[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v4 0/7] xen/arm32: Branch predictor hardening (XSA-254 variant 2)



Committed, thanks

On Fri, 2 Feb 2018, Julien Grall wrote:
> Hi all,
> 
> This series provides a skeleton for mitigating branch predictor hardening for
> arm32 on exception entry.
> 
> It also implements mitigation for Cortex-A12, A15 and A17. SoC vendors with
> affected CPUs are strongly encouraged to update.
> 
> For more information about the impact of this issue and the software 
> mitigations
> for Arm processors, please see http://www.arm.com/security-update.
> 
> Cheers,
> 
> Julien Grall (7):
>   xen/arm32: entry: Consolidate DEFINE_TRAP_ENTRY_* macros
>   xen/arm32: Add missing MIDR values for Cortex-A17 and A12
>   xen/arm32: entry: Add missing trap_reset entry
>   xen/arm32: Add skeleton to harden branch predictor aliasing attacks
>   xen/arm32: Invalidate BTB on guest exit for Cortex A17 and 12
>   xen/arm32: Invalidate icache on guest exist for Cortex-A15
>   xen/arm32: entry: Document the purpose of r11 in the traps handler
> 
>  xen/arch/arm/Kconfig            |   3 +
>  xen/arch/arm/arm32/entry.S      | 147 
> +++++++++++++++++++++++++++++++++-------
>  xen/arch/arm/arm32/traps.c      |   5 ++
>  xen/arch/arm/cpuerrata.c        |  62 +++++++++++++++++
>  xen/include/asm-arm/processor.h |   4 ++
>  5 files changed, 196 insertions(+), 25 deletions(-)
> 
> -- 
> 2.11.0
> 

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.