Home
last modified time | relevance | path

Searched hist:"0 f15adbb2861ce6f75ccfc5a92b19eae0ef327d0" (Results 1 – 9 of 9) sorted by relevance

/openbmc/linux/arch/arm64/mm/
H A Dcontext.cdiff 0f15adbb2861ce6f75ccfc5a92b19eae0ef327d0 Wed Jan 03 05:17:58 CST 2018 Will Deacon <will.deacon@arm.com> arm64: Add skeleton to harden the branch predictor against aliasing attacks

Aliasing attacks against CPU branch predictors can allow an attacker to
redirect speculative control flow on some CPUs and potentially divulge
information from one context to another.

This patch adds initial skeleton code behind a new Kconfig option to
enable implementation-specific mitigations against these attacks for
CPUs that are affected.

Co-developed-by: Marc Zyngier <marc.zyngier@arm.com>
Signed-off-by: Will Deacon <will.deacon@arm.com>
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
H A Dfault.cdiff 0f15adbb2861ce6f75ccfc5a92b19eae0ef327d0 Wed Jan 03 05:17:58 CST 2018 Will Deacon <will.deacon@arm.com> arm64: Add skeleton to harden the branch predictor against aliasing attacks

Aliasing attacks against CPU branch predictors can allow an attacker to
redirect speculative control flow on some CPUs and potentially divulge
information from one context to another.

This patch adds initial skeleton code behind a new Kconfig option to
enable implementation-specific mitigations against these attacks for
CPUs that are affected.

Co-developed-by: Marc Zyngier <marc.zyngier@arm.com>
Signed-off-by: Will Deacon <will.deacon@arm.com>
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
/openbmc/linux/arch/arm64/include/asm/
H A Dmmu.hdiff 0f15adbb2861ce6f75ccfc5a92b19eae0ef327d0 Wed Jan 03 05:17:58 CST 2018 Will Deacon <will.deacon@arm.com> arm64: Add skeleton to harden the branch predictor against aliasing attacks

Aliasing attacks against CPU branch predictors can allow an attacker to
redirect speculative control flow on some CPUs and potentially divulge
information from one context to another.

This patch adds initial skeleton code behind a new Kconfig option to
enable implementation-specific mitigations against these attacks for
CPUs that are affected.

Co-developed-by: Marc Zyngier <marc.zyngier@arm.com>
Signed-off-by: Will Deacon <will.deacon@arm.com>
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
H A Dsysreg.hdiff 0f15adbb2861ce6f75ccfc5a92b19eae0ef327d0 Wed Jan 03 05:17:58 CST 2018 Will Deacon <will.deacon@arm.com> arm64: Add skeleton to harden the branch predictor against aliasing attacks

Aliasing attacks against CPU branch predictors can allow an attacker to
redirect speculative control flow on some CPUs and potentially divulge
information from one context to another.

This patch adds initial skeleton code behind a new Kconfig option to
enable implementation-specific mitigations against these attacks for
CPUs that are affected.

Co-developed-by: Marc Zyngier <marc.zyngier@arm.com>
Signed-off-by: Will Deacon <will.deacon@arm.com>
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
/openbmc/linux/arch/arm64/kernel/
H A DMakefilediff 0f15adbb2861ce6f75ccfc5a92b19eae0ef327d0 Wed Jan 03 05:17:58 CST 2018 Will Deacon <will.deacon@arm.com> arm64: Add skeleton to harden the branch predictor against aliasing attacks

Aliasing attacks against CPU branch predictors can allow an attacker to
redirect speculative control flow on some CPUs and potentially divulge
information from one context to another.

This patch adds initial skeleton code behind a new Kconfig option to
enable implementation-specific mitigations against these attacks for
CPUs that are affected.

Co-developed-by: Marc Zyngier <marc.zyngier@arm.com>
Signed-off-by: Will Deacon <will.deacon@arm.com>
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
H A Dcpu_errata.cdiff 0f15adbb2861ce6f75ccfc5a92b19eae0ef327d0 Wed Jan 03 05:17:58 CST 2018 Will Deacon <will.deacon@arm.com> arm64: Add skeleton to harden the branch predictor against aliasing attacks

Aliasing attacks against CPU branch predictors can allow an attacker to
redirect speculative control flow on some CPUs and potentially divulge
information from one context to another.

This patch adds initial skeleton code behind a new Kconfig option to
enable implementation-specific mitigations against these attacks for
CPUs that are affected.

Co-developed-by: Marc Zyngier <marc.zyngier@arm.com>
Signed-off-by: Will Deacon <will.deacon@arm.com>
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
H A Dentry.Sdiff 0f15adbb2861ce6f75ccfc5a92b19eae0ef327d0 Wed Jan 03 05:17:58 CST 2018 Will Deacon <will.deacon@arm.com> arm64: Add skeleton to harden the branch predictor against aliasing attacks

Aliasing attacks against CPU branch predictors can allow an attacker to
redirect speculative control flow on some CPUs and potentially divulge
information from one context to another.

This patch adds initial skeleton code behind a new Kconfig option to
enable implementation-specific mitigations against these attacks for
CPUs that are affected.

Co-developed-by: Marc Zyngier <marc.zyngier@arm.com>
Signed-off-by: Will Deacon <will.deacon@arm.com>
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
H A Dcpufeature.cdiff 0f15adbb2861ce6f75ccfc5a92b19eae0ef327d0 Wed Jan 03 05:17:58 CST 2018 Will Deacon <will.deacon@arm.com> arm64: Add skeleton to harden the branch predictor against aliasing attacks

Aliasing attacks against CPU branch predictors can allow an attacker to
redirect speculative control flow on some CPUs and potentially divulge
information from one context to another.

This patch adds initial skeleton code behind a new Kconfig option to
enable implementation-specific mitigations against these attacks for
CPUs that are affected.

Co-developed-by: Marc Zyngier <marc.zyngier@arm.com>
Signed-off-by: Will Deacon <will.deacon@arm.com>
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
/openbmc/linux/arch/arm64/
H A DKconfigdiff 0f15adbb2861ce6f75ccfc5a92b19eae0ef327d0 Wed Jan 03 05:17:58 CST 2018 Will Deacon <will.deacon@arm.com> arm64: Add skeleton to harden the branch predictor against aliasing attacks

Aliasing attacks against CPU branch predictors can allow an attacker to
redirect speculative control flow on some CPUs and potentially divulge
information from one context to another.

This patch adds initial skeleton code behind a new Kconfig option to
enable implementation-specific mitigations against these attacks for
CPUs that are affected.

Co-developed-by: Marc Zyngier <marc.zyngier@arm.com>
Signed-off-by: Will Deacon <will.deacon@arm.com>
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>