Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp4478131imm; Mon, 20 Aug 2018 17:07:02 -0700 (PDT) X-Google-Smtp-Source: AA+uWPwBYrXPhXQ91BbCP/s7L8LpimwFYzaeDngpCk0WkgMD84whbsOTOr8LiqmZ/dC0DXY9SKWx X-Received: by 2002:a62:15c8:: with SMTP id 191-v6mr50421505pfv.194.1534810022359; Mon, 20 Aug 2018 17:07:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534810022; cv=none; d=google.com; s=arc-20160816; b=vl4Y/r+t8E/o/O4ZUpvMGUWER1vbrVQDwCM7SDJsegjBCGRboN7O3H1ysZwqRCNIiO nQrLr+HiTfLeyNs1VmsJOs+2KBktp+oaQXFleH35BskpVYBOpeZuhAYgIz3g4/Pa8KIx 89dzWlXq9cuNVqAjcOEzjjQFOQ/5q450loL3O9MIILlENsS/R5IkYMHCZaf5aG9XFmct +z4XpP/l4uiz+jgSaC1bm94rj80K3n2A7kjRedOukzNOPGXZtoBugv+2pEzhUeS6nc2R LGvD2gkGOY0sHfG3TXk2NpVPMaz3TGFM2uWKCpMF7cZpQPVu5qu/xR0PT29LvE+EJZs8 Zb3Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:to:from:arc-authentication-results; bh=XxZ5bSU/s7vfNQ9oOYOXjfWMhRYufeQ3pD7eCwBeT4s=; b=uh/g3GkctvDQrqsoZwBwLv1aOuNYM6E0JsycfkfIDX/yjMkaS7EmVzGyeoEsY0mPwX ir+JOMO7lW2pSH+7Tx0UwcSFOSlYZoAmTHgZmReX9WxZhvKtQgHn41/0Bq90Xtxm/qhD MKrJdCx2hg03t12KOPJC0PHkG1cbbZMzTqD8zMFIKNWrR4QQaU1dlALk1C2VCsUUy7xL ph87k2aHEVEDvvFnAY5LeeYeN38KywWbncdAlAiIUQ5M5hgy4CJwEVFFJJjZ3GMGukpn ObPkW0gUCVGA08vvL+0zUOOGaMm1h4w8e2tzuZgXVWSPmu7vVMsujvgaSEE0lKtHQUdv MgYQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e34-v6si11759434plb.2.2018.08.20.17.06.34; Mon, 20 Aug 2018 17:07:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726914AbeHUDWc (ORCPT + 99 others); Mon, 20 Aug 2018 23:22:32 -0400 Received: from mga06.intel.com ([134.134.136.31]:10086 "EHLO mga06.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726862AbeHUDWb (ORCPT ); Mon, 20 Aug 2018 23:22:31 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga005.jf.intel.com ([10.7.209.41]) by orsmga104.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 20 Aug 2018 17:04:46 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.53,267,1531810800"; d="scan'208";a="250527768" Received: from cschaufl-mobl.amr.corp.intel.com ([10.252.136.122]) by orsmga005.jf.intel.com with ESMTP; 20 Aug 2018 17:04:46 -0700 From: Casey Schaufler To: kernel-hardening@lists.openwall.com, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, selinux@tycho.nsa.gov, casey.schaufler@intel.com, dave.hansen@intel.com, deneen.t.dock@intel.com, kristen@linux.intel.com, arjan@linux.intel.com Subject: [PATCH v3 2/5] X86: Support LSM determination of side-channel Date: Mon, 20 Aug 2018 17:04:41 -0700 Message-Id: <20180821000444.7004-3-casey.schaufler@intel.com> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180821000444.7004-1-casey.schaufler@intel.com> References: <20180821000444.7004-1-casey.schaufler@intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When switching between tasks it may be necessary to set an indirect branch prediction barrier if the tasks are potentially vulnerable to side-channel attacks. This adds a call to security_task_safe_sidechannel so that security modules can weigh in on the decision. Signed-off-by: Casey Schaufler --- arch/x86/mm/tlb.c | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-) diff --git a/arch/x86/mm/tlb.c b/arch/x86/mm/tlb.c index 6eb1f34c3c85..8714d4af06aa 100644 --- a/arch/x86/mm/tlb.c +++ b/arch/x86/mm/tlb.c @@ -7,6 +7,7 @@ #include #include #include +#include #include #include @@ -270,11 +271,14 @@ void switch_mm_irqs_off(struct mm_struct *prev, struct mm_struct *next, * threads. It will also not flush if we switch to idle * thread and back to the same process. It will flush if we * switch to a different non-dumpable process. + * If a security module thinks that the transition + * is unsafe do the flush. */ - if (tsk && tsk->mm && - tsk->mm->context.ctx_id != last_ctx_id && - get_dumpable(tsk->mm) != SUID_DUMP_USER) - indirect_branch_prediction_barrier(); + if (tsk && tsk->mm && tsk->mm->context.ctx_id != last_ctx_id) { + if (get_dumpable(tsk->mm) != SUID_DUMP_USER || + security_task_safe_sidechannel(tsk) != 0) + indirect_branch_prediction_barrier(); + } if (IS_ENABLED(CONFIG_VMAP_STACK)) { /* -- 2.17.1