[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <5b657203-3a02-4b7a-4726-2e5ab2d7f099@intel.com>
Date: Fri, 11 Aug 2023 17:15:37 -0700
From: Sohil Mehta <sohil.mehta@...el.com>
To: Dave Hansen <dave.hansen@...el.com>,
Jo Van Bulck <jo.vanbulck@...kuleuven.be>,
<linux-kernel@...r.kernel.org>, <dave.hansen@...ux.intel.com>,
<luto@...nel.org>, <peterz@...radead.org>, <mingo@...hat.com>
CC: <x86@...nel.org>, <bp@...en8.de>, <tglx@...utronix.de>,
<hpa@...or.com>
Subject: Re: [PATCH 1/1] x86/pti: Fix kernel warnings for pti= and nopti
cmdline options.
On 8/11/2023 5:08 PM, Dave Hansen wrote:
> It's worth *ZERO* hassle. The docs say:
>
>> mitigations=
> ...
>> off
>> Disable all optional CPU mitigations. This
>> improves system performance, but it may also
>> expose users to several CPU vulnerabilities.
>> Equivalent to:
> ...
>> nopti [X86,PPC]
>
> That's 100% unambiguous.
>
Ah! I missed that. Sorry about the trouble.
Powered by blists - more mailing lists