Re: [PATCH 4.4 178/193] x86/syscall: Sanitize syscall table de-references under speculation

2018-03-06 Thread Jinpu Wang
On Tue, Mar 6, 2018 at 3:21 PM, Jiri Slaby wrote: > On 02/23/2018, 07:26 PM, Greg Kroah-Hartman wrote: >> 4.4-stable review patch. If anyone has any objections, please let me know. >> >> -- >> >> From: Dan Williams >> >> (cherry picked from commit 2fbd7af5af8665d18bcefae3e9700be0

Re: [PATCH 4.4 178/193] x86/syscall: Sanitize syscall table de-references under speculation

2018-03-06 Thread Jiri Slaby
On 03/06/2018, 03:21 PM, Jiri Slaby wrote: > On 02/23/2018, 07:26 PM, Greg Kroah-Hartman wrote: >> 4.4-stable review patch. If anyone has any objections, please let me know. >> >> -- >> >> From: Dan Williams >> >> (cherry picked from commit 2fbd7af5af8665d18bcefae3e9700be07e22b681

Re: [PATCH 4.4 178/193] x86/syscall: Sanitize syscall table de-references under speculation

2018-03-06 Thread Jiri Slaby
On 02/23/2018, 07:26 PM, Greg Kroah-Hartman wrote: > 4.4-stable review patch. If anyone has any objections, please let me know. > > -- > > From: Dan Williams > > (cherry picked from commit 2fbd7af5af8665d18bcefae3e9700be07e22b681) > > The syscall table base is a user controlle

[PATCH 4.4 178/193] x86/syscall: Sanitize syscall table de-references under speculation

2018-02-23 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Dan Williams (cherry picked from commit 2fbd7af5af8665d18bcefae3e9700be07e22b681) The syscall table base is a user controlled function pointer in kernel space. Use array_index_nospec() to preve