0jFwUhqfHgmjTnPC4nePa5blPkLCxJXQWNPFwnr/O J7C5HQtvQrxIH5G7DKcWHbBvP+PpgZ5oLnzO80PdU/FLQq/gxplJvmblMzVUdutrFJcP p+nQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=quWEouPk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u23si10664862edy.361.2020.05.26.01.19.57; Tue, 26 May 2020 01:20:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=quWEouPk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730085AbgEZIRz (ORCPT + 99 others); Tue, 26 May 2020 04:17:55 -0400 Received: from mail.kernel.org ([198.145.29.99]:43052 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726926AbgEZIRz (ORCPT ); Tue, 26 May 2020 04:17:55 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BF0B320776; Tue, 26 May 2020 08:17:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1590481075; bh=FSwmFkxuSzNUR+zuH7Zn3DAi6cLT2fFo8dtMDocf8cM=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=quWEouPkVJ9Znhpt/F+1qts9DS26VXpGDAS6hvdCF87TyIXFu3qLUDZ8st7rXVf8m 0JHpATuvZsGTQgfwvYLv7aCyoR8v8CV72nNPAq8RDa5zWut82u4sXHwLCZQyz2gscC h87tfCpsU+JOXvXlDsVqkhIAaRZDuWNX3ZQCnjMI= Date: Tue, 26 May 2020 10:17:52 +0200 From: Greg KH To: Peter Zijlstra Cc: Andi Kleen , x86@kernel.org, keescook@chromium.org, linux-kernel@vger.kernel.org, sashal@kernel.org, Andi Kleen , stable@vger.kernel.org Subject: Re: [PATCH v1] x86: Pin cr4 FSGSBASE Message-ID: <20200526081752.GA2650351@kroah.com> References: <20200526052848.605423-1-andi@firstfloor.org> <20200526065618.GC2580410@kroah.com> <20200526075736.GH317569@hirez.programming.kicks-ass.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200526075736.GH317569@hirez.programming.kicks-ass.net> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 26, 2020 at 09:57:36AM +0200, Peter Zijlstra wrote: > On Tue, May 26, 2020 at 08:56:18AM +0200, Greg KH wrote: > > On Mon, May 25, 2020 at 10:28:48PM -0700, Andi Kleen wrote: > > > From: Andi Kleen > > > > > > Since there seem to be kernel modules floating around that set > > > FSGSBASE incorrectly, prevent this in the CR4 pinning. Currently > > > CR4 pinning just checks that bits are set, this also checks > > > that the FSGSBASE bit is not set, and if it is clears it again. > > > > So we are trying to "protect" ourselves from broken out-of-tree kernel > > modules now? Why stop with this type of check, why not just forbid them > > entirely if we don't trust them? :) > > Oh, I have a bunch of patches pending for that :-) Ah, I thought I had seen something like that go by a while ago. It's sad that we have to write a "don't do stupid things" checker for kernel modules now :( > It will basically decode the module text and refuse to load the module > for most CPL0 instruction. Ok, so why would Andi's patch even be needed then? Andi, why post this? thanks, greg k-h