Subscribe: Linux | Kernel
http://www.gossamer-threads.com/lists/linux/kernel.xml
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
array ptr  array  bounds  colibri imx  imx ull  kernel  mask  nospec  patch  prevent bounds  ptr  txq params  user controlled  user 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Linux | Kernel

Linux | Kernel



Mailing List Archive by Gossamer Threads



Last Build Date: 18 Jan 2018 17:47:28 -0800

Copyright: (c) Gossamer Threads Inc. All rights reserved.
 



[PATCH v4 06/10] x86, get_user: use pointer masking to limit speculation

18 Jan 2018 16:15:10 -0800

Quoting Linus: I do think that it would be a good idea to very expressly document the fact that it's not that the user access itself is unsaf



[PATCH v4 07/10] x86: narrow out of bounds syscalls to sys_read under speculation

18 Jan 2018 16:15:10 -0800

The syscall table base is a user controlled function pointer in kernel space. Like, 'get_user, use 'MASK_NOSPEC' to prevent any out of bounds speculat



[PATCH v4 10/10] nl80211: sanitize array index in parse_txq_params

18 Jan 2018 16:15:10 -0800

Wireless drivers rely on parse_txq_params to validate that txq_params->ac is less than NL80211_NUM_ACS by the time the low-level driver's ->conf_tx()



[PATCH v4 09/10] kvm, x86: fix spectre-v1 mitigation

18 Jan 2018 16:15:10 -0800

Commit 75f139aaf896 "KVM: x86: Add memory barrier on vmcs field lookup" added a raw 'asm("lfence");' to prevent a bounds check bypass of 'vmcs_field_t



[PATCH v4 08/10] vfs, fdtable: prevent bounds-check bypass via speculative execution

18 Jan 2018 16:15:10 -0800

'fd' is a user controlled value that is used as a data dependency to read from the 'fdt->fd' array. In order to avoid potential leaks of kernel memor



[PATCH] ARM: dts: imx6ull: add Toradex Colibri iMX6ULL support

18 Jan 2018 16:15:10 -0800

Add support for the Computer on Module Colibri iMX6ULL and its Bluetooth/Wifi variant along with the development/evaluation carrier board device trees



[PATCH v4 05/10] x86, __get_user: use __uaccess_begin_nospec

18 Jan 2018 16:15:10 -0800

Quoting Linus: I do think that it would be a good idea to very expressly document the fact that it's not that the user access itself is unsaf



[PATCH v4 02/10] asm/nospec, array_ptr: sanitize speculative array de-references

18 Jan 2018 16:15:09 -0800

'array_ptr' is proposed as a generic mechanism to mitigate against Spectre-variant-1 attacks, i.e. an attack that bypasses boundary checks via specula



[PATCH v4 03/10] x86: implement array_ptr_mask()

18 Jan 2018 16:15:09 -0800

'array_ptr' uses a mask to sanitize user controllable pointers. The x86 'array_ptr_mask' is an assembler optimized way to generate a 0 or ~0 mask if



[PATCH v4 04/10] x86: introduce __uaccess_begin_nospec and ifence

18 Jan 2018 16:15:09 -0800

For '__get_user' paths, do not allow the kernel to speculate on the value of a user controlled pointer. In addition to the 'stac' instruction for Supe