]> git.ipfire.org Git - thirdparty/kernel/stable.git/commit
arm64: proton-pack: Report Spectre-BHB vulnerabilities as part of Spectre-v2
authorJames Morse <james.morse@arm.com>
Thu, 31 Mar 2022 18:33:55 +0000 (19:33 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sat, 2 Apr 2022 10:41:10 +0000 (12:41 +0200)
commite2ee0b0d9677bfec26bfd22187cdd479f9789f47
treed4cb0707981e10a85082c75264a780a5b7254826
parent913fa37cc50d27c55b8c075980b4bbf6c6482a5b
arm64: proton-pack: Report Spectre-BHB vulnerabilities as part of Spectre-v2

commit dee435be76f4117410bbd90573a881fd33488f37 upstream.

Speculation attacks against some high-performance processors can
make use of branch history to influence future speculation as part of
a spectre-v2 attack. This is not mitigated by CSV2, meaning CPUs that
previously reported 'Not affected' are now moderately mitigated by CSV2.

Update the value in /sys/devices/system/cpu/vulnerabilities/spectre_v2
to also show the state of the BHB mitigation.

Reviewed-by: Catalin Marinas <catalin.marinas@arm.com>
[ code move to cpu_errata.c for backport ]
Signed-off-by: James Morse <james.morse@arm.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
arch/arm64/include/asm/cpufeature.h
arch/arm64/kernel/cpu_errata.c