Commit ce20b028 authored by Elena Reshetova's avatar Elena Reshetova Committed by Kleber Sacilotto de Souza

Thermal/int340x: prevent speculative execution

CVE-2017-5753 (Spectre v1 Intel)

Since the trip value in function int340x_thermal_get_trip_temp()
seems to be controllable by userspace and later on
conditionally (upon bound check) used to resolve
d->aux_trips, insert an observable speculation
barrier before its usage. This should prevent
observable speculation on that branch and avoid
kernel memory leak.
Signed-off-by: default avatarElena Reshetova <elena.reshetova@intel.com>
Signed-off-by: default avatarAndy Whitcroft <apw@canonical.com>
Signed-off-by: default avatarKleber Sacilotto de Souza <kleber.souza@canonical.com>
parent 7895a746
......@@ -57,15 +57,16 @@ static int int340x_thermal_get_trip_temp(struct thermal_zone_device *zone,
if (d->override_ops && d->override_ops->get_trip_temp)
return d->override_ops->get_trip_temp(zone, trip, temp);
if (trip < d->aux_trip_nr)
if (trip < d->aux_trip_nr) {
osb();
*temp = d->aux_trips[trip];
else if (trip == d->crt_trip_id)
} else if (trip == d->crt_trip_id) {
*temp = d->crt_temp;
else if (trip == d->psv_trip_id)
} else if (trip == d->psv_trip_id) {
*temp = d->psv_temp;
else if (trip == d->hot_trip_id)
} else if (trip == d->hot_trip_id) {
*temp = d->hot_temp;
else {
} else {
for (i = 0; i < INT340X_THERMAL_MAX_ACT_TRIP_COUNT; i++) {
if (d->act_trips[i].valid &&
d->act_trips[i].id == trip) {
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment