]> git.baikalelectronics.ru Git - kernel.git/commitdiff
arm64: Enable ARM64_HARDEN_EL2_VECTORS on Cortex-A57 and A72
authorMarc Zyngier <marc.zyngier@arm.com>
Thu, 15 Feb 2018 11:49:20 +0000 (11:49 +0000)
committerMarc Zyngier <marc.zyngier@arm.com>
Mon, 19 Mar 2018 13:06:55 +0000 (13:06 +0000)
Cortex-A57 and A72 are vulnerable to the so-called "variant 3a" of
Meltdown, where an attacker can speculatively obtain the value
of a privileged system register.

By enabling ARM64_HARDEN_EL2_VECTORS on these CPUs, obtaining
VBAR_EL2 is not disclosing the hypervisor mappings anymore.

Acked-by: Catalin Marinas <catalin.marinas@arm.com>
Signed-off-by: Marc Zyngier <marc.zyngier@arm.com>
arch/arm64/kernel/cpu_errata.c

index 8cf6b60a085a79e3e80100b36747f720f63e7099..aacdc118c4c9d456194aec76f01272ff1a08bf75 100644 (file)
@@ -424,6 +424,18 @@ const struct arm64_cpu_capabilities arm64_errata[] = {
                MIDR_ALL_VERSIONS(MIDR_CAVIUM_THUNDERX2),
                .enable = enable_smccc_arch_workaround_1,
        },
+#endif
+#ifdef CONFIG_HARDEN_EL2_VECTORS
+       {
+               .desc = "Cortex-A57 EL2 vector hardening",
+               .capability = ARM64_HARDEN_EL2_VECTORS,
+               MIDR_ALL_VERSIONS(MIDR_CORTEX_A57),
+       },
+       {
+               .desc = "Cortex-A72 EL2 vector hardening",
+               .capability = ARM64_HARDEN_EL2_VECTORS,
+               MIDR_ALL_VERSIONS(MIDR_CORTEX_A72),
+       },
 #endif
        {
        }