On Tue, Jul 31, 2018 at 2:46 AM, Christian König
wrote:
> Am 30.07.2018 um 22:14 schrieb Alex Deucher:
>>
>> On Mon, Jul 30, 2018 at 5:55 AM, Michel Dänzer wrote:
>>>
>>> On 2018-07-24 10:53 PM, Alex Deucher wrote:
On Mon, Jul 23, 2018 at 12:32 PM, Gustavo A. R. Silva
wrote:
>
Am 30.07.2018 um 22:14 schrieb Alex Deucher:
On Mon, Jul 30, 2018 at 5:55 AM, Michel Dänzer wrote:
On 2018-07-24 10:53 PM, Alex Deucher wrote:
On Mon, Jul 23, 2018 at 12:32 PM, Gustavo A. R. Silva
wrote:
idx can be indirectly controlled by user-space, hence leading to a
potential exploitatio
On Mon, Jul 30, 2018 at 5:55 AM, Michel Dänzer wrote:
> On 2018-07-24 10:53 PM, Alex Deucher wrote:
>> On Mon, Jul 23, 2018 at 12:32 PM, Gustavo A. R. Silva
>> wrote:
>>> idx can be indirectly controlled by user-space, hence leading to a
>>> potential exploitation of the Spectre variant 1 vulnera
On 2018-07-24 10:53 PM, Alex Deucher wrote:
> On Mon, Jul 23, 2018 at 12:32 PM, Gustavo A. R. Silva
> wrote:
>> idx can be indirectly controlled by user-space, hence leading to a
>> potential exploitation of the Spectre variant 1 vulnerability.
>>
>> This issue was detected with the help of Smatch
On Mon, Jul 23, 2018 at 12:32 PM, Gustavo A. R. Silva
wrote:
> idx can be indirectly controlled by user-space, hence leading to a
> potential exploitation of the Spectre variant 1 vulnerability.
>
> This issue was detected with the help of Smatch:
>
> drivers/gpu/drm/amd/amdgpu/amdgpu_pm.c:408 amd