Dear Will, On Mon, Jan 8, 2018 at 6:32 PM, Will Deacon <will.dea...@arm.com> wrote: > Aliasing attacks against CPU branch predictors can allow an attacker to > redirect speculative control flow on some CPUs and potentially divulge > information from one context to another. > > This patch adds initial skeleton code behind a new Kconfig option to > enable implementation-specific mitigations against these attacks for > CPUs that are affected. > > Signed-off-by: Marc Zyngier <marc.zyng...@arm.com> > Signed-off-by: Will Deacon <will.dea...@arm.com>
<snip> > --- /dev/null > +++ b/arch/arm64/kernel/bpi.S > @@ -0,0 +1,55 @@ > +/* > + * Contains CPU specific branch predictor invalidation sequences > + * > + * Copyright (C) 2018 ARM Ltd. > + * > + * This program is free software; you can redistribute it and/or modify > + * it under the terms of the GNU General Public License version 2 as > + * published by the Free Software Foundation. > + * > + * This program is distributed in the hope that it will be useful, > + * but WITHOUT ANY WARRANTY; without even the implied warranty of > + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the > + * GNU General Public License for more details. > + * > + * You should have received a copy of the GNU General Public License > + * along with this program. If not, see <http://www.gnu.org/licenses/>. > + */ Could you consider using the new SDPX tags [1] instead of this long legalese? Thanks! [1] https://lkml.org/lkml/2017/12/28/323 -- Cordially Philippe Ombredanne