[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20241015105107.496105-1-leitao@debian.org>
Date: Tue, 15 Oct 2024 03:51:04 -0700
From: Breno Leitao <leitao@...ian.org>
To: bp@...en8.de,
x86@...nel.org
Cc: kernel-team@...a.com,
jpoimboe@...nel.org,
pawan.kumar.gupta@...ux.intel.com,
linux-kernel@...r.kernel.org
Subject: [PATCH 0/2] x86/bugs: default spectre_v2_user_cmd depends on Kconfig
This series contains two patches that improve the handling of Spectre v2
user mitigations in the x86 architecture:
1. Make spectre_v2_user_cmd default depend on Kconfig
2. Simplify spectre_v2_user_select_mitigation() using cpu_smt_possible()
The first patch was originally part of a larger patchset [1] but was
removed in version 3 [2] to simplify the revision process. Now that the
original patchset has been merged, I am resubmitting this patch
separately.
This patch aligns the default configuration of spectre_v2_user_cmd with
CONFIG_MITIGATION_SPECTRE_V2, consistent with other user-selectable
mitigations.
The other patch is a simple optimization that leverages the
cpu_smt_possible() helper function to simplify the code in
spectre_v2_user_select_mitigation().
Together, these changes improve code consistency and simplify the
configuration and selection of Spectre v2 user mitigations.
[1] https://lore.kernel.org/all/20240118173213.2008115-4-leitao@debian.org/
[2] https://lore.kernel.org/all/20240422165830.2142904-1-leitao@debian.org/
Breno Leitao (2):
x86/bugs: Use cpu_smt_possible helper
x86/bugs: spectre user default must depend on MITIGATION_SPECTRE_V2
arch/x86/kernel/cpu/bugs.c | 17 ++++++++---------
1 file changed, 8 insertions(+), 9 deletions(-)
--
2.43.5
Powered by blists - more mailing lists