Arm security updates as of 12th of January 2018
-----BEGIN PGP SIGNATURE-----
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=WL0w
-----END PGP SIGNATURE-----
arm: KVM: Invalidate icache on guest exit for Cortex-A15

In order to avoid aliasing attacks against the branch predictor
on Cortex-A15, let's invalidate the BTB on guest exit, which can
only be done by invalidating the icache (with ACTLR[0] being set).

We use the same hack as for A12/A17 to perform the vector decoding.

Signed-off-by: Marc Zyngier <marc.zyngier@arm.com>
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
2 files changed