[PATCH 12/27] x86/msr: Restrict MSR access when the kernel is locked down

Alan Cox gnomes at lxorguk.ukuu.org.uk
Fri Oct 20 18:09:39 UTC 2017


On Thu, 19 Oct 2017 15:52:04 +0100
David Howells <dhowells at redhat.com> wrote:

> From: Matthew Garrett <matthew.garrett at nebula.com>
> 
> Writing to MSRs should not be allowed if the kernel is locked down, since
> it could lead to execution of arbitrary code in kernel mode.  Based on a
> patch by Kees Cook.

There are a load of standard tools that use this so I think you are going
to need a whitelist. Can you at least log *which* MSR in the failing case
so a whitelist can be built over time ?

Alan
--
To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
the body of a message to majordomo at vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html



More information about the Linux-security-module-archive mailing list