[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20220519161310.1489625-1-dmitry.osipenko@collabora.com>
Date: Thu, 19 May 2022 19:13:10 +0300
From: Dmitry Osipenko <dmitry.osipenko@...labora.com>
To: Russell King <rmk+kernel@...linux.org.uk>
Cc: linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org
Subject: [PATCH v1] ARM: Silence proc-v7-bugs.c spam about disabled Spectre workarounds
Print message about disabled Spectre workarounds only once to stop
endless spam into KSMG each time CPU goes out from idling state.
This spam makes system unusable with CONFIG_HARDEN_BRANCH_PREDICTOR=n
for those who don't care about security and wants maximum performance.
Signed-off-by: Dmitry Osipenko <dmitry.osipenko@...labora.com>
---
arch/arm/mm/proc-v7-bugs.c | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git a/arch/arm/mm/proc-v7-bugs.c b/arch/arm/mm/proc-v7-bugs.c
index fb9f3eb6bf48..f9730eba0632 100644
--- a/arch/arm/mm/proc-v7-bugs.c
+++ b/arch/arm/mm/proc-v7-bugs.c
@@ -108,8 +108,7 @@ static unsigned int spectre_v2_install_workaround(unsigned int method)
#else
static unsigned int spectre_v2_install_workaround(unsigned int method)
{
- pr_info("CPU%u: Spectre V2: workarounds disabled by configuration\n",
- smp_processor_id());
+ pr_info_once("Spectre V2: workarounds disabled by configuration\n");
return SPECTRE_VULNERABLE;
}
--
2.35.3
Powered by blists - more mailing lists