Re: [edk2] [PATCH v2 0/5] [CVE-2017-5753] Bounds Check Bypass issue in SMI handlers

2018-09-28 Thread Yao, Jiewen
Reviewed-by: jiewen@intel.com > -Original Message- > From: Wu, Hao A > Sent: Tuesday, September 25, 2018 2:13 PM > To: edk2-devel@lists.01.org > Cc: Wu, Hao A ; Ard Biesheuvel > ; Leif Lindholm ; > Laszlo Ersek ; Yao, Jiewen ; > Kinney, Michael D ; Gao, Liming > ; Zeng, Star ; Dong,

Re: [edk2] [PATCH v2 0/5] [CVE-2017-5753] Bounds Check Bypass issue in SMI handlers

2018-09-25 Thread Wu, Hao A
t; Subject: Re: [edk2] [PATCH v2 0/5] [CVE-2017-5753] Bounds Check Bypass issue > in SMI handlers > > On 09/25/18 22:51, Laszlo Ersek wrote: > > On 09/25/18 08:12, Hao Wu wrote: > >> V2 changes: > >> A. Rename the newly introduced BaseLib API to 'AsmLfence', an

Re: [edk2] [PATCH v2 0/5] [CVE-2017-5753] Bounds Check Bypass issue in SMI handlers

2018-09-25 Thread Laszlo Ersek
On 09/25/18 22:51, Laszlo Ersek wrote: > On 09/25/18 08:12, Hao Wu wrote: >> V2 changes: >> A. Rename the newly introduced BaseLib API to 'AsmLfence', and makes it >>IA32/X64 specific. >> >> B. Add brief comments before calls of the AsmLfence() to state the >>purpose. >> >> C. Refine the

Re: [edk2] [PATCH v2 0/5] [CVE-2017-5753] Bounds Check Bypass issue in SMI handlers

2018-09-25 Thread Laszlo Ersek
On 09/25/18 08:12, Hao Wu wrote: > V2 changes: > A. Rename the newly introduced BaseLib API to 'AsmLfence', and makes it >IA32/X64 specific. > > B. Add brief comments before calls of the AsmLfence() to state the >purpose. > > C. Refine the patch for Variable/RuntimeDxe driver and make

[edk2] [PATCH v2 0/5] [CVE-2017-5753] Bounds Check Bypass issue in SMI handlers

2018-09-25 Thread Hao Wu
V2 changes: A. Rename the newly introduced BaseLib API to 'AsmLfence', and makes it IA32/X64 specific. B. Add brief comments before calls of the AsmLfence() to state the purpose. C. Refine the patch for Variable/RuntimeDxe driver and make the change focus on the SMM code. V1 history: