Re: [PATCH 6/6] s390: scrub registers on kernel entry and KVM exit

2018-01-19 Thread QingFeng Hao
在 2018/1/19 15:57, Christian Borntraeger 写道: On 01/19/2018 07:29 AM, QingFeng Hao wrote: 在 2018/1/17 17:48, Martin Schwidefsky 写道: Clear all user space registers on entry to the kernel and all KVM guest registers on KVM guest exit if the register does not contain either a parameter

Re: [PATCH 6/6] s390: scrub registers on kernel entry and KVM exit

2018-01-19 Thread QingFeng Hao
在 2018/1/19 15:57, Christian Borntraeger 写道: On 01/19/2018 07:29 AM, QingFeng Hao wrote: 在 2018/1/17 17:48, Martin Schwidefsky 写道: Clear all user space registers on entry to the kernel and all KVM guest registers on KVM guest exit if the register does not contain either a parameter

Re: [PATCH 6/6] s390: scrub registers on kernel entry and KVM exit

2018-01-18 Thread QingFeng Hao
,%r9,__PT_PSW(%r11) xc __PT_FLAGS(8,%r11),__PT_FLAGS(%r11) -- Regards QingFeng Hao

Re: [PATCH 6/6] s390: scrub registers on kernel entry and KVM exit

2018-01-18 Thread QingFeng Hao
+ xgr %r3,%r3 + xgr %r4,%r4 + xgr %r5,%r5 + xgr %r6,%r6 + xgr %r7,%r7 + xgr %r10,%r10 mvc __PT_R8(64,%r11),0(%r14) stmg%r8,%r9,__PT_PSW(%r11) xc __PT_FLAGS(8,%r11),__PT_FLAGS(%r11) -- Regards QingFeng

Re: [PATCH 3/6] s390: add options to change branch prediction behaviour for the kernel

2018-01-18 Thread QingFeng Hao
eter "nobp=0" or "nospec" + can be used to run the kernel in the normal branch prediction mode. + + With the option disabled the modified branch prediction mode is + enabled with the "nobp=1" kernel parameter. + + If unsure, say N. + endmenu [...] -- Regards QingFeng Hao

Re: [PATCH 3/6] s390: add options to change branch prediction behaviour for the kernel

2018-01-18 Thread QingFeng Hao
can be used to run the kernel in the normal branch prediction mode. + + With the option disabled the modified branch prediction mode is + enabled with the "nobp=1" kernel parameter. + + If unsure, say N. + endmenu [...] -- Regards QingFeng Hao

Re: [PATCH 00/18] prevent bounds-check bypass via speculative execution

2018-01-13 Thread QingFeng Hao
e "can you prove that the bounds check bypass is *not* exploitable". Consider that the Spectre paper reports one example of a speculation window being ~180 cycles. [snip] -- Regards QingFeng Hao

Re: [PATCH 00/18] prevent bounds-check bypass via speculative execution

2018-01-13 Thread QingFeng Hao
e "can you prove that the bounds check bypass is *not* exploitable". Consider that the Spectre paper reports one example of a speculation window being ~180 cycles. [snip] -- Regards QingFeng Hao

[Question]: Are the patches for CVE-2012-4542 in upstream?

2017-10-18 Thread QingFeng Hao
Hi, I saw the patches were tracked in https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4542, but I couldn't find them in upstream from https://lkml.org/lkml/2013/1/24/279. Could anyone give some help on this and if they are in upstream? If yes, what are the commits? Thanks a lot! QingFeng

[Question]: Are the patches for CVE-2012-4542 in upstream?

2017-10-18 Thread QingFeng Hao
Hi, I saw the patches were tracked in https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4542, but I couldn't find them in upstream from https://lkml.org/lkml/2013/1/24/279. Could anyone give some help on this and if they are in upstream? If yes, what are the commits? Thanks a lot! QingFeng