1. 29 7月, 2006 2 次提交
    • A
      [PATCH] x86_64: Don't clobber r8-r11 in int 0x80 handler · 0e92da4a
      Andi Kleen 提交于
      When int 0x80 is called from long mode r8-r11 would leak out of the
      kernel (or rather they would be filled with some values from
      the kernel stack). I don't think it's a security issue because
      the values come from the fixed stack frame which should be near
      always user registers from a previous interrupt.
      
      Still better fix it.
      
      Longer term the register save macros need to be cleaned up
      to avoid such mistakes in the future.
      
      Original analysis from Richard Brunner, fix by me.
      
      Cc: Richard.Brunner@amd.com
      Signed-off-by: NAndi Kleen <ak@suse.de>
      Signed-off-by: NLinus Torvalds <torvalds@osdl.org>
      0e92da4a
    • A
      [PATCH] i386/x86-64: Add user_mode checks to profile_pc for oprofile · d5a26017
      Andi Kleen 提交于
      Fixes a obscure user space triggerable crash during oprofiling.
      
      Oprofile calls profile_pc from NMIs even when user_mode(regs) is not true and
      the program counter is inside the kernel lock section. This opens
      a race - when a user program jumps to a kernel lock address and
      a NMI happens before the illegal page fault exception is raised
      and the program has a unmapped esp or ebp then the kernel could
      oops. NMIs have a higher priority than exceptions so that could
      happen.
      
      Add user_mode checks to i386/x86-64 profile_pc to prevent that.
      
      Cc: John Levon <levon@movementarian.org>
      Signed-off-by: NAndi Kleen <ak@suse.de>
      Signed-off-by: NLinus Torvalds <torvalds@osdl.org>
      d5a26017
  2. 11 7月, 2006 9 次提交
  3. 04 7月, 2006 10 次提交
  4. 03 7月, 2006 1 次提交
  5. 02 7月, 2006 1 次提交
  6. 01 7月, 2006 3 次提交
  7. 30 6月, 2006 6 次提交
  8. 29 6月, 2006 2 次提交
  9. 28 6月, 2006 6 次提交