summaryrefslogtreecommitdiff
path: root/arch/arm64/kvm/hyp/hyp-entry.S
diff options
context:
space:
mode:
authorWill Deacon <will@kernel.org>2020-09-18 13:54:33 +0300
committerWill Deacon <will@kernel.org>2020-09-29 18:08:16 +0300
commitc28762070ca651fe7a981b8f31d972c9b7d2c386 (patch)
tree907e7cdfc0461b55880ac1ecccc54e460797f219 /arch/arm64/kvm/hyp/hyp-entry.S
parent9e78b659b4539ee20fd0c415cf8c231cea59e9c0 (diff)
downloadlinux-c28762070ca651fe7a981b8f31d972c9b7d2c386.tar.xz
arm64: Rewrite Spectre-v4 mitigation code
Rewrite the Spectre-v4 mitigation handling code to follow the same approach as that taken by Spectre-v2. For now, report to KVM that the system is vulnerable (by forcing 'ssbd_state' to ARM64_SSBD_UNKNOWN), as this will be cleared up in subsequent steps. Signed-off-by: Will Deacon <will@kernel.org>
Diffstat (limited to 'arch/arm64/kvm/hyp/hyp-entry.S')
0 files changed, 0 insertions, 0 deletions