[PATCH] arm64: only enable BHI mitigation on affected CPUs
Hauke Mehrtens
hauke at hauke-m.de
Sun Feb 26 11:11:49 PST 2023
On 11/7/22 07:36, DENG Qingfang wrote:
> When kernel 5.15 support was added, a new config symbol for ARM64 BHI
> mitigation was enabled, which was also later backported to 5.10. However,
> only a few CPUs are affected by BHI [0].
> Disable it by default, and enable it only on Cortex-A72 targets.
>
> [0] https://developer.arm.com/Arm%20Security%20Center/Spectre-BHB
> Fixes: 9a038e7fd12e ("generic: 5.15: copy config and patch from 5.10")
> Fixes: 048f0b170296 ("kernel: bump 5.10 to 5.10.105")
> Signed-off-by: DENG Qingfang <dqfext at gmail.com>
> ---
> target/linux/bcm27xx/bcm2711/config-5.15 | 1 +
> target/linux/generic/config-5.10 | 2 +-
> target/linux/generic/config-5.15 | 2 +-
> target/linux/mvebu/cortexa72/config-5.10 | 1 +
> target/linux/mvebu/cortexa72/config-5.15 | 1 +
> 5 files changed, 5 insertions(+), 2 deletions(-)
>
Sorry for the late answer.
Please rebase this patch, it does not apply any more.
The armvirt and the layerscape target could also run on out of order
CPUs. For octeontx I am not sure.
Please activate it there too.
Hauke
More information about the openwrt-devel
mailing list