]> git.baikalelectronics.ru Git - kernel.git/commit
arm64: Treat SSBS as a non-strict system feature
authorWill Deacon <will@kernel.org>
Tue, 15 Sep 2020 22:56:12 +0000 (23:56 +0100)
committerWill Deacon <will@kernel.org>
Tue, 29 Sep 2020 15:08:16 +0000 (16:08 +0100)
commit2ea2e0b6a0ef24b9c213dc71ace1622b88ecb7bb
treeef2dba6c2adf928e5dc46159d0daa68662e4d47e
parent31e6808870cb2dc84e9576c43a4b38189bb2a762
arm64: Treat SSBS as a non-strict system feature

If all CPUs discovered during boot have SSBS, then spectre-v4 will be
considered to be "mitigated". However, we still allow late CPUs without
SSBS to be onlined, albeit with a "SANITY CHECK" warning. This is
problematic for userspace because it means that the system can quietly
transition to "Vulnerable" at runtime.

Avoid this by treating SSBS as a non-strict system feature: if all of
the CPUs discovered during boot have SSBS, then late arriving secondaries
better have it as well.

Signed-off-by: Will Deacon <will@kernel.org>
arch/arm64/kernel/cpufeature.c