From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S969989AbeEXMTX (ORCPT ); Thu, 24 May 2018 08:19:23 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:43148 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S966242AbeEXMTS (ORCPT ); Thu, 24 May 2018 08:19:18 -0400 Date: Thu, 24 May 2018 13:19:45 +0100 From: Will Deacon To: Marc Zyngier Cc: Mark Rutland , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kvmarm@lists.cs.columbia.edu, Kees Cook , Catalin Marinas , Andy Lutomirski , Greg Kroah-Hartman , Thomas Gleixner Subject: Re: [PATCH 09/14] arm64: ssbd: Introduce thread flag to control userspace mitigation Message-ID: <20180524121944.GC8689@arm.com> References: <20180522150648.28297-1-marc.zyngier@arm.com> <20180522150648.28297-10-marc.zyngier@arm.com> <20180524120121.pjdw7qaybcsbf4fl@lakrids.cambridge.arm.com> <833776ac-2b8c-b0f7-dcff-9c55afd67c65@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <833776ac-2b8c-b0f7-dcff-9c55afd67c65@arm.com> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, May 24, 2018 at 01:16:38PM +0100, Marc Zyngier wrote: > On 24/05/18 13:01, Mark Rutland wrote: > > On Tue, May 22, 2018 at 04:06:43PM +0100, Marc Zyngier wrote: > >> In order to allow userspace to be mitigated on demand, let's > >> introduce a new thread flag that prevents the mitigation from > >> being turned off when exiting to userspace, and doesn't turn > >> it on on entry into the kernel (with the assumtion that the > > > > Nit: s/assumtion/assumption/ > > > >> mitigation is always enabled in the kernel itself). > >> > >> This will be used by a prctl interface introduced in a later > >> patch. > >> > >> Signed-off-by: Marc Zyngier > > > > On the assumption that this flag cannot be flipped while a task is in > > userspace: > > Well, that's the case unless you get into the seccomp thing, which does > change TIF_SSBD on all threads of the task, without taking it to the > kernel first. That nicely breaks the state machine, and you end-up > running non-mitigated in the kernel. Oops. > > I have a couple of patches fixing that, using a second flag > (TIF_SSBD_PENDING) that gets turned into the real thing on exit to > userspace. It's pretty ugly though. ... which introduces the need for atomics on the entry path too :( I would /much/ rather kill the seccomp implicit enabling of the mitigation, or at least have a way to opt-out per arch since it doesn't seem to be technically justified imo. Will