]> www.infradead.org Git - users/jedix/linux-maple.git/commit
bpf: prevent speculative execution in eBPF interpreter
authorElena Reshetova <elena.reshetova@intel.com>
Thu, 4 Jan 2018 08:05:42 +0000 (00:05 -0800)
committerKirtikar Kashyap <kirtikar.kashyap@oracle.com>
Fri, 12 Jan 2018 18:20:00 +0000 (10:20 -0800)
commit7b348358b7b8dc968e309300a2218f8a39432454
treed51425418fa217a556e4093e7120b4ea414e719e
parent99ee27dc0c92b950dbf5dd1ac1c8e8f3647a8e1a
bpf: prevent speculative execution in eBPF interpreter

This adds an observable speculation barrier before LD_IMM_DW and
LDX_MEM_B/H/W/DW eBPF instructions during eBPF program
execution in order to prevent speculative execution on out
of bound BFP_MAP array indexes. This way an arbitary kernel
memory is not exposed through side channel attacks.

Signed-off-by: Elena Reshetova <elena.reshetova@intel.com>
Orabug: 27340445
CVE: CVE-2017-5753

Signed-off-by: Chuck Anderson <chuck.anderson@oracle.com>
Conflicts:
kernel/bpf/core.c code base differences

Reviewed-by: John Haxby <john.haxby@oracle.com>
Signed-off-by: Kirtikar Kashyap <kirtikar.kashyap@oracle.com>
kernel/bpf/core.c