arm64: Rewrite Spectre-v4 mitigation code
Rewrite the Spectre-v4 mitigation handling code to follow the same
approach as that taken by Spectre-v2.
For now, report to KVM that the system is vulnerable (by forcing
'ssbd_state' to ARM64_SSBD_UNKNOWN), as this will be cleared up in
subsequent steps.
Signed-off-by:
Will Deacon <will@kernel.org>
Showing
- arch/arm64/include/asm/processor.h 2 additions, 17 deletionsarch/arm64/include/asm/processor.h
- arch/arm64/include/asm/spectre.h 5 additions, 0 deletionsarch/arm64/include/asm/spectre.h
- arch/arm64/kernel/cpu_errata.c 4 additions, 213 deletionsarch/arm64/kernel/cpu_errata.c
- arch/arm64/kernel/cpufeature.c 0 additions, 41 deletionsarch/arm64/kernel/cpufeature.c
- arch/arm64/kernel/entry.S 3 additions, 3 deletionsarch/arm64/kernel/entry.S
- arch/arm64/kernel/hibernate.c 1 addition, 5 deletionsarch/arm64/kernel/hibernate.c
- arch/arm64/kernel/process.c 3 additions, 14 deletionsarch/arm64/kernel/process.c
- arch/arm64/kernel/proton-pack.c 382 additions, 57 deletionsarch/arm64/kernel/proton-pack.c
- arch/arm64/kernel/suspend.c 1 addition, 2 deletionsarch/arm64/kernel/suspend.c
Please register or sign in to comment