Skip to content

Commit acd547b

Browse files
hansendcKAGA-KOKO
authored andcommitted
x86/pkeys: Default to a restrictive init PKRU
PKRU is the register that lets you disallow writes or all access to a given protection key. The XSAVE hardware defines an "init state" of 0 for PKRU: its most permissive state, allowing access/writes to everything. Since we start off all new processes with the init state, we start all processes off with the most permissive possible PKRU. This is unfortunate. If a thread is clone()'d [1] before a program has time to set PKRU to a restrictive value, that thread will be able to write to all data, no matter what pkey is set on it. This weakens any integrity guarantees that we want pkeys to provide. To fix this, we define a very restrictive PKRU to override the XSAVE-provided value when we create a new FPU context. We choose a value that only allows access to pkey 0, which is as restrictive as we can practically make it. This does not cause any practical problems with applications using protection keys because we require them to specify initial permissions for each key when it is allocated, which override the restrictive default. In the end, this ensures that threads which do not know how to manage their own pkey rights can not do damage to data which is pkey-protected. I would have thought this was a pretty contrived scenario, except that I heard a bug report from an MPX user who was creating threads in some very early code before main(). It may be crazy, but folks evidently _do_ it. Signed-off-by: Dave Hansen <dave.hansen@linux.intel.com> Cc: linux-arch@vger.kernel.org Cc: Dave Hansen <dave@sr71.net> Cc: mgorman@techsingularity.net Cc: arnd@arndb.de Cc: linux-api@vger.kernel.org Cc: linux-mm@kvack.org Cc: luto@kernel.org Cc: akpm@linux-foundation.org Cc: torvalds@linux-foundation.org Link: http://lkml.kernel.org/r/20160729163021.F3C25D4A@viggo.jf.intel.com Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
1 parent c74fe39 commit acd547b

File tree

5 files changed

+52
-0
lines changed

5 files changed

+52
-0
lines changed

Documentation/kernel-parameters.txt

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1643,6 +1643,11 @@ bytes respectively. Such letter suffixes can also be entirely omitted.
16431643

16441644
initrd= [BOOT] Specify the location of the initial ramdisk
16451645

1646+
init_pkru= [x86] Specify the default memory protection keys rights
1647+
register contents for all processes. 0x55555554 by
1648+
default (disallow access to all but pkey 0). Can
1649+
override in debugfs after boot.
1650+
16461651
inport.irq= [HW] Inport (ATI XL and Microsoft) busmouse driver
16471652
Format: <irq>
16481653

arch/x86/include/asm/pkeys.h

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -100,5 +100,6 @@ extern int arch_set_user_pkey_access(struct task_struct *tsk, int pkey,
100100
unsigned long init_val);
101101
extern int __arch_set_user_pkey_access(struct task_struct *tsk, int pkey,
102102
unsigned long init_val);
103+
extern void copy_init_pkru_to_fpregs(void);
103104

104105
#endif /*_ASM_X86_PKEYS_H */

arch/x86/kernel/fpu/core.c

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@
1212
#include <asm/traps.h>
1313

1414
#include <linux/hardirq.h>
15+
#include <linux/pkeys.h>
1516

1617
#define CREATE_TRACE_POINTS
1718
#include <asm/trace/fpu.h>
@@ -505,6 +506,9 @@ static inline void copy_init_fpstate_to_fpregs(void)
505506
copy_kernel_to_fxregs(&init_fpstate.fxsave);
506507
else
507508
copy_kernel_to_fregs(&init_fpstate.fsave);
509+
510+
if (boot_cpu_has(X86_FEATURE_OSPKE))
511+
copy_init_pkru_to_fpregs();
508512
}
509513

510514
/*

arch/x86/mm/pkeys.c

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -121,3 +121,41 @@ int __arch_override_mprotect_pkey(struct vm_area_struct *vma, int prot, int pkey
121121
*/
122122
return vma_pkey(vma);
123123
}
124+
125+
#define PKRU_AD_KEY(pkey) (PKRU_AD_BIT << ((pkey) * PKRU_BITS_PER_PKEY))
126+
127+
/*
128+
* Make the default PKRU value (at execve() time) as restrictive
129+
* as possible. This ensures that any threads clone()'d early
130+
* in the process's lifetime will not accidentally get access
131+
* to data which is pkey-protected later on.
132+
*/
133+
u32 init_pkru_value = PKRU_AD_KEY( 1) | PKRU_AD_KEY( 2) | PKRU_AD_KEY( 3) |
134+
PKRU_AD_KEY( 4) | PKRU_AD_KEY( 5) | PKRU_AD_KEY( 6) |
135+
PKRU_AD_KEY( 7) | PKRU_AD_KEY( 8) | PKRU_AD_KEY( 9) |
136+
PKRU_AD_KEY(10) | PKRU_AD_KEY(11) | PKRU_AD_KEY(12) |
137+
PKRU_AD_KEY(13) | PKRU_AD_KEY(14) | PKRU_AD_KEY(15);
138+
139+
/*
140+
* Called from the FPU code when creating a fresh set of FPU
141+
* registers. This is called from a very specific context where
142+
* we know the FPU regstiers are safe for use and we can use PKRU
143+
* directly. The fact that PKRU is only available when we are
144+
* using eagerfpu mode makes this possible.
145+
*/
146+
void copy_init_pkru_to_fpregs(void)
147+
{
148+
u32 init_pkru_value_snapshot = READ_ONCE(init_pkru_value);
149+
/*
150+
* Any write to PKRU takes it out of the XSAVE 'init
151+
* state' which increases context switch cost. Avoid
152+
* writing 0 when PKRU was already 0.
153+
*/
154+
if (!init_pkru_value_snapshot && !read_pkru())
155+
return;
156+
/*
157+
* Override the PKRU state that came from 'init_fpstate'
158+
* with the baseline from the process.
159+
*/
160+
write_pkru(init_pkru_value_snapshot);
161+
}

include/linux/pkeys.h

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,10 @@ static inline int arch_set_user_pkey_access(struct task_struct *tsk, int pkey,
3535
return 0;
3636
}
3737

38+
static inline void copy_init_pkru_to_fpregs(void)
39+
{
40+
}
41+
3842
#endif /* ! CONFIG_ARCH_HAS_PKEYS */
3943

4044
#endif /* _LINUX_PKEYS_H */

0 commit comments

Comments
 (0)