[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <xbegna7ztb525ri2l76pd3uyh4rdmtj76enf4ad4ekvilkxygp@h3uoy2hjyfqy>
Date: Wed, 20 Aug 2025 23:18:17 -0700
From: Pawan Gupta <pawan.kumar.gupta@...ux.intel.com>
To: David Kaplan <david.kaplan@....com>
Cc: Thomas Gleixner <tglx@...utronix.de>, Borislav Petkov <bp@...en8.de>,
Peter Zijlstra <peterz@...radead.org>, Josh Poimboeuf <jpoimboe@...nel.org>,
Ingo Molnar <mingo@...hat.com>, Dave Hansen <dave.hansen@...ux.intel.com>, x86@...nel.org,
"H . Peter Anvin" <hpa@...or.com>, linux-kernel@...r.kernel.org
Subject: Re: [PATCH v2 0/5] Bugs clean-up
On Tue, Aug 19, 2025 at 02:21:55PM -0500, David Kaplan wrote:
> Patches 1-3 focus on cleaning up parameter parsing. Most mitigations use
> early_param but a few older ones do not and look at boot_command_line
> directly. Modify those to be consistent with the newer ones.
>
> Patch 4 adds missing attack vector controls for spec store bypass.
>
> Patch 5 cleans up straggling unnecessary calls to cpu_mitigations_off().
>
> Changes from v1
> - Removed spec_*_print_cond() functions
> - Fixed bugs pointed out by Pawan
> - Added last 2 patches
>
> David Kaplan (5):
> x86/bugs: Use early_param for spectre_v2_user
> x86/bugs: Use early_param for spectre_v2
> x86/bugs: Simplify SSB cmdline parsing
> x86/bugs: Add attack vector controls for SSB
> x86/bugs: Remove uses of cpu_mitigations_off()
For the series:
Reviewed-by: Pawan Gupta <pawan.kumar.gupta@...ux.intel.com>
Powered by blists - more mailing lists