Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp3017313ybt; Mon, 29 Jun 2020 13:01:51 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyb/irQdspd7NoCfQmCYAsQQ8BonaNExebgXm7oOb1cS0uS9mPm7bO3fzGakc0sNvhhYPmL X-Received: by 2002:a17:906:1a59:: with SMTP id j25mr14582491ejf.398.1593460911509; Mon, 29 Jun 2020 13:01:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593460911; cv=none; d=google.com; s=arc-20160816; b=kP4UXmXilSTrF0joAogmoH57qdwv5/3Fg4cc6gmVN1BlBL84/40+VeIJ8hkqePG9bv R0CtPzNyLxUAkckEmhxI/T9Kb8m0QK9OnTJ+EPYq+ofrCBvfe7P1GYPsJ8JHg7eqxuFy MrZjSXOq/+f/0enVikhNz6MnUaWzp30Thmd3DnFTh099yq5gHDhwi+DtzX3mkYUrMoyY qoBmg4HwkdzMCWLND6KiDY8FASOokALk2VoOURLZDATCq89LbWLNaA3lmOWKNDgneP9M mfnINR0zOCeIhZNd4x1NclKJLcLiGIgZuWXKGRL88RZY2OBnIarOAIPYd090aPP2wQrN s8YA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=iZHRVYuaWaRilBS6mxkibTeBeBw9i/NoJ2l5jZ7ou2g=; b=ZeZnRlIoMu8+UjhFhfkJBdQxjwzSye38Vp9P3/zp71C7pXktSb0u/DGTMF/1MMPBJQ /AYDva2LFzckTWOwWMBia+wjV6aCVefJjORaW1qo2AYJ0LMW8CahJVtjWXGJ9nIoxQi6 6xl6Uf9bikaP/O/MJFQ3tyPp93YIVw4OKcreqDj8moGdkSsdZSg+Ek+9N/FZZ2o9m4As 6z4NklK4X6VvFXUU7V06xOWkZge4H9qkH+wzJ3zBJUvUvDGIGU7/3PkdKYgHJfuU5C3v WlD70ZRKMCRZdQLeBJCkVWmbdTjGIB8AvqhbPKYm4OKgui3B0HzIQZniOkIDJrd7OKeT sxHg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ADT3u4+7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id rv20si381828ejb.420.2020.06.29.13.01.28; Mon, 29 Jun 2020 13:01:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ADT3u4+7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388641AbgF2UBR (ORCPT + 99 others); Mon, 29 Jun 2020 16:01:17 -0400 Received: from mail.kernel.org ([198.145.29.99]:47636 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387546AbgF2TkP (ORCPT ); Mon, 29 Jun 2020 15:40:15 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 91A2D2490E; Mon, 29 Jun 2020 15:27:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1593444463; bh=jqIGikHXbjh0fGXK+ZUVg3Q2MlISrW97Srq0yttB7jM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ADT3u4+7TWhUsLyrWQzun1/FK1aWPi8+q0l5zXDcl8Td2QieQb9tn8F7FEUsTpZCZ KiECeU/1Ju4mfNTOl8AguROhoO36zRIC6admjEPO8HQ/G19qIUdCj/lVeiEprSjcdj 6W1ZFtvpbQ/2VAj/eEjjhdD0lTP4SOQz2cQWjv3U= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: "Jason A. Donenfeld" , "Rafael J . Wysocki" , Greg Kroah-Hartman Subject: [PATCH 5.4 143/178] ACPI: configfs: Disallow loading ACPI tables when locked down Date: Mon, 29 Jun 2020 11:24:48 -0400 Message-Id: <20200629152523.2494198-144-sashal@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200629152523.2494198-1-sashal@kernel.org> References: <20200629152523.2494198-1-sashal@kernel.org> MIME-Version: 1.0 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.4.50-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-5.4.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 5.4.50-rc1 X-KernelTest-Deadline: 2020-07-01T15:25+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: "Jason A. Donenfeld" commit 75b0cea7bf307f362057cc778efe89af4c615354 upstream. Like other vectors already patched, this one here allows the root user to load ACPI tables, which enables arbitrary physical address writes, which in turn makes it possible to disable lockdown. Prevents this by checking the lockdown status before allowing a new ACPI table to be installed. The link in the trailer shows a PoC of how this might be used. Link: https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language-2.sh Cc: 5.4+ # 5.4+ Signed-off-by: Jason A. Donenfeld Signed-off-by: Rafael J. Wysocki Signed-off-by: Greg Kroah-Hartman --- drivers/acpi/acpi_configfs.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/drivers/acpi/acpi_configfs.c b/drivers/acpi/acpi_configfs.c index 57d9d574d4dde..01738d8e888e3 100644 --- a/drivers/acpi/acpi_configfs.c +++ b/drivers/acpi/acpi_configfs.c @@ -11,6 +11,7 @@ #include #include #include +#include #include "acpica/accommon.h" #include "acpica/actables.h" @@ -28,7 +29,10 @@ static ssize_t acpi_table_aml_write(struct config_item *cfg, { const struct acpi_table_header *header = data; struct acpi_table *table; - int ret; + int ret = security_locked_down(LOCKDOWN_ACPI_TABLES); + + if (ret) + return ret; table = container_of(cfg, struct acpi_table, cfg); -- 2.25.1