Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp3357451imm; Fri, 24 Aug 2018 15:43:57 -0700 (PDT) X-Google-Smtp-Source: ANB0VdbuFyOpItykLZVfAMXHp8TPWsJQOEX1es71qZKmMxpBw3cbh8iDOvM9ppOcgrj3ksICDViF X-Received: by 2002:a17:902:3324:: with SMTP id a33-v6mr3329873plc.221.1535150637555; Fri, 24 Aug 2018 15:43:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535150637; cv=none; d=google.com; s=arc-20160816; b=a3BMbjeCtQQXHute8ZMjCj2tlyxbe52gi/MK9chzlOyxG6ExLfTmcp47Tts24qQKU+ dSBLXFxqggW7PPclaPF793PtLBtt3LeAaS8BOfqky981E4vW60C0QqV3/rSFQDPkFiG4 D6Y9lV1Zua3MJAu7jrP0VjOwx9qlAfu9Ya2tZD8/iRkKDz1Pbd12jxbyWxEsWOMKP6be FQi0T77z3GfJ1jUcXSrvfj5nwH30IrgjOyEWKrRjMjDl14PJIj/pZsJmm74OJp5IxiSt MMjDudo3j39jj4dzykPmTe+hhl5bUI1Rt5TBOMnQoEi/x+nY3yqLX/u0OSNTQENNNcp8 G8bw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:to:from:arc-authentication-results; bh=XxZ5bSU/s7vfNQ9oOYOXjfWMhRYufeQ3pD7eCwBeT4s=; b=k89h/LqZX4HO3eDpqTRfD1MTmt4hxAcbuqFFzJox9t1ePFw75xvvFt3/YR9f+vHnJU zOBo7N6j9f74kZQBWKmoGNDQYgW3rDZ4s2F9Jn0I3fOiTGTDngXmpnp2ZZ4IlWwH51DB vzbwLuBSWzSbwo39Be14DoXNoBeclM7WGqaoVGpHuragzW/AlznJOgRieKqSuu1F5130 p3n77hXCxMDiMWOZB/4T1PGAkOQ0LarRBgE3hQzCkcrgkQM0SHpHYDqc/oK05Hi7gHNz 7U13/vM0agVhrQ5dW/lLpGBzmkt07EG9GcTpOidCaH1f1If4sjpOO7FhFQslOLPWhYKr G38A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b8-v6si7005487plx.110.2018.08.24.15.43.28; Fri, 24 Aug 2018 15:43:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727780AbeHYCSJ (ORCPT + 99 others); Fri, 24 Aug 2018 22:18:09 -0400 Received: from mga06.intel.com ([134.134.136.31]:59921 "EHLO mga06.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727342AbeHYCSI (ORCPT ); Fri, 24 Aug 2018 22:18:08 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga104.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 24 Aug 2018 15:41:32 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.53,284,1531810800"; d="scan'208";a="84307214" Received: from cschaufl-mobl.amr.corp.intel.com ([10.254.2.129]) by fmsmga001.fm.intel.com with ESMTP; 24 Aug 2018 15:41:18 -0700 From: Casey Schaufler To: kernel-hardening@lists.openwall.com, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, selinux@tycho.nsa.gov, casey.schaufler@intel.com, dave.hansen@intel.com, deneen.t.dock@intel.com, kristen@linux.intel.com, arjan@linux.intel.com Subject: [PATCH v4 2/5] X86: Support LSM determination of side-channel Date: Fri, 24 Aug 2018 15:41:14 -0700 Message-Id: <20180824224117.3356-3-casey.schaufler@intel.com> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180824224117.3356-1-casey.schaufler@intel.com> References: <20180824224117.3356-1-casey.schaufler@intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When switching between tasks it may be necessary to set an indirect branch prediction barrier if the tasks are potentially vulnerable to side-channel attacks. This adds a call to security_task_safe_sidechannel so that security modules can weigh in on the decision. Signed-off-by: Casey Schaufler --- arch/x86/mm/tlb.c | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-) diff --git a/arch/x86/mm/tlb.c b/arch/x86/mm/tlb.c index 6eb1f34c3c85..8714d4af06aa 100644 --- a/arch/x86/mm/tlb.c +++ b/arch/x86/mm/tlb.c @@ -7,6 +7,7 @@ #include #include #include +#include #include #include @@ -270,11 +271,14 @@ void switch_mm_irqs_off(struct mm_struct *prev, struct mm_struct *next, * threads. It will also not flush if we switch to idle * thread and back to the same process. It will flush if we * switch to a different non-dumpable process. + * If a security module thinks that the transition + * is unsafe do the flush. */ - if (tsk && tsk->mm && - tsk->mm->context.ctx_id != last_ctx_id && - get_dumpable(tsk->mm) != SUID_DUMP_USER) - indirect_branch_prediction_barrier(); + if (tsk && tsk->mm && tsk->mm->context.ctx_id != last_ctx_id) { + if (get_dumpable(tsk->mm) != SUID_DUMP_USER || + security_task_safe_sidechannel(tsk) != 0) + indirect_branch_prediction_barrier(); + } if (IS_ENABLED(CONFIG_VMAP_STACK)) { /* -- 2.17.1