Re: [PATCH 13/18] ipv6: prevent bounds-check bypass via speculative execution

2018-01-06 Thread Dan Williams
On Sat, Jan 6, 2018 at 6:48 AM, Stephen Hemminger wrote: > On Fri, 05 Jan 2018 17:11:04 -0800 > Dan Williams wrote: > >> Static analysis reports that 'offset' may be a user controlled value >> that is used as a data dependency reading from a raw6_frag_vec buffer. >> In order to avoid potential le

Re: [PATCH 13/18] ipv6: prevent bounds-check bypass via speculative execution

2018-01-06 Thread Stephen Hemminger
On Fri, 05 Jan 2018 17:11:04 -0800 Dan Williams wrote: > Static analysis reports that 'offset' may be a user controlled value > that is used as a data dependency reading from a raw6_frag_vec buffer. > In order to avoid potential leaks of kernel memory values, block > speculative execution of the

Re: [PATCH 13/18] ipv6: prevent bounds-check bypass via speculative execution

2018-01-06 Thread Sergei Shtylyov
On 1/6/2018 4:11 AM, Dan Williams wrote: Static analysis reports that 'offset' may be a user controlled value that is used as a data dependency reading from a raw6_frag_vec buffer. In order to avoid potential leaks of kernel memory values, block speculative execution of the instruction stream th

[PATCH 13/18] ipv6: prevent bounds-check bypass via speculative execution

2018-01-05 Thread Dan Williams
Static analysis reports that 'offset' may be a user controlled value that is used as a data dependency reading from a raw6_frag_vec buffer. In order to avoid potential leaks of kernel memory values, block speculative execution of the instruction stream that could issue further reads based on an inv