>>> On 14.03.19 at 13:50, <nmant...@amazon.de> wrote: > When issuing a vcpu_op hypercall, guests have control over the > vcpuid variable. In the old code, this allowed to perform > speculative out-of-bound accesses. To block this, we make use > of the domain_vcpu function. > > This is part of the speculative hardening effort. > > Signed-off-by: Norbert Manthey <nmant...@amazon.de>
Reviewed-by: Jan Beulich <jbeul...@suse.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel