From patchwork Thu May 19 16:13:10 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Dmitry Osipenko X-Patchwork-Id: 12855757 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 4EC8DC433EF for ; Thu, 19 May 2022 16:15:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-Id:Date:Subject:Cc :To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=yEwMauaI7CqN0zrPVcPMKPNUgXfSOQGZMXMyLguweYY=; b=UXRElQHyukwRnk 2LFURS2Tk+qDpnmhrH4UCl09uydtUZSx1RkfRocNry0tPEYfmBRzK0nQ8GsrPOv8Bil47TnI8U5NA RAag1LZTBiJjIUMBZ7n9hja/HiyeWEKFBpaqIzZO/fpcH16+WtJ2WgOtXwen8Wi+0XoS9wfF7eUuz TGAarOGeB4V+ba+6W/khh9uriMK8xe3fz/w7F+ln6YZ3kwCx86F3Sqv0ejJdugxzWI01Bu11zK3HQ 48dizLQnu8/fqhRTa1ynHzgT645Yb9A6dGT8zKgvHm+iue+bYVvOGIc7IkmnFoRXPi0wtNAgJ7Ooh rVjMhHRRFj5jAYXBVVsA==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1nrinA-008KxO-3V; Thu, 19 May 2022 16:14:24 +0000 Received: from bhuna.collabora.co.uk ([46.235.227.227]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1nrimw-008Kwi-39 for linux-arm-kernel@lists.infradead.org; Thu, 19 May 2022 16:14:11 +0000 Received: from [127.0.0.1] (localhost [127.0.0.1]) (Authenticated sender: dmitry.osipenko) with ESMTPSA id C735C1F45E73 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=collabora.com; s=mail; t=1652976848; bh=rfIX7T1vrLJCiPikRvVRNfxxyu38980k27vFI1IQdo8=; h=From:To:Cc:Subject:Date:From; b=oKM8pdgKa1t9qM2com5SF7AqoSdEe+EA9I1xdAm8WYcWB0ahj8mUoIj8JYvNuhcSy k44S3tO8DOXFkiEV+qsK4s/Cw5e7oJGJaMqVSV2+/IJfTkTvBwYcLMNi7kYFe/wtBa l7jDJgsD/pFJJCmxvKDeaUXCRCJPIpONX+QuiD1fwFpabxQd6f3be/tMbc61gLP1qV DpffxxiQC3dHlPt6YXYQfsxZR2cJ5nWKRU5bStYs+LXUv0fnCQoyPMHaRyjpdcT7Iq T3sXz+sfOytVsZxPZS4w44OxwravQEGqnBOZwOVlasbf9jVIfum+GjKVQJsF5v476A Gk7HmLkFKQNeg== From: Dmitry Osipenko To: Russell King Cc: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: [PATCH v1] ARM: Silence proc-v7-bugs.c spam about disabled Spectre workarounds Date: Thu, 19 May 2022 19:13:10 +0300 Message-Id: <20220519161310.1489625-1-dmitry.osipenko@collabora.com> X-Mailer: git-send-email 2.35.3 MIME-Version: 1.0 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20220519_091410_303225_2D8B073D X-CRM114-Status: GOOD ( 10.48 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Print message about disabled Spectre workarounds only once to stop endless spam into KSMG each time CPU goes out from idling state. This spam makes system unusable with CONFIG_HARDEN_BRANCH_PREDICTOR=n for those who don't care about security and wants maximum performance. Signed-off-by: Dmitry Osipenko --- arch/arm/mm/proc-v7-bugs.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/arch/arm/mm/proc-v7-bugs.c b/arch/arm/mm/proc-v7-bugs.c index fb9f3eb6bf48..f9730eba0632 100644 --- a/arch/arm/mm/proc-v7-bugs.c +++ b/arch/arm/mm/proc-v7-bugs.c @@ -108,8 +108,7 @@ static unsigned int spectre_v2_install_workaround(unsigned int method) #else static unsigned int spectre_v2_install_workaround(unsigned int method) { - pr_info("CPU%u: Spectre V2: workarounds disabled by configuration\n", - smp_processor_id()); + pr_info_once("Spectre V2: workarounds disabled by configuration\n"); return SPECTRE_VULNERABLE; }