Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp428148ybt; Sat, 13 Jun 2020 08:51:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzZ2goj4FM7Br/LyUlN5b11dQkVvMNLlPqvirxoiAZ8aEqB+NmoJNj2MCStQ1oVuhBj3K6x X-Received: by 2002:a05:6402:308b:: with SMTP id de11mr16742658edb.181.1592063470102; Sat, 13 Jun 2020 08:51:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592063470; cv=none; d=google.com; s=arc-20160816; b=lktB6ftVTVlCFyegAyWrcTJ2Yhj0o7BQdZ2cOZrFQC7+eNwyYXD9uFakVSFCJu1iDL PCD2Ha/dyUBzA9IDIZNNdmvgjTBqwNBHv+kWonJWeEnu/MCNIho8eeU5+x3fkqyo+aJQ aTWOgLN1RIYc6cHxL9J4IdpXUhD3v2wnevtB61enrA0oP8XM7qRpwXJdoMKcbG96KADt 1HWBXiKZFDtfPY2n7Ptjr3ghiRn/M8919jN3m0OLvNm/XTluEdfB6T60vIpYfeIkKHUL 6CpDLG4TpgKxWqB+HLAOoHFSr0I/13oIsG41p7+oue8YwWwGvxrRT1ZerL9fJQ2IWq2B fyGQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=xpFu3xeuwW56FDNPjISGie5oZAtBhKOIDlLjho8iQWU=; b=Ug8Wzpk/Uu+WBwQfm+h/bBStydxkuNnjG/V/sUeSK9REy6PAmmD5+V9X/tOz4EJKMS OyGaR2T9tXluBF+NYWEyy2bOJNQEqIBatyOy5qO+1IS46DVrhBmr2/Fp2G9FTQDdA/gV J+Zy2QYnDiNG498sTTSbHHwj8QHc220erwkurIyt4+NRjNfuwzmE5h+VWE3RoXeEYrHo 50VRcwoieBd+MpP9oRvw22mQent8rQBSx6Es4R/5/ZSTOLcUyOD3F1qVedA/IH4PyTsA aQTV2ps8d2b/Fpq3ShObTlamkTzGmXmDyRxRFnYiHRMapuLEXIEPnsM99CxUjdp/41UA cBaw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@alien8.de header.s=dkim header.b=BlN+fU30; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y5si5308778edw.121.2020.06.13.08.50.46; Sat, 13 Jun 2020 08:51:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@alien8.de header.s=dkim header.b=BlN+fU30; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726404AbgFMPs4 (ORCPT + 99 others); Sat, 13 Jun 2020 11:48:56 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33602 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726289AbgFMPs4 (ORCPT ); Sat, 13 Jun 2020 11:48:56 -0400 Received: from mail.skyhub.de (mail.skyhub.de [IPv6:2a01:4f8:190:11c2::b:1457]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7C151C03E96F for ; Sat, 13 Jun 2020 08:48:55 -0700 (PDT) Received: from zn.tnic (p200300ec2f236600ccf5b760a9503602.dip0.t-ipconnect.de [IPv6:2003:ec:2f23:6600:ccf5:b760:a950:3602]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.skyhub.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id C25141EC0288; Sat, 13 Jun 2020 17:48:52 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alien8.de; s=dkim; t=1592063333; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references; bh=xpFu3xeuwW56FDNPjISGie5oZAtBhKOIDlLjho8iQWU=; b=BlN+fU30UGRqeFHijJ9OsW5CJBIwEiq+++BVKv6LW9wYuo7Jj1QjkJqlBiwSkTl9skbCr3 fRcbsqm8yazegXxKLp1GOSY8OSGNN6SR9Ra3CtJZ+MweCRkf0yC0UiLfCHAFNqCaf+z7B0 U9rqHJXpCC8NJVlj7p9+r9Cm7FMU9KY= Date: Sat, 13 Jun 2020 17:48:44 +0200 From: Borislav Petkov To: x86-ml Cc: Linus Torvalds , lkml , Sean Christopherson , Tony Luck Subject: [PATCH -v2] x86/msr: Filter MSR writes Message-ID: <20200613154844.GB584@zn.tnic> References: <20200612105026.GA22660@zn.tnic> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20200612105026.GA22660@zn.tnic> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, here's v2 with the requested changes. The whitelist is still TBD, I might be able to remove it competely and defer the whole whitelisting to the future. when people start reporting MSRs (see pr_err_ratelimited() call below). --- Disable writing to MSRs from userspace by default. Writes can still be allowed by supplying the allow_writes=1 module parameter and the kernel will be tainted so that it shows in oopses. Having unfettered access to all MSRs on a system is and has always been a disaster waiting to happen. Think performance counter MSRs, MSRs with sticky or locked bits, MSRs making major system changes like loading microcode, MTRRs, PAT configuration, TSC counter, security mitigations MSRs, you name it. This also destroys all the kernel's caching of MSR values for performance, as the recent case with MSR_AMD64_LS_CFG showed. Another example is writing MSRs by mistake by simply typing the wrong MSR address. System freezes have been experienced that way. In general, poking at MSRs under the kernel's feet is a bad bad idea. So disable poking directly at the MSRs by default. If userspace still wants to do that, then proper interfaces should be defined which are under the kernel's control and accesses to those MSRs can be synchronized and sanitized properly. Changelog: - taint before WRMSR, all - make param 0600, Sean. - do not deny but log writes by default, Linus. Signed-off-by: Borislav Petkov --- arch/x86/kernel/msr.c | 68 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 68 insertions(+) diff --git a/arch/x86/kernel/msr.c b/arch/x86/kernel/msr.c index 1547be359d7f..1a4f8b30fb09 100644 --- a/arch/x86/kernel/msr.c +++ b/arch/x86/kernel/msr.c @@ -42,6 +42,14 @@ static struct class *msr_class; static enum cpuhp_state cpuhp_msr_state; +enum allow_write_msrs { + MSR_WRITES_ON, + MSR_WRITES_OFF, + MSR_WRITES_DEFAULT, +}; + +static enum allow_write_msrs allow_writes = MSR_WRITES_DEFAULT; + static ssize_t msr_read(struct file *file, char __user *buf, size_t count, loff_t *ppos) { @@ -70,6 +78,24 @@ static ssize_t msr_read(struct file *file, char __user *buf, return bytes ? bytes : err; } +static int filter_write(u32 reg) +{ + switch (allow_writes) { + case MSR_WRITES_ON: return 0; break; + case MSR_WRITES_OFF: return -EPERM; break; + default: fallthrough; + } + + if (reg == MSR_IA32_ENERGY_PERF_BIAS) + return 0; + + pr_err_ratelimited("Write to unrecognized MSR 0x%x by %s\n" + "Please report to x86@kernel.org\n", + reg, current->comm); + + return 0; +} + static ssize_t msr_write(struct file *file, const char __user *buf, size_t count, loff_t *ppos) { @@ -84,6 +110,10 @@ static ssize_t msr_write(struct file *file, const char __user *buf, if (err) return err; + err = filter_write(reg); + if (err) + return err; + if (count % 8) return -EINVAL; /* Invalid chunk size */ @@ -92,9 +122,13 @@ static ssize_t msr_write(struct file *file, const char __user *buf, err = -EFAULT; break; } + + add_taint(TAINT_CPU_OUT_OF_SPEC, LOCKDEP_STILL_OK); + err = wrmsr_safe_on_cpu(cpu, reg, data[0], data[1]); if (err) break; + tmp += 2; bytes += 8; } @@ -242,6 +276,40 @@ static void __exit msr_exit(void) } module_exit(msr_exit) +static int set_allow_writes(const char *val, const struct kernel_param *cp) +{ + char *s = strstrip(val); + + if (!strcmp(s, "on")) + allow_writes = MSR_WRITES_ON; + else if (!strcmp(s, "off")) + allow_writes = MSR_WRITES_OFF; + else + allow_writes = MSR_WRITES_DEFAULT; + + return 0; +} + +static int get_allow_writes(char *buf, const struct kernel_param *kp) +{ + const char *res; + + switch (allow_writes) { + case MSR_WRITES_ON: res = "on"; break; + case MSR_WRITES_OFF: res = "off"; break; + default: res = "default"; break; + } + + return sprintf(buf, "%s\n", res); +} + +static const struct kernel_param_ops allow_writes_ops = { + .set = set_allow_writes, + .get = get_allow_writes +}; + +module_param_cb(allow_writes, &allow_writes_ops, NULL, 0600); + MODULE_AUTHOR("H. Peter Anvin "); MODULE_DESCRIPTION("x86 generic MSR driver"); MODULE_LICENSE("GPL"); -- 2.21.0 -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette