You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
jira VULN-8044
cve CVE-2023-0597
commit-author Peter Zijlstra <[email protected]>
commit 97e3d26
upstream-diff Included `linux/prandom.h' in
`arch/x86/mm/cpu_entry_area.c' directly (compilation fails without it)
Seth found that the CPU-entry-area; the piece of per-cpu data that is
mapped into the userspace page-tables for kPTI is not subject to any
randomization -- irrespective of kASLR settings.
On x86_64 a whole P4D (512 GB) of virtual address space is reserved for
this structure, which is plenty large enough to randomize things a
little.
As such, use a straight forward randomization scheme that avoids
duplicates to spread the existing CPUs over the available space.
[ bp: Fix le build. ]
Reported-by: Seth Jenkins <[email protected]>
Reviewed-by: Kees Cook <[email protected]>
Signed-off-by: Peter Zijlstra (Intel) <[email protected]>
Signed-off-by: Dave Hansen <[email protected]>
Signed-off-by: Borislav Petkov <[email protected]>
(cherry picked from commit 97e3d26)
Signed-off-by: Marcin Wcisło <[email protected]>
0 commit comments