|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v2 0/8] x86/PV: avoid speculation abuse through guest accessors
Jan Beulich writes ("[PATCH v2 0/8] x86/PV: avoid speculation abuse through
guest accessors"):
> Re-sending primarily for the purpose of getting a release ack, an
> explicit release nak, or an indication of there not being a need,
> all for at least the first three patches here (which are otherwise
> ready to go in). I've dropped the shadow part of the series from
> this re-submission, because it has all got reviewed by Tim already
> and is intended for 4.16 only anyway. I'm re-including the follow
> up patches getting the code base in consistent shape again, as I
> continue to think this consistency goal is at least worth a
> consideration towards a freeze exception.
>
> 1: split __{get,put}_user() into "guest" and "unsafe" variants
> 2: split __copy_{from,to}_user() into "guest" and "unsafe" variants
> 3: PV: harden guest memory accesses against speculative abuse
These three:
Release-Acked-by: Ian Jackson <iwj@xxxxxxxxxxxxxx>
On the grounds that this is probably severe enough to be a blocking
issue for 4.15.
> 4: rename {get,put}_user() to {get,put}_guest()
> 5: gdbsx: convert "user" to "guest" accesses
> 6: rename copy_{from,to}_user() to copy_{from,to}_guest_pv()
> 7: move stac()/clac() from {get,put}_unsafe_asm() ...
> 8: PV: use get_unsafe() instead of copy_from_unsafe()
These have not got a maintainer review yet. To grant a release-ack
I'd like an explanation of the downsides and upsides of taking this
series in 4.15 ?
You say "consistency" but in practical terms, what will happen if the
code is not "conxistent" in this sense ?
I'd also like to hear from aother hypervisor maintainer.
Thanks,
Ian.
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |