Re: [PATCH 1/2] x86/setup_data: validate indirect entry sizes before dereferencing them
From: Pengpeng Hou
Date: Sun Apr 05 2026 - 10:08:43 EST
Hi Boris,
You're right to press on the threat model here.
I do not have a compelling scenario for this series that avoids already
privileged control over the boot-time state. The `setup_data` chain is boot
metadata coming from the bootloader / kexec handoff / virtualized boot path,
so this is better characterized as a robustness issue against malformed
setup_data than as a meaningful security boundary for an unprivileged
attacker.
So while I still think the size assumptions are too strong in these callers,
I do not think I have a strong enough answer to "why should x86 care?" in the
way you are asking.
I will drop the whole series.
Thanks,
Pengpeng