Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp5769823imm; Mon, 23 Jul 2018 05:54:04 -0700 (PDT) X-Google-Smtp-Source: AAOMgpfjFQezhrrPhX8udaybmvRCYfURz+cRzR8Vh5MtJafsyNNENTqq+lsgdQLmtrZBQotokNKj X-Received: by 2002:a63:ec14:: with SMTP id j20-v6mr11952602pgh.28.1532350444862; Mon, 23 Jul 2018 05:54:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532350444; cv=none; d=google.com; s=arc-20160816; b=qkRwtis9yJVEcpwQAzxOVFc+ZKEyy3J7FW26WRCvHYOCi8XuYVIVlvojFhOHqzE2sW BA31PqgmUP/AmjSe18RIKCfYLaXEb1suIx/E+Qk2hh07zzj+gLOayluZfxKEXHZJbfWU LlavXkMVPbufurBFtOtslKf12B5M+LDGUl2ihIAHcocWkaGK4mbaDXF5i2eHyAzbiJUo S6tN/Lx+w0bgN8IlgHDYaQkwqxtJrdA4dlTXM+U5cSkZBal1kkNMpoCsz1AZBWOBJjwf eor/0LXc8WoIpC8i/PZBzwBBPzUo19xFgF4TRSip34rcSUXLAUAL6T/6DxwHvisVz1Cm n3Ww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=Za/V5W297sbgeC04PsvCMTjhXBKo1CFW3k1rs6oI6Iw=; b=Xznh+DAADMvckp/ZnaKniWJwI7n+QK7iF9s22b0rBa2JwjBdgit49y4Z0W3WNMsn7s xDkzf1RLjbZxw6rfabTBaFlDPJH9lTIfHU/6vxz9US+GdvFOPXFr/HgauugZk9scqU2I S6wZt1IG1sIYOMhNrhvQXoLhZE9gt8CPgVZhzvmL0kSiH2bt3rC2mdDhOXw1crO3oPbn JDZSjHvJ1B4GDaDiFSmAgG+MB3sm+XcliGuFQmgz6NI1OKEwZDD7lg5BJQADc7t5sdAZ LG2dSaL2ZyltY7ZXeFI7FIfeotxzDbF+EvPoa7JOmNrhnNPx6olVEGNg9hhmnn5nxDjL Tphg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 24-v6si8565191pgx.314.2018.07.23.05.53.50; Mon, 23 Jul 2018 05:54:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388814AbeGWNwi (ORCPT + 99 others); Mon, 23 Jul 2018 09:52:38 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:51200 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389417AbeGWNrx (ORCPT ); Mon, 23 Jul 2018 09:47:53 -0400 Received: from localhost (LFbn-1-12238-233.w90-92.abo.wanadoo.fr [90.92.53.233]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 9C06ECBA; Mon, 23 Jul 2018 12:45:49 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Thomas Gleixner , David Woodhouse , "Srivatsa S. Bhat" , "Matt Helsley (VMware)" , Alexey Makhalov , Bo Gan Subject: [PATCH 4.4 074/107] seccomp: Move speculation migitation control to arch code Date: Mon, 23 Jul 2018 14:42:08 +0200 Message-Id: <20180723122417.102669473@linuxfoundation.org> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180723122413.003644357@linuxfoundation.org> References: <20180723122413.003644357@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Thomas Gleixner commit 8bf37d8c067bb7eb8e7c381bdadf9bd89182b6bc upstream The migitation control is simpler to implement in architecture code as it avoids the extra function call to check the mode. Aside of that having an explicit seccomp enabled mode in the architecture mitigations would require even more workarounds. Move it into architecture code and provide a weak function in the seccomp code. Remove the 'which' argument as this allows the architecture to decide which mitigations are relevant for seccomp. Signed-off-by: Thomas Gleixner Signed-off-by: David Woodhouse Signed-off-by: Greg Kroah-Hartman Signed-off-by: Srivatsa S. Bhat Reviewed-by: Matt Helsley (VMware) Reviewed-by: Alexey Makhalov Reviewed-by: Bo Gan Signed-off-by: Greg Kroah-Hartman --- arch/x86/kernel/cpu/bugs.c | 29 ++++++++++++++++++----------- include/linux/nospec.h | 2 ++ kernel/seccomp.c | 15 ++------------- 3 files changed, 22 insertions(+), 24 deletions(-) --- a/arch/x86/kernel/cpu/bugs.c +++ b/arch/x86/kernel/cpu/bugs.c @@ -567,6 +567,24 @@ static int ssb_prctl_set(struct task_str return 0; } +int arch_prctl_spec_ctrl_set(struct task_struct *task, unsigned long which, + unsigned long ctrl) +{ + switch (which) { + case PR_SPEC_STORE_BYPASS: + return ssb_prctl_set(task, ctrl); + default: + return -ENODEV; + } +} + +#ifdef CONFIG_SECCOMP +void arch_seccomp_spec_mitigate(struct task_struct *task) +{ + ssb_prctl_set(task, PR_SPEC_FORCE_DISABLE); +} +#endif + static int ssb_prctl_get(struct task_struct *task) { switch (ssb_mode) { @@ -585,17 +603,6 @@ static int ssb_prctl_get(struct task_str } } -int arch_prctl_spec_ctrl_set(struct task_struct *task, unsigned long which, - unsigned long ctrl) -{ - switch (which) { - case PR_SPEC_STORE_BYPASS: - return ssb_prctl_set(task, ctrl); - default: - return -ENODEV; - } -} - int arch_prctl_spec_ctrl_get(struct task_struct *task, unsigned long which) { switch (which) { --- a/include/linux/nospec.h +++ b/include/linux/nospec.h @@ -62,5 +62,7 @@ static inline unsigned long array_index_ int arch_prctl_spec_ctrl_get(struct task_struct *task, unsigned long which); int arch_prctl_spec_ctrl_set(struct task_struct *task, unsigned long which, unsigned long ctrl); +/* Speculation control for seccomp enforced mitigation */ +void arch_seccomp_spec_mitigate(struct task_struct *task); #endif /* _LINUX_NOSPEC_H */ --- a/kernel/seccomp.c +++ b/kernel/seccomp.c @@ -216,18 +216,7 @@ static inline bool seccomp_may_assign_mo return true; } -/* - * If a given speculation mitigation is opt-in (prctl()-controlled), - * select it, by disabling speculation (enabling mitigation). - */ -static inline void spec_mitigate(struct task_struct *task, - unsigned long which) -{ - int state = arch_prctl_spec_ctrl_get(task, which); - - if (state > 0 && (state & PR_SPEC_PRCTL)) - arch_prctl_spec_ctrl_set(task, which, PR_SPEC_FORCE_DISABLE); -} +void __weak arch_seccomp_spec_mitigate(struct task_struct *task) { } static inline void seccomp_assign_mode(struct task_struct *task, unsigned long seccomp_mode, @@ -243,7 +232,7 @@ static inline void seccomp_assign_mode(s smp_mb__before_atomic(); /* Assume default seccomp processes want spec flaw mitigation. */ if ((flags & SECCOMP_FILTER_FLAG_SPEC_ALLOW) == 0) - spec_mitigate(task, PR_SPEC_STORE_BYPASS); + arch_seccomp_spec_mitigate(task); set_tsk_thread_flag(task, TIF_SECCOMP); }