Skip to content
  1. Jul 12, 2021
  2. Jun 22, 2021
  3. Jun 11, 2021
  4. May 26, 2021
  5. Apr 30, 2021
  6. Apr 08, 2021
  7. Mar 26, 2021
  8. Mar 25, 2021
  9. Mar 24, 2021
  10. Mar 19, 2021
  11. Feb 12, 2021
  12. Feb 09, 2021
  13. Feb 08, 2021
  14. Jan 05, 2021
  15. Dec 22, 2020
  16. Dec 04, 2020
  17. Dec 03, 2020
  18. Dec 02, 2020
  19. Nov 28, 2020
  20. Nov 13, 2020
  21. Nov 09, 2020
  22. Oct 01, 2020
  23. Sep 29, 2020
    • Will Deacon's avatar
      arm64: Rewrite Spectre-v4 mitigation code · c2876207
      Will Deacon authored
      
      
      Rewrite the Spectre-v4 mitigation handling code to follow the same
      approach as that taken by Spectre-v2.
      
      For now, report to KVM that the system is vulnerable (by forcing
      'ssbd_state' to ARM64_SSBD_UNKNOWN), as this will be cleared up in
      subsequent steps.
      
      Signed-off-by: default avatarWill Deacon <will@kernel.org>
      c2876207
    • Will Deacon's avatar
      arm64: Treat SSBS as a non-strict system feature · 532d5815
      Will Deacon authored
      
      
      If all CPUs discovered during boot have SSBS, then spectre-v4 will be
      considered to be "mitigated". However, we still allow late CPUs without
      SSBS to be onlined, albeit with a "SANITY CHECK" warning. This is
      problematic for userspace because it means that the system can quietly
      transition to "Vulnerable" at runtime.
      
      Avoid this by treating SSBS as a non-strict system feature: if all of
      the CPUs discovered during boot have SSBS, then late arriving secondaries
      better have it as well.
      
      Signed-off-by: default avatarWill Deacon <will@kernel.org>
      532d5815
    • Will Deacon's avatar
      arm64: Remove Spectre-related CONFIG_* options · 6e5f0927
      Will Deacon authored
      
      
      The spectre mitigations are too configurable for their own good, leading
      to confusing logic trying to figure out when we should mitigate and when
      we shouldn't. Although the plethora of command-line options need to stick
      around for backwards compatibility, the default-on CONFIG options that
      depend on EXPERT can be dropped, as the mitigations only do anything if
      the system is vulnerable, a mitigation is available and the command-line
      hasn't disabled it.
      
      Remove CONFIG_HARDEN_BRANCH_PREDICTOR and CONFIG_ARM64_SSBD in favour of
      enabling this code unconditionally.
      
      Signed-off-by: default avatarWill Deacon <will@kernel.org>
      6e5f0927
Loading