diff options
author | Will Deacon <will.deacon@arm.com> | 2018-02-05 15:34:20 +0000 |
---|---|---|
committer | Catalin Marinas <catalin.marinas@arm.com> | 2018-02-06 22:53:35 +0000 |
commit | 6314d90e64936c584f300a52ef173603fb2461b5 (patch) | |
tree | fb62ec15844bee34626b37a80ec6d82d6ee3f26a /arch/xtensa/kernel/entry.S | |
parent | 4d8efc2d5ee4c9ccfeb29ee8afd47a8660d0c0ce (diff) |
arm64: entry: Ensure branch through syscall table is bounded under speculation
In a similar manner to array_index_mask_nospec, this patch introduces an
assembly macro (mask_nospec64) which can be used to bound a value under
speculation. This macro is then used to ensure that the indirect branch
through the syscall table is bounded under speculation, with out-of-range
addresses speculating as calls to sys_io_setup (0).
Reviewed-by: Mark Rutland <mark.rutland@arm.com>
Signed-off-by: Will Deacon <will.deacon@arm.com>
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
Diffstat (limited to 'arch/xtensa/kernel/entry.S')
0 files changed, 0 insertions, 0 deletions