>>> On 09.04.14 at 17:38, wrote:
> On 04/09/2014 11:01 AM, Jan Beulich wrote:
> On 09.04.14 at 16:41, wrote:
>>> The latter load however can easy fault; The arguments for %ds in
>>> XSA-42/ CVE-2013-0228 applies to %{e,f,g}s as well.
>> And it was only that latter operation that I pointed
On 04/09/2014 11:01 AM, Jan Beulich wrote:
On 09.04.14 at 16:41, wrote:
The latter load however can easy fault; The arguments for %ds in
XSA-42/ CVE-2013-0228 applies to %{e,f,g}s as well.
And it was only that latter operation that I pointed at.
We don't seem to reference %fs after the pop
>>> On 09.04.14 at 16:41, wrote:
> The latter load however can easy fault; The arguments for %ds in
> XSA-42/ CVE-2013-0228 applies to %{e,f,g}s as well.
And it was only that latter operation that I pointed at.
> Furthermore, I am a little concerned about the performance impact of
> this. I
On 09/04/14 15:29, David Vrabel wrote:
> On 09/04/14 15:21, Jan Beulich wrote:
> On 09.04.14 at 16:06, wrote:
>>> --- a/arch/x86/xen/xen-asm_32.S
>>> +++ b/arch/x86/xen/xen-asm_32.S
>>> @@ -88,7 +88,11 @@ ENTRY(xen_iret)
>>> * avoid having to reload %fs
>>> */
>>> #ifdef CONFIG_SMP
On 09/04/14 15:21, Jan Beulich wrote:
On 09.04.14 at 16:06, wrote:
>> --- a/arch/x86/xen/xen-asm_32.S
>> +++ b/arch/x86/xen/xen-asm_32.S
>> @@ -88,7 +88,11 @@ ENTRY(xen_iret)
>> * avoid having to reload %fs
>> */
>> #ifdef CONFIG_SMP
>> +pushw %fs
>> +movl
>>> On 09.04.14 at 16:06, wrote:
> --- a/arch/x86/xen/xen-asm_32.S
> +++ b/arch/x86/xen/xen-asm_32.S
> @@ -88,7 +88,11 @@ ENTRY(xen_iret)
>* avoid having to reload %fs
>*/
> #ifdef CONFIG_SMP
> + pushw %fs
> + movl $(__KERNEL_PERCPU), %eax
> + movl %eax, %fs
>
On 09.04.14 at 16:06, boris.ostrov...@oracle.com wrote:
--- a/arch/x86/xen/xen-asm_32.S
+++ b/arch/x86/xen/xen-asm_32.S
@@ -88,7 +88,11 @@ ENTRY(xen_iret)
* avoid having to reload %fs
*/
#ifdef CONFIG_SMP
+ pushw %fs
+ movl $(__KERNEL_PERCPU), %eax
+ movl %eax,
On 09/04/14 15:21, Jan Beulich wrote:
On 09.04.14 at 16:06, boris.ostrov...@oracle.com wrote:
--- a/arch/x86/xen/xen-asm_32.S
+++ b/arch/x86/xen/xen-asm_32.S
@@ -88,7 +88,11 @@ ENTRY(xen_iret)
* avoid having to reload %fs
*/
#ifdef CONFIG_SMP
+pushw %fs
+movl
On 09/04/14 15:29, David Vrabel wrote:
On 09/04/14 15:21, Jan Beulich wrote:
On 09.04.14 at 16:06, boris.ostrov...@oracle.com wrote:
--- a/arch/x86/xen/xen-asm_32.S
+++ b/arch/x86/xen/xen-asm_32.S
@@ -88,7 +88,11 @@ ENTRY(xen_iret)
* avoid having to reload %fs
*/
#ifdef
On 09.04.14 at 16:41, andrew.coop...@citrix.com wrote:
The latter load however can easy fault; The arguments for %ds in
XSA-42/ CVE-2013-0228 applies to %{e,f,g}s as well.
And it was only that latter operation that I pointed at.
Furthermore, I am a little concerned about the performance
On 04/09/2014 11:01 AM, Jan Beulich wrote:
On 09.04.14 at 16:41, andrew.coop...@citrix.com wrote:
The latter load however can easy fault; The arguments for %ds in
XSA-42/ CVE-2013-0228 applies to %{e,f,g}s as well.
And it was only that latter operation that I pointed at.
We don't seem to
On 09.04.14 at 17:38, boris.ostrov...@oracle.com wrote:
On 04/09/2014 11:01 AM, Jan Beulich wrote:
On 09.04.14 at 16:41, andrew.coop...@citrix.com wrote:
The latter load however can easy fault; The arguments for %ds in
XSA-42/ CVE-2013-0228 applies to %{e,f,g}s as well.
And it was only that
12 matches
Mail list logo