diff options
| author | Matthias Krüger <matthias.krueger@famsik.de> | 2022-08-20 07:08:58 +0200 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2022-08-20 07:08:58 +0200 |
| commit | 368f08a65f66cdd0b26298fb86a175188d9c34bb (patch) | |
| tree | e17f6897e14d6cb0fde787beeae98a124ff89e80 /compiler/rustc_codegen_llvm/src | |
| parent | 3cca14093a9b2fb46c3a8deb9b48f233621066db (diff) | |
| parent | 2a23d08aaefd60d294d63600a707575a6efcf292 (diff) | |
| download | rust-368f08a65f66cdd0b26298fb86a175188d9c34bb.tar.gz rust-368f08a65f66cdd0b26298fb86a175188d9c34bb.zip | |
Rollup merge of #100383 - fortanix:raoul/aepic_leak_mitigation, r=cuviper
Mitigate stale data reads on SGX platform Intel disclosed the Stale Data Read vulnerability yesterday. In order to mitigate this issue completely, reading userspace from an SGX enclave must be aligned and in 8-bytes chunks. This PR implements this mitigation References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00657.html - https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/stale-data-read-from-xapic.html cc: ``@jethrogb``
Diffstat (limited to 'compiler/rustc_codegen_llvm/src')
0 files changed, 0 insertions, 0 deletions
