arm64: Rewrite Spectre-v4 mitigation code
authorWill Deacon <will@kernel.org>
Fri, 18 Sep 2020 10:54:33 +0000 (11:54 +0100)
committerWill Deacon <will@kernel.org>
Tue, 29 Sep 2020 15:08:16 +0000 (16:08 +0100)
commitc28762070ca651fe7a981b8f31d972c9b7d2c386
tree907e7cdfc0461b55880ac1ecccc54e460797f219
parent9e78b659b4539ee20fd0c415cf8c231cea59e9c0
arm64: Rewrite Spectre-v4 mitigation code

Rewrite the Spectre-v4 mitigation handling code to follow the same
approach as that taken by Spectre-v2.

For now, report to KVM that the system is vulnerable (by forcing
'ssbd_state' to ARM64_SSBD_UNKNOWN), as this will be cleared up in
subsequent steps.

Signed-off-by: Will Deacon <will@kernel.org>
arch/arm64/include/asm/processor.h
arch/arm64/include/asm/spectre.h
arch/arm64/kernel/cpu_errata.c
arch/arm64/kernel/cpufeature.c
arch/arm64/kernel/entry.S
arch/arm64/kernel/hibernate.c
arch/arm64/kernel/process.c
arch/arm64/kernel/proton-pack.c
arch/arm64/kernel/suspend.c