]> git.ipfire.org Git - thirdparty/kernel/stable.git/commit
arm64: proton-pack: Report Spectre-BHB vulnerabilities as part of Spectre-v2
authorJames Morse <james.morse@arm.com>
Fri, 18 Mar 2022 17:48:37 +0000 (17:48 +0000)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Wed, 23 Mar 2022 08:10:43 +0000 (09:10 +0100)
commit7b012f6597e55a2ea4c7efe94b5d9a792b6e5757
treecee8201907a2b70f8bc45e2b6425870d0e785588
parent5b5ca2608fbd6f250281b6a1d0d73613f250e6f1
arm64: proton-pack: Report Spectre-BHB vulnerabilities as part of Spectre-v2

commit dee435be76f4117410bbd90573a881fd33488f37 upstream.

Speculation attacks against some high-performance processors can
make use of branch history to influence future speculation as part of
a spectre-v2 attack. This is not mitigated by CSV2, meaning CPUs that
previously reported 'Not affected' are now moderately mitigated by CSV2.

Update the value in /sys/devices/system/cpu/vulnerabilities/spectre_v2
to also show the state of the BHB mitigation.

Reviewed-by: Catalin Marinas <catalin.marinas@arm.com>
[ code move to cpu_errata.c for backport ]
Signed-off-by: James Morse <james.morse@arm.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
arch/arm64/include/asm/cpufeature.h
arch/arm64/kernel/cpu_errata.c