linux/arch/x86_64
Andi Kleen 0e92da4acb [PATCH] x86_64: Don't clobber r8-r11 in int 0x80 handler
When int 0x80 is called from long mode r8-r11 would leak out of the
kernel (or rather they would be filled with some values from
the kernel stack). I don't think it's a security issue because
the values come from the fixed stack frame which should be near
always user registers from a previous interrupt.

Still better fix it.

Longer term the register save macros need to be cleaned up
to avoid such mistakes in the future.

Original analysis from Richard Brunner, fix by me.

Cc: Richard.Brunner@amd.com

Signed-off-by: Andi Kleen <ak@suse.de>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-07-28 19:28:00 -07:00
..
boot kbuild: introduce utsrelease.h 2006-07-03 23:30:54 +02:00
crypto
ia32 [PATCH] x86_64: Don't clobber r8-r11 in int 0x80 handler 2006-07-28 19:28:00 -07:00
kernel [PATCH] i386/x86-64: Add user_mode checks to profile_pc for oprofile 2006-07-28 19:28:00 -07:00
lib [PATCH] lockdep: irqtrace cleanup of include/asm-x86_64/irqflags.h 2006-07-03 15:27:03 -07:00
mm [PATCH] lockdep: beautify x86_64 stacktraces 2006-07-03 15:27:02 -07:00
oprofile
pci
Kconfig [PATCH] lockdep: enable on x86_64 2006-07-03 15:27:05 -07:00
Kconfig.debug [PATCH] lockdep: irqtrace subsystem, x86_64 support 2006-07-03 15:27:03 -07:00
Makefile
defconfig [PATCH] x86_64: Update defconfig 2006-07-10 15:12:32 -07:00