[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] Ping: [PATCH v2] x86emul: avoid speculative out of bounds accesses



>>> On 07.02.19 at 12:42,  wrote:
> There are a few array accesses here the indexes of which are (at least
> indirectly) driven by the guest. Use array_access_nospec() to bound
> such accesses. In the {,_}decode_gpr() cases replace existing guarding
> constructs.
> 
> To deal with an otherwise occurring #include cycle, drop the inclusion
> of asm/x86_emulate.h from asm/processor.h. This include had been
> introduced for obtaining the struct cpuid_leaf declaration, which has
> since moved into the x86 helper library.
> 
> This is part of the speculative hardening effort.
> 
> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
> ---
> v2: Instead of altering the code in {,_}decode_gpr() simply alter the
>     comment.

This is also meant to be a ping for the 3 other patches v1 of this
was sent with in a series.

Jan



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.