Branch: refs/heads/next
Home: https://github.com/siemens/jailhouse
Commit: ce10986e6637076778fa9a94968b7779d17a56a9
https://github.com/siemens/jailhouse/commit/ce10986e6637076778fa9a94968b7779d17a56a9
Author: Peng Fan <[email protected]>
Date: 2020-08-19 (Wed, 19 Aug 2020)
Changed paths:
M hypervisor/arch/arm64/entry.S
Log Message:
-----------
arm64: mitigate Straight-line Speculation
>From Linux Kernel
commit 679db70801da ("arm64: entry: Place an SB sequence following an ERET
instruction")
"
Some CPUs can speculate past an ERET instruction and potentially perform
speculative accesses to memory before processing the exception return.
Since the register state is often controlled by a lower privilege level
at the point of an ERET, this could potentially be used as part of a
side-channel attack.
"
Use Speculation barrier sequences:
- SB
- DSB followed by ISB
Since we not have ARMv8.5 with SB extension hardware, so only
use the 2nd approach now.
Signed-off-by: Peng Fan <[email protected]>
Signed-off-by: Jan Kiszka <[email protected]>
--
You received this message because you are subscribed to the Google Groups
"Jailhouse" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To view this discussion on the web visit
https://groups.google.com/d/msgid/jailhouse-dev/siemens/jailhouse/push/refs/heads/next/f34cb1-ce1098%40github.com.