Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp1275934imm; Fri, 17 Aug 2018 15:18:46 -0700 (PDT) X-Google-Smtp-Source: AA+uWPyT2EaezWYqGYB7S6xzs7taTeSOZVfrKd6maTQVh8g/jnDZPROWW5XIyoMNFWUt2DriyI4d X-Received: by 2002:a17:902:5981:: with SMTP id p1-v6mr1814286pli.333.1534544326780; Fri, 17 Aug 2018 15:18:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534544326; cv=none; d=google.com; s=arc-20160816; b=JxYO5hJcmeXOROv1AobxGe5p2G1AHHvR60caTFbe7ZHD0eCnw6AVZ/TSv4QxqhQ59c +vnpl/jjUNP1VTFgzBHU4F5xhxNXXWQthsj9deySa0vIvIsxiGxoKmqXaeYjJq2+Q2ck kA4ihpl0Kws5mPRnSOnnuYcKVfxYptZCiucUAmhdbGzLxigsdQ6TJOeTZF7sCEDfzj6C 0bUqN/IMXYdF6Dp+92FmvzBpnnPaYnkw2lEDLhzbwJYcgzk7H+S4ZquBo558QHmfWSvu Kv0JwURkpf8qHXwHYYPCeJ+YwKMXpHLCuV481N2aoxrGfB9tdqyd4+EhaqyHtxDH/1fZ udhw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:to:from:arc-authentication-results; bh=nbA2cNjFghISXNuTlCr6BEWSsmUSO7l3eNvhPOjjO4I=; b=HKbYtJjydIRUp3o1tAf1GJ/galCHCX9fG/3fJSx03j7dRVj+DQ8tNMBsaj5rLl8djU zKdDEXOC5lZ3ME20TQdfpG5hP/r+rBDZk3SMwI9eAXFWq9JvZ7+SPmStpk9HgZwwlk9T rJUuYyC6yhbusm+rMnKgPt+YyuNlm9cDo5U0Ah3WC5eVQn2L8NURiA7BNPU4qRnM63vn P4axTSSeGf+EFXN/fMBxRxkWFIh+5wjHrpLcben8OKpda5PGX4DykHzjVhmjfhZxeeCp IukiIy0mgnSAJWIw17KgY34s+5XPKF4gjnl2NU+zzNd8lIP/7SxW9gER21HKY1/G5NAY /ZPg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p13-v6si3137596pgk.344.2018.08.17.15.18.17; Fri, 17 Aug 2018 15:18:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728329AbeHRBV4 (ORCPT + 99 others); Fri, 17 Aug 2018 21:21:56 -0400 Received: from mga11.intel.com ([192.55.52.93]:58247 "EHLO mga11.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726215AbeHRBVe (ORCPT ); Fri, 17 Aug 2018 21:21:34 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga006.jf.intel.com ([10.7.209.51]) by fmsmga102.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 17 Aug 2018 15:16:26 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.53,253,1531810800"; d="scan'208";a="67079619" Received: from cschaufl-mobl.amr.corp.intel.com ([10.254.9.75]) by orsmga006.jf.intel.com with ESMTP; 17 Aug 2018 15:16:25 -0700 From: Casey Schaufler To: kernel-hardening@lists.openwall.com, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, selinux@tycho.nsa.gov, casey.schaufler@intel.com, dave.hansen@intel.com, deneen.t.dock@intel.com, kristen@linux.intel.com, arjan@linux.intel.com Subject: [PATCH RFC v2 2/5] X86: Support LSM determination of side-channel vulnerability Date: Fri, 17 Aug 2018 15:16:21 -0700 Message-Id: <20180817221624.10232-3-casey.schaufler@intel.com> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180817221624.10232-1-casey.schaufler@intel.com> References: <20180817221624.10232-1-casey.schaufler@intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Casey Schaufler When switching between tasks it may be necessary to set an indirect branch prediction barrier if the tasks are potentially vulnerable to side-channel attacks. This adds a call to security_task_safe_sidechannel so that security modules can weigh in on the decision. Signed-off-by: Casey Schaufler --- arch/x86/mm/tlb.c | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-) diff --git a/arch/x86/mm/tlb.c b/arch/x86/mm/tlb.c index 6eb1f34c3c85..8714d4af06aa 100644 --- a/arch/x86/mm/tlb.c +++ b/arch/x86/mm/tlb.c @@ -7,6 +7,7 @@ #include #include #include +#include #include #include @@ -270,11 +271,14 @@ void switch_mm_irqs_off(struct mm_struct *prev, struct mm_struct *next, * threads. It will also not flush if we switch to idle * thread and back to the same process. It will flush if we * switch to a different non-dumpable process. + * If a security module thinks that the transition + * is unsafe do the flush. */ - if (tsk && tsk->mm && - tsk->mm->context.ctx_id != last_ctx_id && - get_dumpable(tsk->mm) != SUID_DUMP_USER) - indirect_branch_prediction_barrier(); + if (tsk && tsk->mm && tsk->mm->context.ctx_id != last_ctx_id) { + if (get_dumpable(tsk->mm) != SUID_DUMP_USER || + security_task_safe_sidechannel(tsk) != 0) + indirect_branch_prediction_barrier(); + } if (IS_ENABLED(CONFIG_VMAP_STACK)) { /* -- 2.17.1