[PATCH 0/9] Mitigations against spectre-v1 in the arm64 Linux kernel

Catalin Marinas catalin.marinas at arm.com
Tue Feb 6 14:17:13 PST 2018


On Mon, Feb 05, 2018 at 03:34:15PM +0000, Will Deacon wrote:
> Hi all,
> 
> This series implements some mitigations against spectre-v1 for arm64. It
> broadly follows the work that has been done for x86, by implementing:
> 
>   * A back-end version of array_index_mask_nospec() to suppress any
>     compiler optimisations that could introduce unwanted speculative
>     paths
> 
>   * Masking of the syscall number to restrict speculation through the
>     syscall table
> 
>   * Masking of __user pointers prior to deference in uaccess routines
> 
> The latter introduces complications in access_ok and set_fs which are
> also handled in this series.

Queued for 4.16. Thanks.

-- 
Catalin



More information about the linux-arm-kernel mailing list