[PATCH] arm64: only enable BHI mitigation on affected CPUs

Hauke Mehrtens hauke at hauke-m.de
Sun Feb 26 11:11:49 PST 2023


On 11/7/22 07:36, DENG Qingfang wrote:
> When kernel 5.15 support was added, a new config symbol for ARM64 BHI
> mitigation was enabled, which was also later backported to 5.10. However,
> only a few CPUs are affected by BHI [0].
> Disable it by default, and enable it only on Cortex-A72 targets.
> 
> [0] https://developer.arm.com/Arm%20Security%20Center/Spectre-BHB
> Fixes: 9a038e7fd12e ("generic: 5.15: copy config and patch from 5.10")
> Fixes: 048f0b170296 ("kernel: bump 5.10 to 5.10.105")
> Signed-off-by: DENG Qingfang <dqfext at gmail.com>
> ---
>   target/linux/bcm27xx/bcm2711/config-5.15 | 1 +
>   target/linux/generic/config-5.10         | 2 +-
>   target/linux/generic/config-5.15         | 2 +-
>   target/linux/mvebu/cortexa72/config-5.10 | 1 +
>   target/linux/mvebu/cortexa72/config-5.15 | 1 +
>   5 files changed, 5 insertions(+), 2 deletions(-)
> 

Sorry for the late answer.

Please rebase this patch, it does not apply any more.

The armvirt and the layerscape target could also run on out of order 
CPUs. For octeontx I am not sure.
Please activate it there too.

Hauke



More information about the openwrt-devel mailing list