Re: [PATCH] x86/mce: Make machine check speculation protected
From: Woodhouse, David
Date: Fri Jan 19 2018 - 03:48:56 EST
On Thu, 2018-01-18 at 16:28 +0100, Thomas Gleixner wrote:
> The machine check idtentry uses an indirect branch directly from the low
> level code. This evades the speculation protection.
>
> Replace it by a direct call into C code and issue the indirect call there
> so the compiler can apply the proper speculation protection.
>
> Signed-off-by: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
Cc: stable for at least 4.9.
> ---
> Âarch/x86/entry/entry_64.SÂÂÂÂÂÂÂÂ|ÂÂÂÂ2 +-
> Âarch/x86/include/asm/traps.hÂÂÂÂÂ|ÂÂÂÂ1 +
> Âarch/x86/kernel/cpu/mcheck/mce.c |ÂÂÂÂ5 +++++
> Â3 files changed, 7 insertions(+), 1 deletion(-)
>
> --- a/arch/x86/entry/entry_64.S
> +++ b/arch/x86/entry/entry_64.S
> @@ -1264,7 +1264,7 @@ idtentry async_page_fault do_async_page_
> Â#endif
> Â
> Â#ifdef CONFIG_X86_MCE
> -idtentry machine_check has_error_code=0 paranoid=1 do_sym=*machine_check_vector(%rip)
> +idtentry machine_check do_mce has_error_code=0 paranoid=1
> Â#endif
> Â
> Â/*
> --- a/arch/x86/include/asm/traps.h
> +++ b/arch/x86/include/asm/traps.h
> @@ -88,6 +88,7 @@ dotraplinkage void do_simd_coprocessor_e
> Â#ifdef CONFIG_X86_32
> Âdotraplinkage void do_iret_error(struct pt_regs *, long);
> Â#endif
> +dotraplinkage void do_mce(struct pt_regs *, long);
> Â
> Âstatic inline int get_si_code(unsigned long condition)
> Â{
> --- a/arch/x86/kernel/cpu/mcheck/mce.c
> +++ b/arch/x86/kernel/cpu/mcheck/mce.c
> @@ -1785,6 +1785,11 @@ static void unexpected_machine_check(str
> Âvoid (*machine_check_vector)(struct pt_regs *, long error_code) =
> Â unexpected_machine_check;
> Â
> +dotraplinkage void do_mce(struct pt_regs *regs, long error_code)
> +{
> + machine_check_vector(regs, error_code);
> +}
> +
> Â/*
> Â * Called for each booted CPU to set up machine checks.
> Â * Must be called with preempt off:
> Attachment:
smime.p7s
Description: S/MIME cryptographic signature