在 2018/1/19 15:57, Christian Borntraeger 写道:
On 01/19/2018 07:29 AM, QingFeng Hao wrote:
在 2018/1/17 17:48, Martin Schwidefsky 写道:
Clear all user space registers on entry to the kernel and all KVM guest
registers on KVM guest exit if the register does not contain either a
parameter or a
+ xgr %r3,%r3
+ xgr %r4,%r4
+ xgr %r5,%r5
+ xgr %r6,%r6
+ xgr %r7,%r7
+ xgr %r10,%r10
mvc __PT_R8(64,%r11),0(%r14)
stmg%r8,%r9,__PT_PSW(%r11)
xc __PT_FLAGS(8,%r11),__PT_FLAGS(%r11)
--
Regards
QingFeng
can be used to run the kernel in the normal branch prediction mode.
+
+ With the option disabled the modified branch prediction mode is
+ enabled with the "nobp=1" kernel parameter.
+
+ If unsure, say N.
+
endmenu
[...]
--
Regards
QingFeng Hao
patches be "can you prove that the
bounds check bypass is *not* exploitable". Consider that the Spectre
paper reports one example of a speculation window being ~180 cycles.
[snip]
--
Regards
QingFeng Hao
Hi,
I saw the patches were tracked in
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4542,
but I couldn't find them in upstream from https://lkml.org/lkml/2013/1/24/279.
Could anyone give some help on this and if they are in upstream?
If yes, what are the commits?
Thanks a lot!
Qin
5 matches
Mail list logo