[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] Ping: [PATCH v2] x86emul: avoid speculative out of bounds accesses
>>> On 07.02.19 at 12:42, wrote: > There are a few array accesses here the indexes of which are (at least > indirectly) driven by the guest. Use array_access_nospec() to bound > such accesses. In the {,_}decode_gpr() cases replace existing guarding > constructs. > > To deal with an otherwise occurring #include cycle, drop the inclusion > of asm/x86_emulate.h from asm/processor.h. This include had been > introduced for obtaining the struct cpuid_leaf declaration, which has > since moved into the x86 helper library. > > This is part of the speculative hardening effort. > > Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> > --- > v2: Instead of altering the code in {,_}decode_gpr() simply alter the > comment. This is also meant to be a ping for the 3 other patches v1 of this was sent with in a series. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |