From: François LEGAL <[email protected]>

The syscall entry code used to copy the struct user_msghdr on the syscall 
stack, and some registered callbacks (notably in RTNet) were then calling again 
copy_from/to_user on that struct, which would trigger the SPECTRE mitigation 
protection.

I ran the iddp/xddp/bufp-label tests which seems ok with the patch, and 
retested RTNet af_packet part
I did not test the rtcan part as I have no hardware available.

 kernel/cobalt/posix/io.c          | 20 ++------------------
 kernel/drivers/can/rtcan_raw.c    | 37 +++++++++++++++++++++++++++++--------
 kernel/drivers/ipc/bufp.c         | 14 ++++++++++++--
 kernel/drivers/ipc/iddp.c         | 14 ++++++++++++--
 kernel/drivers/ipc/xddp.c         | 14 ++++++++++++--
 5 files changed, 67 insertions(+), 32 deletions(-)


Reply via email to