[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <nycvar.QRO.7.76.6.1801070921030.418@qynat-yncgbc>
Date: Sun, 7 Jan 2018 09:21:44 -0800 (PST)
From: David Lang <david@...g.hm>
To: Borislav Petkov <bp@...en8.de>
cc: Willy Tarreau <w@....eu>, Dave Hansen <dave.hansen@...el.com>,
Thomas Gleixner <tglx@...utronix.de>,
Jon Masters <jcm@...hat.com>,
"Woodhouse, David" <dwmw@...zon.co.uk>,
Paolo Bonzini <pbonzini@...hat.com>,
Alan Cox <gnomes@...rguk.ukuu.org.uk>,
Linus Torvalds <torvalds@...ux-foundation.org>,
Andi Kleen <andi@...stfloor.org>,
Greg Kroah-Hartman <gregkh@...ux-foundation.org>,
Tim Chen <tim.c.chen@...ux.intel.com>,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
Jeff Law <law@...hat.com>, Nick Clifton <nickc@...hat.com>
Subject: Re: Avoid speculative indirect calls in kernel
The point is that in many cases, if someone explits the "trusted" process, they
already have everything that the machine is able to do anyway.
Powered by blists - more mailing lists