https://github.com/torvalds/linux
Revision f7d07951498f622d401492318a1045b92e2840df authored by Dan Williams on 30 January 2018, 01:03:21 UTC, committed by Seth Forshee on 08 February 2018, 03:08:35 UTC
BugLink: http://bugs.launchpad.net/bugs/1748072

commit edfbae53dab8348fca778531be9f4855d2ca0360

Reflect the presence of get_user(), __get_user(), and 'syscall' protections
in sysfs. The expectation is that new and better tooling will allow the
kernel to grow more usages of array_index_nospec(), for now, only claim
mitigation for __user pointer de-references.

Reported-by: Jiri Slaby <jslaby@suse.cz>
Signed-off-by: Dan Williams <dan.j.williams@intel.com>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Cc: linux-arch@vger.kernel.org
Cc: kernel-hardening@lists.openwall.com
Cc: gregkh@linuxfoundation.org
Cc: torvalds@linux-foundation.org
Cc: alan@linux.intel.com
Link: https://lkml.kernel.org/r/151727420158.33451.11658324346540434635.stgit@dwillia2-desk3.amr.corp.intel.com
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
1 parent c7cb043
History
Tip revision: f7d07951498f622d401492318a1045b92e2840df authored by Dan Williams on 30 January 2018, 01:03:21 UTC
x86/spectre: Report get_user mitigation for spectre_v1
Tip revision: f7d0795
File Mode Size
Makefile -rw-r--r-- 361 bytes
compat.c -rw-r--r-- 2.2 KB
ipc_sysctl.c -rw-r--r-- 5.4 KB
mq_sysctl.c -rw-r--r-- 2.9 KB
mqueue.c -rw-r--r-- 40.1 KB
msg.c -rw-r--r-- 27.4 KB
msgutil.c -rw-r--r-- 3.6 KB
namespace.c -rw-r--r-- 4.8 KB
sem.c -rw-r--r-- 58.1 KB
shm.c -rw-r--r-- 38.6 KB
syscall.c -rw-r--r-- 4.3 KB
util.c -rw-r--r-- 22.2 KB
util.h -rw-r--r-- 7.2 KB

back to top