> -----Original Message-----
> From: Jiri Kosina [mailto:[email protected]]
> Sent: Monday, September 10, 2018 12:14 PM
> To: Schaufler, Casey <[email protected]>
> Cc: Thomas Gleixner <[email protected]>; Ingo Molnar <[email protected]>;
> Peter Zijlstra <[email protected]>; Josh Poimboeuf
> <[email protected]>; Andrea Arcangeli <[email protected]>;
> Woodhouse, David <[email protected]>; Andi Kleen <[email protected]>;
> Tim Chen <[email protected]>; [email protected];
> [email protected]
> Subject: RE: [PATCH v5 1/2] x86/speculation: apply IBPB more strictly to avoid
> cross-process data leak
> 
> On Mon, 10 Sep 2018, Schaufler, Casey wrote:
> 
> > Why are you dropping the LSM check here, when in v4 you fixed the
> > SELinux audit locking issue? We can avoid introducing an LSM hook
> > and all the baggage around it if you can do the
> security_ptrace_access_check()
> > here.
> 
> So what guarantees that none of the hooks that
> security_ptrace_access_check() is invoking will not be taking locks (from
> scheduler context in this case)?

The locking issue in the security modules is the same regardless of
whether the call of security_ptrace_access_check() comes from the
__ptrace_access_check() you're adding here or from a new security
hook (I have proposed security_task_safe_sidechannel) that gets added
in the same place later on. Adding a new hook results in duplication,
because there now has to be code that does exactly the same thing as
__ptrace_access_check() but without the new NOACCESS_CHECK mode.

Yes, It would require that this patch be tested against all the existing
security modules that provide a ptrace_access_check hook. It's not like
the security module writers don't have a bunch of locking issues to deal with. 

> Thanks,
> 
> --
> Jiri Kosina
> SUSE Labs

Reply via email to