aboutsummaryrefslogtreecommitdiffstats
path: root/arch
diff options
context:
space:
mode:
authorAlan Cox <alan@linux.intel.com>2012-11-15 13:06:22 +0000
committerStefan Bader <stefan.bader@canonical.com>2013-06-10 17:51:31 +0200
commitfe6ec9bc99d4df6226fcb38b5a64f38f0fb17363 (patch)
tree02565de98885ca079d86b97df33f5dc7591fa56e /arch
parent8e681a7663c6ea8dd661fd46a4a492a3aa667c71 (diff)
downloadlinux-2.6.32.y-drm33.z-fe6ec9bc99d4df6226fcb38b5a64f38f0fb17363.tar.gz
x86/msr: Add capabilities check
commit c903f0456bc69176912dee6dd25c6a66ee1aed00 upstream At the moment the MSR driver only relies upon file system checks. This means that anything as root with any capability set can write to MSRs. Historically that wasn't very interesting but on modern processors the MSRs are such that writing to them provides several ways to execute arbitary code in kernel space. Sample code and documentation on doing this is circulating and MSR attacks are used on Windows 64bit rootkits already. In the Linux case you still need to be able to open the device file so the impact is fairly limited and reduces the security of some capability and security model based systems down towards that of a generic "root owns the box" setup. Therefore they should require CAP_SYS_RAWIO to prevent an elevation of capabilities. The impact of this is fairly minimal on most setups because they don't have heavy use of capabilities. Those using SELinux, SMACK or AppArmor rules might want to consider if their rulesets on the MSR driver could be tighter. Signed-off-by: Alan Cox <alan@linux.intel.com> Cc: Linus Torvalds <torvalds@linux-foundation.org> Cc: Andrew Morton <akpm@linux-foundation.org> Cc: Peter Zijlstra <a.p.zijlstra@chello.nl> Cc: Horses <stable@kernel.org> Signed-off-by: Ingo Molnar <mingo@kernel.org> [dannf: backported to Debian's 2.6.32] Signed-off-by: Willy Tarreau <w@1wt.eu> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
Diffstat (limited to 'arch')
-rw-r--r--arch/x86/kernel/msr.c3
1 files changed, 3 insertions, 0 deletions
diff --git a/arch/x86/kernel/msr.c b/arch/x86/kernel/msr.c
index 5eaeb5e35c497b..63a053b7376ee2 100644
--- a/arch/x86/kernel/msr.c
+++ b/arch/x86/kernel/msr.c
@@ -176,6 +176,9 @@ static int msr_open(struct inode *inode, struct file *file)
struct cpuinfo_x86 *c = &cpu_data(cpu);
int ret = 0;
+ if (!capable(CAP_SYS_RAWIO))
+ return -EPERM;
+
lock_kernel();
cpu = iminor(file->f_path.dentry->d_inode);