From mboxrd@z Thu Jan 1 00:00:00 1970 Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755866AbeAHSos (ORCPT + 1 other); Mon, 8 Jan 2018 13:44:48 -0500 Received: from foss.arm.com ([217.140.101.70]:44366 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755815AbeAHSop (ORCPT ); Mon, 8 Jan 2018 13:44:45 -0500 Date: Mon, 8 Jan 2018 18:44:47 +0000 From: Will Deacon To: Shanker Donthineni Cc: Marc Zyngier , Christoffer Dall , linux-kernel , linux-arm-kernel , kvmarm , Catalin Marinas , Vikram Sethi , Sean Campbell Subject: Re: [PATCH] arm64: Implement branch predictor hardening for Falkor Message-ID: <20180108184446.GC13175@arm.com> References: <1515184139-23743-1-git-send-email-shankerd@codeaurora.org> <20180108170933.GU25869@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180108170933.GU25869@arm.com> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: On Mon, Jan 08, 2018 at 05:09:33PM +0000, Will Deacon wrote: > On Fri, Jan 05, 2018 at 02:28:59PM -0600, Shanker Donthineni wrote: > > Falkor is susceptible to branch predictor aliasing and can > > theoretically be attacked by malicious code. This patch > > implements a mitigation for these attacks, preventing any > > malicious entries from affecting other victim contexts. > > Thanks, Shanker. I'll pick this up (fixing the typo pointed out by Drew). Note that MIDR_FALKOR doesn't exist in mainline, so I had to drop those changes too. See the kpti branch for details. If you'd like anything else done here, please send additional patches to me and Catalin that we can apply on top of what we currently have. Note that I'm in the air tomorrow, so won't be picking up email. Cheers, Will