diff options
author | Tony Luck <[email protected]> | 2020-05-28 16:13:54 -0400 |
---|---|---|
committer | Thomas Gleixner <[email protected]> | 2020-06-18 15:47:02 +0200 |
commit | 978e1342c3c4d7b20808fd5875d9ac0d57db22ee (patch) | |
tree | bc0fbfea5d488be22125def0ebfbc5517ede15d6 /scripts/gdb/linux/timerlist.py | |
parent | 005f141e5d5e05d3986539567d0bc5aa2f4dc640 (diff) |
x86/speculation/swapgs: Check FSGSBASE in enabling SWAPGS mitigation
Before enabling FSGSBASE the kernel could safely assume that the content
of GS base was a user address. Thus any speculative access as the result
of a mispredicted branch controlling the execution of SWAPGS would be to
a user address. So systems with speculation-proof SMAP did not need to
add additional LFENCE instructions to mitigate.
With FSGSBASE enabled a hostile user can set GS base to a kernel address.
So they can make the kernel speculatively access data they wish to leak
via a side channel. This means that SMAP provides no protection.
Add FSGSBASE as an additional condition to enable the fence-based SWAPGS
mitigation.
Signed-off-by: Tony Luck <[email protected]>
Signed-off-by: Chang S. Bae <[email protected]>
Signed-off-by: Sasha Levin <[email protected]>
Signed-off-by: Thomas Gleixner <[email protected]>
Link: https://lkml.kernel.org/r/[email protected]
Diffstat (limited to 'scripts/gdb/linux/timerlist.py')
0 files changed, 0 insertions, 0 deletions