[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH L1TF v9 7/7] common/grant_table: block speculative out-of-bound accesses



>>> On 27.02.19 at 17:13, <nmanthey@xxxxxxxxx> wrote:
> Speculative execution is not blocked in case one of the following
> properties is true:
>  - path cannot be triggered by the guest
>  - path does not return to the guest
>  - path does not result in an out-of-bound access
>  - path cannot be executed repeatedly
> Only the combination of the above properties allows to actually leak
> continuous chunks of memory. Therefore, we only add the penalty of
> protective mechanisms in case a potential speculative out-of-bound
> access matches all the above properties.

While this is all fine, how do I match which of the reasons applies to
which of (in particular) the gt_version checks left alone? As said, the
reasoning here should specifically be detailed so it can be used as a
guiding reference when adding further conditionals to the code down
the road. And of course review is (more) difficult this way as well, as
(judging from prior conversations) we don't seem to necessarily
agree in our views in all places, and hence to discuss a possibly
questionable decision others also need to understand which of the
criteria you considered to match in the specific case.

Jan



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.