x86/vPIC: avoid speculative out of bounds accesses
authorJan Beulich <jbeulich@suse.com>
Thu, 4 Jul 2019 14:07:01 +0000 (16:07 +0200)
committerJan Beulich <jbeulich@suse.com>
Thu, 4 Jul 2019 14:07:01 +0000 (16:07 +0200)
commitdcac6de1f5b34d52b5f37c73b85c3b627581d413
tree61eb4c30e215364badca77897acb3f097a1137e5
parentbe15c231e7e351ea8dbcabf62f952537c637343d
x86/vPIC: avoid speculative out of bounds accesses

Array indexes used in the I/O port read/write emulation functions are
derived from guest controlled values. Where this is not already done,
restrict their ranges to limit the side effects of speculative execution.

This is part of the speculative hardening effort.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
xen/arch/x86/hvm/vpic.c