]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/commit
bpf: prevent speculative execution in eBPF interpreter
authorElena Reshetova <elena.reshetova@intel.com>
Mon, 7 Aug 2017 08:10:28 +0000 (11:10 +0300)
committerKleber Sacilotto de Souza <kleber.souza@canonical.com>
Mon, 5 Feb 2018 15:45:35 +0000 (16:45 +0100)
commit81774d484f267526dd8aad449c9465b015e60e0c
tree975c0e1e03835a03b24ed234153c2e5909c6acfe
parent1fed0ab0bd69b5e142c36a1c67e9783c13236284
bpf: prevent speculative execution in eBPF interpreter

CVE-2017-5753 (Spectre v1 Intel)

This adds an observable speculation barrier before LD_IMM_DW and
LDX_MEM_B/H/W/DW eBPF instructions during eBPF program
execution in order to prevent speculative execution on out
of bound BFP_MAP array indexes. This way an arbitary kernel
memory is not exposed through side channel attacks.

Signed-off-by: Elena Reshetova <elena.reshetova@intel.com>
Signed-off-by: Andy Whitcroft <apw@canonical.com>
Signed-off-by: Kleber Sacilotto de Souza <kleber.souza@canonical.com>
kernel/bpf/core.c