Revision a538e3ff9dabcdf6c3f477a373c629213d1c3066 authored by Jeff Moyer on 11 December 2018, 17:37:49 UTC, committed by Jens Axboe on 11 December 2018, 18:45:50 UTC
Matthew pointed out that the ioctx_table is susceptible to spectre v1, because the index can be controlled by an attacker. The below patch should mitigate the attack for all of the aio system calls. Cc: stable@vger.kernel.org Reported-by: Matthew Wilcox <willy@infradead.org> Reported-by: Dan Carpenter <dan.carpenter@oracle.com> Signed-off-by: Jeff Moyer <jmoyer@redhat.com> Signed-off-by: Jens Axboe <axboe@kernel.dk>
1 parent f55adad
File | Mode | Size |
---|---|---|
6lowpan | ||
Kconfig | -rw-r--r-- | 986 bytes |
Makefile | -rw-r--r-- | 331 bytes |
core.c | -rw-r--r-- | 8.8 KB |
core.h | -rw-r--r-- | 1.3 KB |
header_ops.c | -rw-r--r-- | 6.8 KB |
ieee802154.h | -rw-r--r-- | 3.4 KB |
netlink.c | -rw-r--r-- | 4.6 KB |
nl-mac.c | -rw-r--r-- | 34.7 KB |
nl-phy.c | -rw-r--r-- | 8.0 KB |
nl802154.c | -rw-r--r-- | 66.8 KB |
nl802154.h | -rw-r--r-- | 193 bytes |
nl_policy.c | -rw-r--r-- | 3.3 KB |
rdev-ops.h | -rw-r--r-- | 8.8 KB |
socket.c | -rw-r--r-- | 23.7 KB |
sysfs.c | -rw-r--r-- | 2.6 KB |
sysfs.h | -rw-r--r-- | 233 bytes |
trace.c | -rw-r--r-- | 102 bytes |
trace.h | -rw-r--r-- | 8.2 KB |
Computing file changes ...