Received: by 10.223.176.46 with SMTP id f43csp2677194wra; Mon, 22 Jan 2018 01:24:23 -0800 (PST) X-Google-Smtp-Source: AH8x226/okv/ZXfDJpddzySEbz9wknZoBvBKMvg0GQa59kU5J23AuBm3KPqdZYj+Ylobm2dVNcHO X-Received: by 10.101.90.202 with SMTP id d10mr6718192pgt.366.1516613063594; Mon, 22 Jan 2018 01:24:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516613063; cv=none; d=google.com; s=arc-20160816; b=Y9TIuPRfW5DQ5bsQEWO2WpCbvEzBSEG0yIYlFeMM6+xBvp2FOnGRSg4lwWZFqxLvFq CJpHfW4qcTT1dLPQU+Y27ykZP4tfqYkSMCGP06Xob353SHDkXKexV2gSlEG9vFaoNx3y Xh/sVjLfj7heT5Mk2CbDQrHQ94ww+WAKK6vRTXWUcA7RzGZWSH+JvWj+ot8ZG71F8x2T sUFulMWOHpyLWWCkqK2676JX1ARTj3E55c9TtPRhnyX5AAQFKSrZ0XNxU+DOmoUNqGEx AXFxdscCO6j1IBP48aoZrk4SPVYhBvKXG6cY5PrDFe9W84luts3BhR4F9lI6dViJhlfn gVzg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=nG22sAlFXCSFfEm/x6RThKrvobvD6FoLRxlwG5T/A9M=; b=kROJSgwO1J2KpsH2a7FtmhRl+viqW9V3u+p264zkMU95G2hTMrh/xLvbT0L1FHFDjz oKYrZFjlc0UJm7kiP8gYP3sqH+s/j7dsw/76KUeqpHpe4tkWHLNgdeLQd+1AGVlE/e+6 +PNk6ORMWDg6hVZ2FU7BLO7Bz9Yb+n6YS2pWHlBjmgoAvcWV7RXQSAYiIaQxFQ9WceU/ QJa8ur5z8fe07f9CSQ6LXn7dJ1C72z2dNH9Qm8LksWSQkv0lHHiuFWNswRGJhBlEwnWL 5VT0WbyCJymDg48xJp7Fl9xpiAUBfn/X+8x3+2ciffPqncKQFkU3nsCp/TvpiK1/bo3p IRTQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l7si13455003pgs.316.2018.01.22.01.24.09; Mon, 22 Jan 2018 01:24:23 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752033AbeAVJXO (ORCPT + 99 others); Mon, 22 Jan 2018 04:23:14 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:60642 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752511AbeAVItR (ORCPT ); Mon, 22 Jan 2018 03:49:17 -0500 Received: from localhost (LFbn-1-12258-90.w90-92.abo.wanadoo.fr [90.92.71.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id D783BE9A; Mon, 22 Jan 2018 08:49:16 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Thomas Gleixner , Borislav Petkov , David Woodhouse Subject: [PATCH 4.9 42/47] x86/mce: Make machine check speculation protected Date: Mon, 22 Jan 2018 09:45:53 +0100 Message-Id: <20180122083928.690784525@linuxfoundation.org> X-Mailer: git-send-email 2.16.0 In-Reply-To: <20180122083925.568134913@linuxfoundation.org> References: <20180122083925.568134913@linuxfoundation.org> User-Agent: quilt/0.65 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Thomas Gleixner commit 6f41c34d69eb005e7848716bbcafc979b35037d5 upstream. The machine check idtentry uses an indirect branch directly from the low level code. This evades the speculation protection. Replace it by a direct call into C code and issue the indirect call there so the compiler can apply the proper speculation protection. Signed-off-by: Thomas Gleixner Reviewed-by:Borislav Petkov Reviewed-by: David Woodhouse Niced-by: Peter Zijlstra Link: https://lkml.kernel.org/r/alpine.DEB.2.20.1801181626290.1847@nanos Signed-off-by: Greg Kroah-Hartman --- arch/x86/entry/entry_64.S | 2 +- arch/x86/include/asm/traps.h | 1 + arch/x86/kernel/cpu/mcheck/mce.c | 5 +++++ 3 files changed, 7 insertions(+), 1 deletion(-) --- a/arch/x86/entry/entry_64.S +++ b/arch/x86/entry/entry_64.S @@ -1064,7 +1064,7 @@ idtentry async_page_fault do_async_page_ #endif #ifdef CONFIG_X86_MCE -idtentry machine_check has_error_code=0 paranoid=1 do_sym=*machine_check_vector(%rip) +idtentry machine_check do_mce has_error_code=0 paranoid=1 #endif /* --- a/arch/x86/include/asm/traps.h +++ b/arch/x86/include/asm/traps.h @@ -92,6 +92,7 @@ dotraplinkage void do_simd_coprocessor_e #ifdef CONFIG_X86_32 dotraplinkage void do_iret_error(struct pt_regs *, long); #endif +dotraplinkage void do_mce(struct pt_regs *, long); static inline int get_si_code(unsigned long condition) { --- a/arch/x86/kernel/cpu/mcheck/mce.c +++ b/arch/x86/kernel/cpu/mcheck/mce.c @@ -1754,6 +1754,11 @@ static void unexpected_machine_check(str void (*machine_check_vector)(struct pt_regs *, long error_code) = unexpected_machine_check; +dotraplinkage void do_mce(struct pt_regs *regs, long error_code) +{ + machine_check_vector(regs, error_code); +} + /* * Called for each booted CPU to set up machine checks. * Must be called with preempt off: