Print this page
10924 Need mitigation of L1TF (CVE-2018-3646)
Reviewed by: Robert Mustacchi <rm@joyent.com>
Reviewed by: Jerry Jelinek <jerry.jelinek@joyent.com>
Reviewed by: Peter Tribble <peter.tribble@gmail.com>
*** 34,44 ****
/* Copyright (c) 1987, 1988 Microsoft Corporation */
/* All Rights Reserved */
/*
! * Copyright 2016 Joyent, Inc.
*/
#include <sys/errno.h>
#include <sys/asm_linkage.h>
--- 34,44 ----
/* Copyright (c) 1987, 1988 Microsoft Corporation */
/* All Rights Reserved */
/*
! * Copyright (c) 2018 Joyent, Inc.
*/
#include <sys/errno.h>
#include <sys/asm_linkage.h>
*** 864,875 ****
cmpq $BCOPY_NHM_REP, %rdx
.globl bcopy_patch_end
bcopy_patch_end:
.p2align 4
! .globl bcopy_ck_size
! bcopy_ck_size:
cmpq $BCOPY_DFLT_REP, %rdx
jae L(use_rep)
/*
* Align to a 8-byte boundary. Avoids penalties from unaligned stores
--- 864,875 ----
cmpq $BCOPY_NHM_REP, %rdx
.globl bcopy_patch_end
bcopy_patch_end:
.p2align 4
! ALTENTRY(bcopy_ck_size)
!
cmpq $BCOPY_DFLT_REP, %rdx
jae L(use_rep)
/*
* Align to a 8-byte boundary. Avoids penalties from unaligned stores
*** 954,963 ****
--- 954,964 ----
xchgq %rsi, %rdi /* %rdi = src, %rsi = destination */
andq $7, %rdx /* remainder */
jnz L(do_remainder)
ret
#undef L
+ SET_SIZE(bcopy_ck_size)
#ifdef DEBUG
/*
* Setup frame on the run-time stack. The end of the input argument
* area must be aligned on a 16 byte boundary. The stack pointer %rsp,