diff options
author | Andi Kleen <ak@suse.de> | 2006-07-28 14:44:45 +0200 |
---|---|---|
committer | Linus Torvalds <torvalds@g5.osdl.org> | 2006-07-28 19:28:00 -0700 |
commit | 0e92da4acb763272c6060f0b14adc2377b627d07 (patch) | |
tree | f720ea910c370c86a244a6ac4b94706bac276ad0 /include | |
parent | d5a2601734bcc740ee78dc4cb0c56b5687da7bd9 (diff) | |
download | kernel_samsung_crespo-0e92da4acb763272c6060f0b14adc2377b627d07.zip kernel_samsung_crespo-0e92da4acb763272c6060f0b14adc2377b627d07.tar.gz kernel_samsung_crespo-0e92da4acb763272c6060f0b14adc2377b627d07.tar.bz2 |
[PATCH] x86_64: Don't clobber r8-r11 in int 0x80 handler
When int 0x80 is called from long mode r8-r11 would leak out of the
kernel (or rather they would be filled with some values from
the kernel stack). I don't think it's a security issue because
the values come from the fixed stack frame which should be near
always user registers from a previous interrupt.
Still better fix it.
Longer term the register save macros need to be cleaned up
to avoid such mistakes in the future.
Original analysis from Richard Brunner, fix by me.
Cc: Richard.Brunner@amd.com
Signed-off-by: Andi Kleen <ak@suse.de>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
Diffstat (limited to 'include')
0 files changed, 0 insertions, 0 deletions