[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20180702213543.29202.79104.stgit@tlendack-t1.amdoffice.net>
Date: Mon, 02 Jul 2018 16:35:43 -0500
From: Tom Lendacky <thomas.lendacky@....com>
To: x86@...nel.org, linux-kernel@...r.kernel.org
Cc: Konrad Rzeszutek Wilk <konrad.wilk@...cle.com>,
Ingo Molnar <mingo@...hat.com>,
"H. Peter Anvin" <hpa@...or.com>,
Thomas Gleixner <tglx@...utronix.de>,
Borislav Petkov <bpetkov@...e.de>,
David Woodhouse <dwmw@...zon.co.uk>
Subject: [PATCH 0/2] x86/bugs: Updates to SSBD support on AMD
These patches update the SSBD support on AMD processors.
The following patches are included in this series:
- In addition to checking the family, the check for the LS_CFG_SSBD
feature only needs to done if both the AMD_SSBD and VIRT_SSBD features
are not present.
- Since AMD can support more than one SSBD mitigation method, the check
for when to use the SPEC_CTRL MSR for SSBD support needs to be more
specific. Explicitly check for the features that use the SPEC_CTRL MSR.
This patch series is based on tip:master.
---
Tom Lendacky (2):
x86/bugs: Update when to check for the LS_CFG SSBD mitigation
x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR
arch/x86/kernel/cpu/amd.c | 4 +++-
arch/x86/kernel/cpu/bugs.c | 8 +++++---
2 files changed, 8 insertions(+), 4 deletions(-)
--
Tom Lendacky
Powered by blists - more mailing lists