From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.linutronix.de (146.0.238.70:993) by crypto-ml.lab.linutronix.de with IMAP4-SSL for ; 22 Feb 2019 07:08:58 -0000 Received: from mail.kernel.org ([198.145.29.99]) by Galois.linutronix.de with esmtps (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1gx4x6-0006y5-DP for speck@linutronix.de; Fri, 22 Feb 2019 08:08:57 +0100 Date: Fri, 22 Feb 2019 08:08:46 +0100 From: Greg KH Subject: [MODERATED] Re: [patch V3 7/9] MDS basics 7 Message-ID: <20190222070846.GA1107@kroah.com> References: <20190221234431.922117624@linutronix.de> <20190221235535.014953939@linutronix.de> MIME-Version: 1.0 In-Reply-To: <20190221235535.014953939@linutronix.de> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit To: speck@linutronix.de List-ID: On Fri, Feb 22, 2019 at 12:44:38AM +0100, speck for Thomas Gleixner wrote: > Subject: [patch V3 7/9] x86/speculation/mds: Add mitigation control for MDS > From: Thomas Gleixner > > Now that the mitigations are in place, add a command line parameter to > control the mitigation, a mitigation selector function and a SMT update > mechanism. > > This is the minimal straight forward initial implementation which just > provides an always on/off mode. The command line parameter is: > > mds=[full|off|auto] > > This is consistent with the existing mitigations for other speculative > hardware vulnerabilities. > > The idle invocation is dynamically updated according to the SMT state of > the system similar to the dynamic update of the STIBP mitigation. > > Signed-off-by: Thomas Gleixner > Reviewed-by: Borislav Petkov Reviewed-by: Greg Kroah-Hartman