On Fri, 26 Oct 2018, Tim Chen wrote:
> On 10/26/2018 09:58 AM, Waiman Long wrote:
> >> @@ -386,6 +389,7 @@ static void __init spectre_v2_select_mitigation(void)
> >>/* Force it so VMEXIT will restore correctly */
> >>x86_spec_ctrl_base |= SPEC_CTRL_IBRS;
> >>
On 10/26/2018 09:58 AM, Waiman Long wrote:
> On 10/17/2018 01:59 PM, Tim Chen wrote:
>> Add static key to indicate whether we are using Enhanced IBRS to mitigate
>> Spectre v2. This will be used in later patches to disengage STIBP code
>> for Spectre v2 mitigation as STIBP is not needed when Enhan
On 10/17/2018 01:59 PM, Tim Chen wrote:
> Add static key to indicate whether we are using Enhanced IBRS to mitigate
> Spectre v2. This will be used in later patches to disengage STIBP code
> for Spectre v2 mitigation as STIBP is not needed when Enhanced IBRS is
> in use.
>
> Signed-off-by: Tim Che
On Wed, 17 Oct 2018, Tim Chen wrote:
> Add static key to indicate whether we are using Enhanced IBRS to mitigate
Please avoid personification of technical things. _We_ are not using
anything, really.
> +DEFINE_STATIC_KEY_FALSE(spectre_v2_enhanced_ibrs);
> +EXPORT_SYMBOL(spectre_v2_enhanced_ibrs)
Add static key to indicate whether we are using Enhanced IBRS to mitigate
Spectre v2. This will be used in later patches to disengage STIBP code
for Spectre v2 mitigation as STIBP is not needed when Enhanced IBRS is
in use.
Signed-off-by: Tim Chen
---
arch/x86/include/asm/nospec-branch.h | 3 ++
5 matches
Mail list logo