[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <0fa9682e-59d4-75f7-366f-103d6b8e71b8@intel.com>
Date: Thu, 18 Jun 2020 07:18:09 -0700
From: Dave Hansen <dave.hansen@...el.com>
To: John Andersen <john.s.andersen@...el.com>, corbet@....net,
pbonzini@...hat.com, tglx@...utronix.de, mingo@...hat.com,
bp@...en8.de, x86@...nel.org, hpa@...or.com, shuah@...nel.org,
sean.j.christopherson@...el.com, liran.alon@...cle.com,
drjones@...hat.com, rick.p.edgecombe@...el.com,
kristen@...ux.intel.com
Cc: vkuznets@...hat.com, wanpengli@...cent.com, jmattson@...gle.com,
joro@...tes.org, mchehab+huawei@...nel.org,
gregkh@...uxfoundation.org, paulmck@...nel.org,
pawan.kumar.gupta@...ux.intel.com, jgross@...e.com,
mike.kravetz@...cle.com, oneukum@...e.com, luto@...nel.org,
peterz@...radead.org, fenghua.yu@...el.com,
reinette.chatre@...el.com, vineela.tummalapalli@...el.com,
dave.hansen@...ux.intel.com, arjan@...ux.intel.com,
caoj.fnst@...fujitsu.com, bhe@...hat.com, nivedita@...m.mit.edu,
keescook@...omium.org, dan.j.williams@...el.com,
eric.auger@...hat.com, aaronlewis@...gle.com, peterx@...hat.com,
makarandsonare@...gle.com, linux-doc@...r.kernel.org,
linux-kernel@...r.kernel.org, kvm@...r.kernel.org,
linux-kselftest@...r.kernel.org,
kernel-hardening@...ts.openwall.com
Subject: Re: [PATCH 2/4] KVM: x86: Introduce paravirt feature CR0/CR4 pinning
On 6/17/20 12:07 PM, John Andersen wrote:
> +#define KVM_CR0_PIN_ALLOWED (X86_CR0_WP)
> +#define KVM_CR4_PIN_ALLOWED (X86_CR4_SMEP | X86_CR4_SMAP | X86_CR4_UMIP)
Why *is* there an allowed set? Why don't we just allow everything?
Shouldn't we also pin any unknown bits? The CR4.FSGSBASE bit is an
example of something that showed up CPUs without Linux knowing about it.
If set, it causes problems. This set couldn't have helped FSGSBASE
because it is not in the allowed set.
Let's say Intel loses its marbles and adds a CR4 bit that lets userspace
write to kernel memory. Linux won't set it, but an attacker would go
after it, first thing.
Powered by blists - more mailing lists