On 11/7/22 07:36, DENG Qingfang wrote:
When kernel 5.15 support was added, a new config symbol for ARM64 BHI
mitigation was enabled, which was also later backported to 5.10. However,
only a few CPUs are affected by BHI [0].
Disable it by default, and enable it only on Cortex-A72 targets.

[0] https://developer.arm.com/Arm%20Security%20Center/Spectre-BHB
Fixes: 9a038e7fd12e ("generic: 5.15: copy config and patch from 5.10")
Fixes: 048f0b170296 ("kernel: bump 5.10 to 5.10.105")
Signed-off-by: DENG Qingfang <dqf...@gmail.com>
---
  target/linux/bcm27xx/bcm2711/config-5.15 | 1 +
  target/linux/generic/config-5.10         | 2 +-
  target/linux/generic/config-5.15         | 2 +-
  target/linux/mvebu/cortexa72/config-5.10 | 1 +
  target/linux/mvebu/cortexa72/config-5.15 | 1 +
  5 files changed, 5 insertions(+), 2 deletions(-)


Sorry for the late answer.

Please rebase this patch, it does not apply any more.

The armvirt and the layerscape target could also run on out of order CPUs. For octeontx I am not sure.
Please activate it there too.

Hauke

_______________________________________________
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel

Reply via email to