[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <c579b5a0-2cab-4a33-b246-1e978154462c@suse.com>
Date: Tue, 8 Oct 2024 11:40:13 +0300
From: Nikolay Borisov <nik.borisov@...e.com>
To: David Kaplan <david.kaplan@....com>, Thomas Gleixner
<tglx@...utronix.de>, Borislav Petkov <bp@...en8.de>,
Peter Zijlstra <peterz@...radead.org>, Josh Poimboeuf <jpoimboe@...nel.org>,
Pawan Gupta <pawan.kumar.gupta@...ux.intel.com>,
Ingo Molnar <mingo@...hat.com>, Dave Hansen <dave.hansen@...ux.intel.com>,
x86@...nel.org, "H . Peter Anvin" <hpa@...or.com>
Cc: linux-kernel@...r.kernel.org
Subject: Re: [RFC PATCH 07/34] x86/bugs: Remove md_clear_*_mitigation()
On 12.09.24 г. 22:08 ч., David Kaplan wrote:
> The functionality in md_clear_update_mitigation() and
> md_clear_select_mitigation() is now integrated into the select/update
> functions for the MDS, TAA, MMIO, and RFDS vulnerabilities.
>
> Signed-off-by: David Kaplan <david.kaplan@....com>
I think the previous 4 patches are better replaced with the series that
Daniel Sneddon has sent:
20240924223140.1054918-1-daniel.sneddon@...ux.intel.com
Powered by blists - more mailing lists