Revision a538e3ff9dabcdf6c3f477a373c629213d1c3066 authored by Jeff Moyer on 11 December 2018, 17:37:49 UTC, committed by Jens Axboe on 11 December 2018, 18:45:50 UTC
Matthew pointed out that the ioctx_table is susceptible to spectre v1,
because the index can be controlled by an attacker.  The below patch
should mitigate the attack for all of the aio system calls.

Cc: stable@vger.kernel.org
Reported-by: Matthew Wilcox <willy@infradead.org>
Reported-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Jeff Moyer <jmoyer@redhat.com>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
1 parent f55adad
History
File Mode Size
6lowpan
Kconfig -rw-r--r-- 986 bytes
Makefile -rw-r--r-- 331 bytes
core.c -rw-r--r-- 8.8 KB
core.h -rw-r--r-- 1.3 KB
header_ops.c -rw-r--r-- 6.8 KB
ieee802154.h -rw-r--r-- 3.4 KB
netlink.c -rw-r--r-- 4.6 KB
nl-mac.c -rw-r--r-- 34.7 KB
nl-phy.c -rw-r--r-- 8.0 KB
nl802154.c -rw-r--r-- 66.8 KB
nl802154.h -rw-r--r-- 193 bytes
nl_policy.c -rw-r--r-- 3.3 KB
rdev-ops.h -rw-r--r-- 8.8 KB
socket.c -rw-r--r-- 23.7 KB
sysfs.c -rw-r--r-- 2.6 KB
sysfs.h -rw-r--r-- 233 bytes
trace.c -rw-r--r-- 102 bytes
trace.h -rw-r--r-- 8.2 KB

back to top