[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250819192200.2003074-1-david.kaplan@amd.com>
Date: Tue, 19 Aug 2025 14:21:55 -0500
From: David Kaplan <david.kaplan@....com>
To: Thomas Gleixner <tglx@...utronix.de>, Borislav Petkov <bp@...en8.de>,
Peter Zijlstra <peterz@...radead.org>, Josh Poimboeuf <jpoimboe@...nel.org>,
Pawan Gupta <pawan.kumar.gupta@...ux.intel.com>, Ingo Molnar
<mingo@...hat.com>, Dave Hansen <dave.hansen@...ux.intel.com>,
<x86@...nel.org>, "H . Peter Anvin" <hpa@...or.com>
CC: <linux-kernel@...r.kernel.org>
Subject: [PATCH v2 0/5] Bugs clean-up
Patches 1-3 focus on cleaning up parameter parsing. Most mitigations use
early_param but a few older ones do not and look at boot_command_line
directly. Modify those to be consistent with the newer ones.
Patch 4 adds missing attack vector controls for spec store bypass.
Patch 5 cleans up straggling unnecessary calls to cpu_mitigations_off().
Changes from v1
- Removed spec_*_print_cond() functions
- Fixed bugs pointed out by Pawan
- Added last 2 patches
David Kaplan (5):
x86/bugs: Use early_param for spectre_v2_user
x86/bugs: Use early_param for spectre_v2
x86/bugs: Simplify SSB cmdline parsing
x86/bugs: Add attack vector controls for SSB
x86/bugs: Remove uses of cpu_mitigations_off()
.../hw-vuln/attack_vector_controls.rst | 5 +-
arch/x86/include/asm/nospec-branch.h | 1 +
arch/x86/kernel/cpu/bugs.c | 387 ++++++++----------
3 files changed, 169 insertions(+), 224 deletions(-)
base-commit: 2fd6a6194558303fffd2d7a7fa73fc318d680f38
--
2.34.1
Powered by blists - more mailing lists