[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH SpectreV1+L1TF v6 1/9] xen/evtchn: block speculative out-of-bound accesses



>>> On 14.02.19 at 14:10, <nmanthey@xxxxxxxxx> wrote:
> On 2/12/19 14:08, Jan Beulich wrote:
>>>>> On 08.02.19 at 14:44, <nmanthey@xxxxxxxxx> wrote:
>>> @@ -955,22 +967,22 @@ long evtchn_bind_vcpu(unsigned int port, unsigned int 
>>> vcpu_id)
>>>      {
>>>      case ECS_VIRQ:
>>>          if ( virq_is_global(chn->u.virq) )
>>> -            chn->notify_vcpu_id = vcpu_id;
>>> +            chn->notify_vcpu_id = v->vcpu_id;
>>>          else
>>>              rc = -EINVAL;
>>>          break;
>>>      case ECS_UNBOUND:
>>>      case ECS_INTERDOMAIN:
>>> -        chn->notify_vcpu_id = vcpu_id;
>>> +        chn->notify_vcpu_id = v->vcpu_id;
>>>          break;
>>>      case ECS_PIRQ:
>>> -        if ( chn->notify_vcpu_id == vcpu_id )
>>> +        if ( chn->notify_vcpu_id == v->vcpu_id )
>>>              break;
>>>          unlink_pirq_port(chn, d->vcpu[chn->notify_vcpu_id]);
>>> -        chn->notify_vcpu_id = vcpu_id;
>>> +        chn->notify_vcpu_id = v->vcpu_id;
>> Right now we understand why all of these changes are done, but
>> without a comment this is liable to be converted back as an
>> optimization down the road.
> 
> I will extend the commit message accordingly.

Actually the request was for a comment addition, not for a commit
message adjustment.

Jan



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.