diff options
author | Mark Kettenis <kettenis@cvs.openbsd.org> | 2018-01-15 14:11:17 +0000 |
---|---|---|
committer | Mark Kettenis <kettenis@cvs.openbsd.org> | 2018-01-15 14:11:17 +0000 |
commit | ebf81fbfc88061d716d7d3e6c5f53fc9c8180918 (patch) | |
tree | 8f4eb8b41444875997d7dda8d711d61fa89029ad /bin/ksh/exec.c | |
parent | e2ac9ca115f15432a4670def54b676fb60a1839c (diff) |
Improve defense against branch predictor target injection (Spectre "variant 2")
attacks. OpenBSD/armv7 is already in pretty good shape as we have always
been flushing the branch predictor cache on context switches. This diff adds
additional flushes to page faults in kernel address space. The impact on
performance should be minimal as these page faults should only happen when
userland (deliberately or accidentally) tries to access kernel addres space
which would lead to a fatal signal (SIGSEGV or SIGBUS).
Loosely based on changes made by Marc Zyngier in Linux and based on
information in Arm Trusted Firmware Security Advisory TFV 6.
Note that for Cortex-A15 (and Cortex-A72) you will need firmware that sets
the ACTRL[0] bit for this diff to be effective. Also note that with this
diff Cortex-A57 is still vulnerable.
ok jsg@
Diffstat (limited to 'bin/ksh/exec.c')
0 files changed, 0 insertions, 0 deletions