>>> On 14.03.19 at 13:50, <[email protected]> wrote: > When issuing a vcpu_op hypercall, guests have control over the > vcpuid variable. In the old code, this allowed to perform > speculative out-of-bound accesses. To block this, we make use > of the domain_vcpu function. > > This is part of the speculative hardening effort. > > Signed-off-by: Norbert Manthey <[email protected]>
Reviewed-by: Jan Beulich <[email protected]> _______________________________________________ Xen-devel mailing list [email protected] https://lists.xenproject.org/mailman/listinfo/xen-devel
