Revision a538e3ff9dabcdf6c3f477a373c629213d1c3066 authored by Jeff Moyer on 11 December 2018, 17:37:49 UTC, committed by Jens Axboe on 11 December 2018, 18:45:50 UTC
Matthew pointed out that the ioctx_table is susceptible to spectre v1,
because the index can be controlled by an attacker.  The below patch
should mitigate the attack for all of the aio system calls.

Cc: stable@vger.kernel.org
Reported-by: Matthew Wilcox <willy@infradead.org>
Reported-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Jeff Moyer <jmoyer@redhat.com>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
1 parent f55adad
History
File Mode Size
Kconfig -rw-r--r-- 1.1 KB
Makefile -rw-r--r-- 150 bytes
hsr_device.c -rw-r--r-- 12.2 KB
hsr_device.h -rw-r--r-- 836 bytes
hsr_forward.c -rw-r--r-- 10.4 KB
hsr_forward.h -rw-r--r-- 577 bytes
hsr_framereg.c -rw-r--r-- 13.4 KB
hsr_framereg.h -rw-r--r-- 1.7 KB
hsr_main.c -rw-r--r-- 3.2 KB
hsr_main.h -rw-r--r-- 5.2 KB
hsr_netlink.c -rw-r--r-- 11.4 KB
hsr_netlink.h -rw-r--r-- 923 bytes
hsr_slave.c -rw-r--r-- 4.4 KB
hsr_slave.h -rw-r--r-- 1.1 KB

back to top