Re: [PATCH] atm: iphase: Fix Spectre v1 vulnerability

2019-08-02 Thread Gustavo A. R. Silva
Hi Dave, On 8/2/19 7:31 PM, David Miller wrote: > From: "Gustavo A. R. Silva" > Date: Tue, 30 Jul 2019 22:21:41 -0500 > >> board is controlled by user-space, hence leading to a potential >> exploitation of the Spectre variant 1 vulnerability. >> >> This issue was detected with the help of

Re: [PATCH] atm: iphase: Fix Spectre v1 vulnerability

2019-08-02 Thread David Miller
From: "Gustavo A. R. Silva" Date: Tue, 30 Jul 2019 22:21:41 -0500 > board is controlled by user-space, hence leading to a potential > exploitation of the Spectre variant 1 vulnerability. > > This issue was detected with the help of Smatch: Applied and queued up for -stable. Do not CC: -stable

[PATCH] atm: iphase: Fix Spectre v1 vulnerability

2019-07-30 Thread Gustavo A. R. Silva
board is controlled by user-space, hence leading to a potential exploitation of the Spectre variant 1 vulnerability. This issue was detected with the help of Smatch: drivers/atm/iphase.c:2765 ia_ioctl() warn: potential spectre issue 'ia_dev' [r] (local cap) drivers/atm/iphase.c:2774 ia_ioctl()