]> www.infradead.org Git - users/jedix/linux-maple.git/commit
x86/entry/64: Dont use IST entry for #BP stack
authorAndy Lutomirski <luto@kernel.org>
Tue, 27 Mar 2018 16:28:03 +0000 (18:28 +0200)
committerBrian Maly <brian.maly@oracle.com>
Wed, 2 May 2018 19:27:17 +0000 (15:27 -0400)
commitb774d7a4e0fdfc06d3d4f5799792e459210ae33c
treee36a692a3066b371f9099571f3d72ff97effe300
parente2b8e0d2298f1d31f60ba77d081fc6a233bc929b
x86/entry/64: Dont use IST entry for #BP stack

There's nothing IST-worthy about #BP/int3.  We don't allow kprobes
in the small handful of places in the kernel that run at CPL0 with
an invalid stack, and 32-bit kernels have used normal interrupt
gates for #BP forever.

Furthermore, we don't allow kprobes in places that have usergs while
in kernel mode, so "paranoid" is also unnecessary.

OraBug: 27895315
CVE: CVE-2018-8897

Signed-off-by: Andy Lutomirski <luto@kernel.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Cc: stable@vger.kernel.org
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
(cherry picked from commit d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9)

Reviewed-by: Boris Ostrovsky <boris.ostrovsky@oracle.com>
Signed-off-by: Mihai Carabas <mihai.carabas@oracle.com>
Signed-off-by: Brian Maly <brian.maly@oracle.com>
arch/x86/kernel/entry_64.S
arch/x86/kernel/traps.c