Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp2929631ybx; Fri, 8 Nov 2019 11:24:33 -0800 (PST) X-Google-Smtp-Source: APXvYqxiV8Cs8iAMg8NM/UtBZf927ernMGVpbUROEw1AtOPsL1N/QL97dpjacoexPMx8BytuihF9 X-Received: by 2002:a05:6402:1a34:: with SMTP id be20mr12332555edb.221.1573241073052; Fri, 08 Nov 2019 11:24:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573241073; cv=none; d=google.com; s=arc-20160816; b=EZLW65tw9ImN5JKlEVBCgn1/3Th1pjax1XQesdCKK/C/rTFxQaNWDCfP4pDvoDqc6+ qLGiQSPgIr9UxBwGFrcnVlOydBGw2pjZt0apHai0w6osFZfTdVH5A3g14TLB9iWpnkhH x1O82ztbZNmsZ2rZnY45ejutg9Nf7e4IcmcqlmUrfPabEeyTQoP15B3JZcNlDDNDJ3Iu Jwv5NHFOfofDjuD0rbpH3demz4oWSpIDNzRzWzSBVkRmPoQsbjUpm2aqOCDZ9SJK7f+T Moof3iPD6CFUbKhXI6UJkSgKkm+xQwlmVOUxG5oD0rGR5oBif4FW4susGTq7oMeUi7cH ZE7w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=W37Eu/NOB0UDA8RSakPEzWHrPN/J1l+DXjf7yQHEn5E=; b=T26hK8qGjDqurZeZeZ6QaUAucQajveciJF94mcUr5uoZiF0MLWkFYXw5vc7dmB5XfI 9oPNObOE5OzXNkI/krqcb/Lv5MFsNWzTre53zPSXBskjdaTxDijzh/zmYSBKOUpwFgVp TBU56wOwDMhZhporFH66uCH3kJgWv5LT/lYYYlp4NtIul5KrMR1YYoBUAIgTa2t+Zzi0 KyXjNUgyVCQy/9fdgAikGfAOtsXeBo0E//9x54ciWvfQ/Lnt+L9N4W+5J5HU6VPtLa6s z/KppYYUlJDDyrEfn+jp7srd9N0zGFZmzDAVJNbzx3BrrrR38/etXcj7bt8EjIMMI2JJ 8m+w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=y5nalBcm; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r7si4557683edm.224.2019.11.08.11.24.09; Fri, 08 Nov 2019 11:24:33 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=y5nalBcm; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388970AbfKHTXf (ORCPT + 99 others); Fri, 8 Nov 2019 14:23:35 -0500 Received: from mail.kernel.org ([198.145.29.99]:51130 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732884AbfKHSyT (ORCPT ); Fri, 8 Nov 2019 13:54:19 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C61C42178F; Fri, 8 Nov 2019 18:54:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1573239249; bh=SiRX2WcJEqeeFkGkg/ORrfHEGEouVfa+skK4XZUnyiw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=y5nalBcmpyZwlIK7cnwrxXVUfv5z0vNrvQHN4gragwF/ZVpgRfQiXO+GD/srdizzT Sh7N08G/EExB+N4EQUj0gQ6CKBJxTANoQITvF1/uHaVyDk3yC1TFMyfrzERUdfpU9V OzVHP11cYjx9drEbM+CiCAiqvsRCUuT7mQRbJoN8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Greg Kroah-Hartman , "linus.walleij@linaro.org, rmk+kernel@armlinux.org.uk, Ard Biesheuvel" , Russell King , Mark Rutland , Tony Lindgren , "David A. Long" , Ard Biesheuvel Subject: [PATCH 4.4 51/75] ARM: spectre-v1: add array_index_mask_nospec() implementation Date: Fri, 8 Nov 2019 19:50:08 +0100 Message-Id: <20191108174754.520254735@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191108174708.135680837@linuxfoundation.org> References: <20191108174708.135680837@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Russell King Commit 1d4238c56f9816ce0f9c8dbe42d7f2ad81cb6613 upstream. Add an implementation of the array_index_mask_nospec() function for mitigating Spectre variant 1 throughout the kernel. Signed-off-by: Russell King Acked-by: Mark Rutland Boot-tested-by: Tony Lindgren Reviewed-by: Tony Lindgren Signed-off-by: David A. Long Signed-off-by: Greg Kroah-Hartman Signed-off-by: Ard Biesheuvel Signed-off-by: Greg Kroah-Hartman --- arch/arm/include/asm/barrier.h | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) --- a/arch/arm/include/asm/barrier.h +++ b/arch/arm/include/asm/barrier.h @@ -108,5 +108,26 @@ do { \ #define smp_mb__before_atomic() smp_mb() #define smp_mb__after_atomic() smp_mb() +#ifdef CONFIG_CPU_SPECTRE +static inline unsigned long array_index_mask_nospec(unsigned long idx, + unsigned long sz) +{ + unsigned long mask; + + asm volatile( + "cmp %1, %2\n" + " sbc %0, %1, %1\n" + CSDB + : "=r" (mask) + : "r" (idx), "Ir" (sz) + : "cc"); + + return mask; +} +#define array_index_mask_nospec array_index_mask_nospec +#endif + +#include + #endif /* !__ASSEMBLY__ */ #endif /* __ASM_BARRIER_H */