From nobody Thu May 7 19:54:38 2026 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5D8DDC433F5 for ; Thu, 19 May 2022 16:14:19 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241443AbiESQOR (ORCPT ); Thu, 19 May 2022 12:14:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35954 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237790AbiESQOK (ORCPT ); Thu, 19 May 2022 12:14:10 -0400 Received: from bhuna.collabora.co.uk (bhuna.collabora.co.uk [46.235.227.227]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 49558C6E66 for ; Thu, 19 May 2022 09:14:09 -0700 (PDT) Received: from [127.0.0.1] (localhost [127.0.0.1]) (Authenticated sender: dmitry.osipenko) with ESMTPSA id C735C1F45E73 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=collabora.com; s=mail; t=1652976848; bh=rfIX7T1vrLJCiPikRvVRNfxxyu38980k27vFI1IQdo8=; h=From:To:Cc:Subject:Date:From; b=oKM8pdgKa1t9qM2com5SF7AqoSdEe+EA9I1xdAm8WYcWB0ahj8mUoIj8JYvNuhcSy k44S3tO8DOXFkiEV+qsK4s/Cw5e7oJGJaMqVSV2+/IJfTkTvBwYcLMNi7kYFe/wtBa l7jDJgsD/pFJJCmxvKDeaUXCRCJPIpONX+QuiD1fwFpabxQd6f3be/tMbc61gLP1qV DpffxxiQC3dHlPt6YXYQfsxZR2cJ5nWKRU5bStYs+LXUv0fnCQoyPMHaRyjpdcT7Iq T3sXz+sfOytVsZxPZS4w44OxwravQEGqnBOZwOVlasbf9jVIfum+GjKVQJsF5v476A Gk7HmLkFKQNeg== From: Dmitry Osipenko To: Russell King Cc: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: [PATCH v1] ARM: Silence proc-v7-bugs.c spam about disabled Spectre workarounds Date: Thu, 19 May 2022 19:13:10 +0300 Message-Id: <20220519161310.1489625-1-dmitry.osipenko@collabora.com> X-Mailer: git-send-email 2.35.3 MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Type: text/plain; charset="utf-8" Print message about disabled Spectre workarounds only once to stop endless spam into KSMG each time CPU goes out from idling state. This spam makes system unusable with CONFIG_HARDEN_BRANCH_PREDICTOR=3Dn for those who don't care about security and wants maximum performance. Signed-off-by: Dmitry Osipenko --- arch/arm/mm/proc-v7-bugs.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/arch/arm/mm/proc-v7-bugs.c b/arch/arm/mm/proc-v7-bugs.c index fb9f3eb6bf48..f9730eba0632 100644 --- a/arch/arm/mm/proc-v7-bugs.c +++ b/arch/arm/mm/proc-v7-bugs.c @@ -108,8 +108,7 @@ static unsigned int spectre_v2_install_workaround(unsig= ned int method) #else static unsigned int spectre_v2_install_workaround(unsigned int method) { - pr_info("CPU%u: Spectre V2: workarounds disabled by configuration\n", - smp_processor_id()); + pr_info_once("Spectre V2: workarounds disabled by configuration\n"); =20 return SPECTRE_VULNERABLE; } --=20 2.35.3