[PATCH] D49663: [x86/SLH] Teach the x86 speculative load hardening pass to harden against v1.2 BCBS attacks directly.
Eric Christopher via Phabricator via llvm-commits
llvm-commits at lists.llvm.org
Tue Jul 24 15:24:49 PDT 2018
echristo accepted this revision.
echristo added a comment.
Couple of small nits, but that's it. Still LGTM.
================
Comment at: llvm/lib/Target/X86/X86SpeculativeLoadHardening.cpp:2150-2151
+///
+/// When this happens, the speculative
+/// execution of the call or jump will end up being steered to this attacker
+/// controlled address. While most such loads will be adequately hardened
----------------
Nit: Flow.
================
Comment at: llvm/lib/Target/X86/X86SpeculativeLoadHardening.cpp:2187
+
+ // For all of these, the target register is zero.
+ auto &TargetOp = MI.getOperand(0);
----------------
Nit: I know you don't mean it, but it sounds like you're talking about r0 on some architecture :)
Repository:
rL LLVM
https://reviews.llvm.org/D49663
More information about the llvm-commits
mailing list