summaryrefslogtreecommitdiffstats
path: root/include/kvm
diff options
context:
space:
mode:
authorMarc Zyngier <marc.zyngier@arm.com>2018-02-15 11:49:20 +0000
committerMarc Zyngier <marc.zyngier@arm.com>2018-03-19 13:06:55 +0000
commit4b472ffd1513407ee3607b8e638e8695e9b487ca (patch)
tree08a8213a739f75191ec806452d18a7e6c712c8de /include/kvm
parentdee39247dc75465a24990cb1772c6aaced5fd910 (diff)
downloadop-kernel-dev-4b472ffd1513407ee3607b8e638e8695e9b487ca.zip
op-kernel-dev-4b472ffd1513407ee3607b8e638e8695e9b487ca.tar.gz
arm64: Enable ARM64_HARDEN_EL2_VECTORS on Cortex-A57 and A72
Cortex-A57 and A72 are vulnerable to the so-called "variant 3a" of Meltdown, where an attacker can speculatively obtain the value of a privileged system register. By enabling ARM64_HARDEN_EL2_VECTORS on these CPUs, obtaining VBAR_EL2 is not disclosing the hypervisor mappings anymore. Acked-by: Catalin Marinas <catalin.marinas@arm.com> Signed-off-by: Marc Zyngier <marc.zyngier@arm.com>
Diffstat (limited to 'include/kvm')
0 files changed, 0 insertions, 0 deletions
OpenPOWER on IntegriCloud