All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH 0/4] x86: further L1TF / XSA-289 guards
@ 2019-01-31 14:07 Jan Beulich
  2019-01-31 14:25 ` [PATCH 1/4] x86emul: avoid speculative out of bounds accesses Jan Beulich
                   ` (4 more replies)
  0 siblings, 5 replies; 19+ messages in thread
From: Jan Beulich @ 2019-01-31 14:07 UTC (permalink / raw)
  To: xen-devel
  Cc: Juergen Gross, Andrew Cooper, Wei Liu, nmanthey, Roger Pau Monne

This goes alongside Norbert's series, dealing with a few more
places where I happened to know (without any analysis tools)
guest controlled array accesses sit. I've additionally also
checked emul-i8254.c, and I think no adjustments are needed
there (there are a few possible overruns by one, but just like
is the case in patch 2 I don't think they are actual issues).

1: x86emul: avoid speculative out of bounds accesses
2: x86/vMSI: avoid speculative out of bounds accesses
3: x86/vPIC: avoid speculative out of bounds accesses
4: x86/vLAPIC: avoid speculative out of bounds accesses

Jürgen, I've copied you anyway, but I assume your general
Rab-until-RC3 would apply to this series (and perhaps to
further ones, should anyone find time) as much as to Norbert's.

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 19+ messages in thread
[parent not found: <FCC26D720200001BB4B78B26@suse.com>]

end of thread, other threads:[~2019-07-04 13:59 UTC | newest]

Thread overview: 19+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-01-31 14:07 [PATCH 0/4] x86: further L1TF / XSA-289 guards Jan Beulich
2019-01-31 14:25 ` [PATCH 1/4] x86emul: avoid speculative out of bounds accesses Jan Beulich
2019-01-31 14:54   ` Andrew Cooper
2019-01-31 15:50     ` Jan Beulich
2019-01-31 16:14       ` Andrew Cooper
2019-01-31 16:45         ` Jan Beulich
2019-02-07 11:42   ` [PATCH v2] " Jan Beulich
2019-07-04 13:19     ` [Xen-devel] " Andrew Cooper
2019-04-03  8:46   ` Ping: " Jan Beulich
2019-01-31 14:26 ` [PATCH 2/4] x86/vMSI: " Jan Beulich
2019-07-04 13:27   ` [Xen-devel] " Andrew Cooper
2019-01-31 14:26 ` [PATCH 3/4] x86/vPIC: " Jan Beulich
2019-07-04 13:35   ` [Xen-devel] " Andrew Cooper
2019-01-31 14:27 ` [PATCH 4/4] x86/vLAPIC: " Jan Beulich
2019-07-04 13:44   ` [Xen-devel] " Andrew Cooper
2019-07-04 13:57     ` Jan Beulich
     [not found] ` <5C53012902000000001030F5@prv1-mh.provo.novell.com>
     [not found]   ` <5C53012902000078002328D1@prv1-mh.provo.novell.com>
2019-05-27  9:24     ` Ping: [PATCH 0/4] x86: further L1TF / XSA-289 guards Jan Beulich
2019-05-27  9:24       ` [Xen-devel] " Jan Beulich
     [not found] <FCC26D720200001BB4B78B26@suse.com>
     [not found] ` <5C53056B0200007800212C9B@suse.com>
     [not found]   ` <5C5C19950200007800214961@suse.com>
2019-02-07 12:31     ` [PATCH v2] x86emul: avoid speculative out of bounds accesses Juergen Gross

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.