diff options
author | Marc Zyngier <marc.zyngier@arm.com> | 2018-02-15 11:49:20 +0000 |
---|---|---|
committer | Marc Zyngier <marc.zyngier@arm.com> | 2018-03-19 13:06:55 +0000 |
commit | 4b472ffd1513407ee3607b8e638e8695e9b487ca (patch) | |
tree | 08a8213a739f75191ec806452d18a7e6c712c8de /include/kvm | |
parent | dee39247dc75465a24990cb1772c6aaced5fd910 (diff) | |
download | op-kernel-dev-4b472ffd1513407ee3607b8e638e8695e9b487ca.zip op-kernel-dev-4b472ffd1513407ee3607b8e638e8695e9b487ca.tar.gz |
arm64: Enable ARM64_HARDEN_EL2_VECTORS on Cortex-A57 and A72
Cortex-A57 and A72 are vulnerable to the so-called "variant 3a" of
Meltdown, where an attacker can speculatively obtain the value
of a privileged system register.
By enabling ARM64_HARDEN_EL2_VECTORS on these CPUs, obtaining
VBAR_EL2 is not disclosing the hypervisor mappings anymore.
Acked-by: Catalin Marinas <catalin.marinas@arm.com>
Signed-off-by: Marc Zyngier <marc.zyngier@arm.com>
Diffstat (limited to 'include/kvm')
0 files changed, 0 insertions, 0 deletions