APPLIED: [SRU][Xenial][PATCH 0/5] Prevent speculation on user controlled pointer (LP #1775137)
Khaled Elmously
khalid.elmously at canonical.com
Thu Jun 7 22:54:42 UTC 2018
Juerg
I applied this patchset to Xenial, but the bug also affects trusty.
Was this supposed to have been applied to Trusty too? Is there another patchset for trusty coming?
On 2018-06-07 18:06:42 , Khaled Elmously wrote:
> Applied to xenial
>
>
> On 2018-06-06 16:20:47 , Juerg Haefliger wrote:
> > BugLink: https://bugs.launchpad.net/bugs/1775137
> >
> > This patchset adds the missing Spectre v1 mitigation for speculating on user controlled pointers.
> >
> > == SRU Justification ==
> > Upstream's Spectre v1 mitigation prevents speculation on a user controlled pointer. This part of the Spectre v1 patchset was never backported to 4.4 (for unknown reasons) so Xenial/Trusty/Precise are lacking it as well. All the other stable upstream kernels include it, so add it to our older kernels.
> >
> > == Fix ==
> > Backport the following patches:
> > x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec
> > x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}
> > x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec
> >
> > == Regression Potential ==
> > Low. Patches have been in upstream (and other distro kernels) for quite a while now and the changes only introduce a barrier on copy_from_user operations.
> >
> > == Test Case ==
> > TBD.
> >
> > Signed-off-by: Juerg Haefliger <juergh at canonical.com>
> >
> >
> > Dan Williams (3):
> > x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec
> > x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}
> > x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec
> >
> > Linus Torvalds (2):
> > x86: reorganize SMAP handling in user space accesses
> > x86: fix SMAP in 32-bit environments
> >
> > arch/x86/include/asm/uaccess.h | 64 ++++++++++++++-------
> > arch/x86/include/asm/uaccess_32.h | 26 +++++++++
> > arch/x86/include/asm/uaccess_64.h | 94 ++++++++++++++++++++++---------
> > arch/x86/lib/usercopy_32.c | 20 +++----
> > 4 files changed, 147 insertions(+), 57 deletions(-)
> >
> > --
> > 2.17.1
> >
> >
> > --
> > kernel-team mailing list
> > kernel-team at lists.ubuntu.com
> > https://lists.ubuntu.com/mailman/listinfo/kernel-team
More information about the kernel-team
mailing list