Received: by 10.223.176.46 with SMTP id f43csp2646352wra; Mon, 22 Jan 2018 00:48:40 -0800 (PST) X-Google-Smtp-Source: AH8x224LXeV8aeyxTvmHOk1t8cLA2+iOqkljOHPDJiSahznUnW9jYuSt0pfu/3QqK4zxcHP95fvm X-Received: by 2002:a17:902:208:: with SMTP id 8-v6mr3029298plc.359.1516610920880; Mon, 22 Jan 2018 00:48:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516610920; cv=none; d=google.com; s=arc-20160816; b=HfX+b1YsmbSnWCwRtG1LPNef+F5hdA3xHBGexyii7MNpYn5fFhKMrgGiES/Vp2Csek e4VbW3pTyw6a+RoUQ0o7wEkKDCDOnq4ISNMwZFyy2n0jmjIGY/ic2ICWy2IIIOAgDbXB srCKDsq8nFuP5HJnKpLzQttu4/7W6o9iIBB4OUB/ELYQdLDhW1DESGlrkQmLThWfpwGG Vp42DwNT4Gm0MG+tcsFp+U5c9u449PWi5X47rYuDXflp1jRBMAgYmbrZvoWbd9ux3zQK ib2cPwBzLqHqSRqeTD8gbTIqcc5YQroITeL66EgjkqgU+FXdVFK0GOePLtlRM9C5XznD CMAA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=X6mSZANdaxXsB4//+YaCHUG8nmgucl3pAzmi2HVU4io=; b=Xm/rLpxakj2LnBO0dL/K3/R8m7EME5UCIVbnCBf9KuChW7KbIY5k21Zs5LrBP4Zlyx t7f9JKRGIQ8xsPUvZFoDrdJXsYnEgfdCs67I8qZeauGfRafIkxDHoVWrBn1fb84KsEn6 vWTlBm8Em+9zfRA3nm+br1hJtLydkEN97fxn7tF/zjXlre/W8oo+NJjEfEcBblH+ct0u Cl0Fsmd9rAfr8x3ac2SoXY2KS52fOyl09iXn4FRarmRMlQtg3dE3kE4zqoXfSCu1v4zd SgIzw5PsfSVBg9l8V2IdSp4TLfqVy1v85DdLGdWSGVuInoDzMhLcma7x8Io8nA6JZadl qljg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e62si13356708pfa.7.2018.01.22.00.48.26; Mon, 22 Jan 2018 00:48:40 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752033AbeAVIqv (ORCPT + 99 others); Mon, 22 Jan 2018 03:46:51 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:59010 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751859AbeAVImk (ORCPT ); Mon, 22 Jan 2018 03:42:40 -0500 Received: from localhost (LFbn-1-12258-90.w90-92.abo.wanadoo.fr [90.92.71.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id AFC54F33; Mon, 22 Jan 2018 08:42:39 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Thomas Gleixner , Borislav Petkov , David Woodhouse Subject: [PATCH 4.4 48/53] x86/mce: Make machine check speculation protected Date: Mon, 22 Jan 2018 09:40:40 +0100 Message-Id: <20180122083912.671352467@linuxfoundation.org> X-Mailer: git-send-email 2.16.0 In-Reply-To: <20180122083910.299610926@linuxfoundation.org> References: <20180122083910.299610926@linuxfoundation.org> User-Agent: quilt/0.65 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Thomas Gleixner commit 6f41c34d69eb005e7848716bbcafc979b35037d5 upstream. The machine check idtentry uses an indirect branch directly from the low level code. This evades the speculation protection. Replace it by a direct call into C code and issue the indirect call there so the compiler can apply the proper speculation protection. Signed-off-by: Thomas Gleixner Reviewed-by:Borislav Petkov Reviewed-by: David Woodhouse Niced-by: Peter Zijlstra Link: https://lkml.kernel.org/r/alpine.DEB.2.20.1801181626290.1847@nanos Signed-off-by: Greg Kroah-Hartman --- arch/x86/entry/entry_64.S | 2 +- arch/x86/include/asm/traps.h | 1 + arch/x86/kernel/cpu/mcheck/mce.c | 5 +++++ 3 files changed, 7 insertions(+), 1 deletion(-) --- a/arch/x86/entry/entry_64.S +++ b/arch/x86/entry/entry_64.S @@ -1031,7 +1031,7 @@ idtentry async_page_fault do_async_page_ #endif #ifdef CONFIG_X86_MCE -idtentry machine_check has_error_code=0 paranoid=1 do_sym=*machine_check_vector(%rip) +idtentry machine_check do_mce has_error_code=0 paranoid=1 #endif /* --- a/arch/x86/include/asm/traps.h +++ b/arch/x86/include/asm/traps.h @@ -92,6 +92,7 @@ dotraplinkage void do_simd_coprocessor_e #ifdef CONFIG_X86_32 dotraplinkage void do_iret_error(struct pt_regs *, long); #endif +dotraplinkage void do_mce(struct pt_regs *, long); static inline int get_si_code(unsigned long condition) { --- a/arch/x86/kernel/cpu/mcheck/mce.c +++ b/arch/x86/kernel/cpu/mcheck/mce.c @@ -1672,6 +1672,11 @@ static void unexpected_machine_check(str void (*machine_check_vector)(struct pt_regs *, long error_code) = unexpected_machine_check; +dotraplinkage void do_mce(struct pt_regs *regs, long error_code) +{ + machine_check_vector(regs, error_code); +} + /* * Called for each booted CPU to set up machine checks. * Must be called with preempt off: