]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/commit
x86/entry/64: Clear registers for exceptions/interrupts, to reduce speculation attack...
authorDan Williams <dan.j.williams@intel.com>
Tue, 6 Feb 2018 01:18:11 +0000 (17:18 -0800)
committerSeth Forshee <seth.forshee@canonical.com>
Fri, 23 Feb 2018 14:26:54 +0000 (08:26 -0600)
commitdf25c2800cc3dd72a4f35fe7e5a58e1fa05560f3
treef696130d5af518f94126e22a423df677df3c1c0a
parent64e865a2e6de147a394a0871a6f6bc63cd15a5a1
x86/entry/64: Clear registers for exceptions/interrupts, to reduce speculation attack surface

BugLink: http://bugs.launchpad.net/bugs/1751131
commit 3ac6d8c787b835b997eb23e43e09aa0895ef7d58 upstream.

Clear the 'extra' registers on entering the 64-bit kernel for exceptions
and interrupts. The common registers are not cleared since they are
likely clobbered well before they can be exploited in a speculative
execution attack.

Originally-From: Andi Kleen <ak@linux.intel.com>
Signed-off-by: Dan Williams <dan.j.williams@intel.com>
Cc: <stable@vger.kernel.org>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Brian Gerst <brgerst@gmail.com>
Cc: Denys Vlasenko <dvlasenk@redhat.com>
Cc: H. Peter Anvin <hpa@zytor.com>
Cc: Josh Poimboeuf <jpoimboe@redhat.com>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Link: http://lkml.kernel.org/r/151787989146.7847.15749181712358213254.stgit@dwillia2-desk3.amr.corp.intel.com
[ Made small improvements to the changelog and the code comments. ]
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
arch/x86/entry/calling.h
arch/x86/entry/entry_64.S