Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 7 Mar 2018 07:06:29 -0800
From: Greg KH <gregkh@...uxfoundation.org>
To: Jiri Slaby <jslaby@...e.cz>
Cc: stable@...r.kernel.org, Linus Torvalds <torvalds@...ux-foundation.org>,
	Dan Williams <dan.j.williams@...el.com>,
	Thomas Gleixner <tglx@...utronix.de>, linux-arch@...r.kernel.org,
	kernel-hardening@...ts.openwall.com,
	Andy Lutomirski <luto@...nel.org>, alan@...ux.intel.com,
	Jinpu Wang <jinpu.wang@...fitbricks.com>
Subject: Re: [PATCH v2 stable-4.4] x86/syscall: Sanitize syscall table
 de-references under speculation fix

On Wed, Mar 07, 2018 at 08:56:23AM +0100, Jiri Slaby wrote:
> In 4.4.118, we have commit c8961332d6da (x86/syscall: Sanitize syscall
> table de-references under speculation), which is a backport of upstream
> commit 2fbd7af5af86. But it fixed only the C part of the upstream patch
> -- the IA32 sysentry. So it ommitted completely the assembly part -- the
> 64bit sysentry.
> 
> Fix that in this patch by explicit array_index_mask_nospec written in
> assembly. The same was used in lib/getuser.S.

<snip>

Thanks for the patch, now queued up.

greg k-h

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.