Skip to content

Commit 10a7041

Browse files
Andi KleenKAGA-KOKO
authored andcommitted
x86/speculation/l1tf: Make sure the first page is always reserved
The L1TF workaround doesn't make any attempt to mitigate speculate accesses to the first physical page for zeroed PTEs. Normally it only contains some data from the early real mode BIOS. It's not entirely clear that the first page is reserved in all configurations, so add an extra reservation call to make sure it is really reserved. In most configurations (e.g. with the standard reservations) it's likely a nop. Signed-off-by: Andi Kleen <ak@linux.intel.com> Signed-off-by: Thomas Gleixner <tglx@linutronix.de> Reviewed-by: Josh Poimboeuf <jpoimboe@redhat.com> Acked-by: Dave Hansen <dave.hansen@intel.com>
1 parent 6b28bac commit 10a7041

File tree

1 file changed

+6
-0
lines changed

1 file changed

+6
-0
lines changed

arch/x86/kernel/setup.c

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -823,6 +823,12 @@ void __init setup_arch(char **cmdline_p)
823823
memblock_reserve(__pa_symbol(_text),
824824
(unsigned long)__bss_stop - (unsigned long)_text);
825825

826+
/*
827+
* Make sure page 0 is always reserved because on systems with
828+
* L1TF its contents can be leaked to user processes.
829+
*/
830+
memblock_reserve(0, PAGE_SIZE);
831+
826832
early_reserve_initrd();
827833

828834
/*

0 commit comments

Comments
 (0)