[PATCH 06/14] ARM: spectre-v2: harden branch predictor on context switches
Vladimir Murzin
vladimir.murzin at arm.com
Wed May 16 04:33:54 PDT 2018
On 16/05/18 12:01, Russell King wrote:
> __v7_cr7mp_proc_info:
> .long 0x410fc170
> .long 0xff0ffff0
> - __v7_proc __v7_cr7mp_proc_info, __v7_cr7mp_setup
> + __v7_proc __v7_cr7mp_proc_info, __v7_cr7mp_setup, proc_fns = HARDENED_BPIALL_PROCESSOR_FUNCTIONS
> .size __v7_cr7mp_proc_info, . - __v7_cr7mp_proc_info
>
> /*
> @@ -649,7 +700,7 @@ ENDPROC(__v7_setup)
> __v7_cr8mp_proc_info:
> .long 0x410fc180
> .long 0xff0ffff0
> - __v7_proc __v7_cr8mp_proc_info, __v7_cr8mp_setup
> + __v7_proc __v7_cr8mp_proc_info, __v7_cr8mp_setup, proc_fns = HARDENED_BPIALL_PROCESSOR_FUNCTIONS
> .size __v7_cr8mp_proc_info, . - __v7_cr8mp_proc_info
For R-class cores, the mitigation doesn't make much sense since we do not enforce user/kernel
isolation anyway. I believe the same also applies to A-class cores built with !MMU, so you might
want to guard CPU_SPECTRE with MMU in PATCH 05/14.
Cheers
Vladimir
More information about the linux-arm-kernel
mailing list