arm64: Treat SSBS as a non-strict system feature
authorWill Deacon <will@kernel.org>
Tue, 15 Sep 2020 22:56:12 +0000 (23:56 +0100)
committerWill Deacon <will@kernel.org>
Tue, 29 Sep 2020 15:08:16 +0000 (16:08 +0100)
commit532d581583f25d4c297c721700f74b913f8cf37b
treeef2dba6c2adf928e5dc46159d0daa68662e4d47e
parenta8de949893880a26458de03f5bc70075aba13d95
arm64: Treat SSBS as a non-strict system feature

If all CPUs discovered during boot have SSBS, then spectre-v4 will be
considered to be "mitigated". However, we still allow late CPUs without
SSBS to be onlined, albeit with a "SANITY CHECK" warning. This is
problematic for userspace because it means that the system can quietly
transition to "Vulnerable" at runtime.

Avoid this by treating SSBS as a non-strict system feature: if all of
the CPUs discovered during boot have SSBS, then late arriving secondaries
better have it as well.

Signed-off-by: Will Deacon <will@kernel.org>
arch/arm64/kernel/cpufeature.c