arm64: Implement branch predictor hardening for Falkor
Falkor is susceptible to branch predictor aliasing and can theoretically be attacked by malicious code. This patch implements a mitigation for these attacks, preventing any malicious entries from affecting other victim contexts. Signed-off-by:Shanker Donthineni <shankerd@codeaurora.org> [will: fix label name when !CONFIG_KVM and remove references to MIDR_FALKOR] Signed-off-by:
Will Deacon <will.deacon@arm.com> Signed-off-by:
Catalin Marinas <catalin.marinas@arm.com>
Showing
- arch/arm64/include/asm/cpucaps.h 2 additions, 1 deletionarch/arm64/include/asm/cpucaps.h
- arch/arm64/include/asm/kvm_asm.h 2 additions, 0 deletionsarch/arm64/include/asm/kvm_asm.h
- arch/arm64/kernel/bpi.S 8 additions, 0 deletionsarch/arm64/kernel/bpi.S
- arch/arm64/kernel/cpu_errata.c 38 additions, 2 deletionsarch/arm64/kernel/cpu_errata.c
- arch/arm64/kvm/hyp/entry.S 12 additions, 0 deletionsarch/arm64/kvm/hyp/entry.S
- arch/arm64/kvm/hyp/switch.c 8 additions, 0 deletionsarch/arm64/kvm/hyp/switch.c
Please register or sign in to comment