diff options
author | James Morse <james.morse@arm.com> | 2022-02-08 17:08:13 +0100 |
---|---|---|
committer | James Morse <james.morse@arm.com> | 2022-02-16 14:22:26 +0100 |
commit | dee435be76f4117410bbd90573a881fd33488f37 (patch) | |
tree | 6e4e6dd78356872f838e6ab61887efa38a412496 /arch/arm64/include/asm/spectre.h | |
parent | arm64: Add percpu vectors for EL1 (diff) | |
download | linux-dee435be76f4117410bbd90573a881fd33488f37.tar.xz linux-dee435be76f4117410bbd90573a881fd33488f37.zip |
arm64: proton-pack: Report Spectre-BHB vulnerabilities as part of Spectre-v2
Speculation attacks against some high-performance processors can
make use of branch history to influence future speculation as part of
a spectre-v2 attack. This is not mitigated by CSV2, meaning CPUs that
previously reported 'Not affected' are now moderately mitigated by CSV2.
Update the value in /sys/devices/system/cpu/vulnerabilities/spectre_v2
to also show the state of the BHB mitigation.
Reviewed-by: Catalin Marinas <catalin.marinas@arm.com>
Signed-off-by: James Morse <james.morse@arm.com>
Diffstat (limited to 'arch/arm64/include/asm/spectre.h')
-rw-r--r-- | arch/arm64/include/asm/spectre.h | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/arch/arm64/include/asm/spectre.h b/arch/arm64/include/asm/spectre.h index f62ca39da6c5..c617fe90a843 100644 --- a/arch/arm64/include/asm/spectre.h +++ b/arch/arm64/include/asm/spectre.h @@ -93,5 +93,7 @@ void spectre_v4_enable_task_mitigation(struct task_struct *tsk); enum mitigation_state arm64_get_meltdown_state(void); +enum mitigation_state arm64_get_spectre_bhb_state(void); + #endif /* __ASSEMBLY__ */ #endif /* __ASM_SPECTRE_H */ |