diff options
author | Borislav Petkov (AMD) <bp@alien8.de> | 2023-08-05 00:06:43 +0200 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2023-08-09 16:55:00 +0200 |
commit | 77245f1c3c6495521f6a3af082696ee2f8ce3921 (patch) | |
tree | fca77ee5bfe3c557f190f201e39a82688f9ac9b4 /mm/memory.c | |
parent | Merge tag 'hardening-v6.5-rc6' of git://git.kernel.org/pub/scm/linux/kernel/g... (diff) | |
download | linux-77245f1c3c6495521f6a3af082696ee2f8ce3921.tar.xz linux-77245f1c3c6495521f6a3af082696ee2f8ce3921.zip |
x86/CPU/AMD: Do not leak quotient data after a division by 0
Under certain circumstances, an integer division by 0 which faults, can
leave stale quotient data from a previous division operation on Zen1
microarchitectures.
Do a dummy division 0/1 before returning from the #DE exception handler
in order to avoid any leaks of potentially sensitive data.
Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Cc: <stable@kernel.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'mm/memory.c')
0 files changed, 0 insertions, 0 deletions