android_kernel_xiaomi_sm8350/arch/x86_64/ia32
Andi Kleen 0e92da4acb [PATCH] x86_64: Don't clobber r8-r11 in int 0x80 handler
When int 0x80 is called from long mode r8-r11 would leak out of the
kernel (or rather they would be filled with some values from
the kernel stack). I don't think it's a security issue because
the values come from the fixed stack frame which should be near
always user registers from a previous interrupt.

Still better fix it.

Longer term the register save macros need to be cleaned up
to avoid such mistakes in the future.

Original analysis from Richard Brunner, fix by me.

Cc: Richard.Brunner@amd.com

Signed-off-by: Andi Kleen <ak@suse.de>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-07-28 19:28:00 -07:00
..
audit.c [PATCH] audit syscall classes 2006-07-01 07:44:10 -04:00
fpu32.c [PATCH] x86_64: Remove long obsolete CVS 2006-06-26 10:48:16 -07:00
ia32_aout.c
ia32_binfmt.c [PATCH] x86_64: Bring x86-64 ia32 emul in sync with i386 on READ_IMPLIES_EXEC enabling 2006-07-10 15:12:32 -07:00
ia32_signal.c [PATCH] x86_64: Remove long obsolete CVS 2006-06-26 10:48:16 -07:00
ia32entry.S [PATCH] x86_64: Don't clobber r8-r11 in int 0x80 handler 2006-07-28 19:28:00 -07:00
ipc32.c
Makefile [PATCH] audit syscall classes 2006-07-01 07:44:10 -04:00
mmap32.c
ptrace32.c [PATCH] x86_64: Fix access check in ptrace compat 2006-07-10 15:12:33 -07:00
sys_ia32.c Remove obsolete #include <linux/config.h> 2006-06-30 19:25:36 +02:00
syscall32_syscall.S
syscall32.c
tls32.c
vsyscall-sigreturn.S [PATCH] Mark unwind info for signal trampolines in vDSOs 2006-03-31 12:18:52 -08:00
vsyscall-syscall.S
vsyscall-sysenter.S
vsyscall.lds