evtchn: block speculative out-of-bound accesses
authorNorbert Manthey <nmanthey@amazon.de>
Tue, 26 Feb 2019 15:57:18 +0000 (16:57 +0100)
committerJan Beulich <jbeulich@suse.com>
Tue, 26 Feb 2019 15:57:18 +0000 (16:57 +0100)
commit443d3ab6daee9bf77ec1cb2ea7e252fb0ce616a8
treefddb5f1cd8972e97b3092284f70f7a7165e47939
parent43282a5e64da26fad544e0100abf35048cf65b46
evtchn: block speculative out-of-bound accesses

Guests can issue event channel interaction with guest specified data.
To avoid speculative out-of-bound accesses, we use the nospec macros,
or the domain_vcpu function. Where appropriate, we use the vcpu_id of
the seleceted vcpu instead of the parameter that can be influenced by
the guest, so that only one access needs to be protected.

This is part of the speculative hardening effort.

Signed-off-by: Norbert Manthey <nmanthey@amazon.de>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Release-acked-by: Juergen Gross <jgross@suse.com>
xen/common/event_channel.c
xen/common/event_fifo.c
xen/include/xen/event.h