From: David Kaplan <david.kaplan@amd.com>
To: Thomas Gleixner <tglx@linutronix.de>,
Borislav Petkov <bp@alien8.de>,
Peter Zijlstra <peterz@infradead.org>,
Josh Poimboeuf <jpoimboe@kernel.org>,
Pawan Gupta <pawan.kumar.gupta@linux.intel.com>,
Ingo Molnar <mingo@redhat.com>,
Dave Hansen <dave.hansen@linux.intel.com>, <x86@kernel.org>,
"H . Peter Anvin" <hpa@zytor.com>
Cc: Alexander Graf <graf@amazon.com>,
Boris Ostrovsky <boris.ostrovsky@oracle.com>,
<linux-kernel@vger.kernel.org>
Subject: [RFC PATCH 00/56] Dynamic mitigations
Date: Mon, 13 Oct 2025 09:33:48 -0500 [thread overview]
Message-ID: <20251013143444.3999-1-david.kaplan@amd.com> (raw)
Dynamic mitigations enables changing the kernel CPU security mitigations at
runtime without a reboot/kexec.
Previously, mitigation choices had to be made on the kernel cmdline. With
this feature an administrator can select new mitigation choices by writing
a sysfs file, after which the kernel will re-patch itself based on the new
mitigations.
As the performance cost of CPU mitigations can be significant, selecting
the right set of mitigations is important to achieve the correct balance of
performance/security.
Use
---
As described in the supplied documentation file, new mitigations are
selected by writing cmdline options to a new sysfs file. Only cmdline
options related to mitigations are recognized via this interface. All
previous mitigation-related cmdline options are ignored and selections are
done based on the new options.
Examples:
echo "mitigations=off" > /sys/devices/system/cpu/mitigations
echo "spectre_v2=retpoline tsa=off" > /sys/devices/system/cpu/mitigations
There are several use cases that will benefit from dynamic mitigations:
Use Cases
---------
1. Runtime Policy
Some workflows rely on booting a generic kernel before customizing the system.
cloud-init is a popular example of this where a VM is started typically with
default settings and then is customized based on a customer-provided
configuration file.
As flows like this rely on configuring the system after boot, they currently
cannot customize the mitigation policy. With dynamic mitigations, this
configuration information can be augmented to include security policy
information.
For example, a cloud VM which runs only trusted workloads likely does not
need any CPU security mitigations applied. But as this policy information
is not known at boot time, the kernel will be booted with unnecessary
mitigations enabled. With dynamic mitigations, these mitigations can be
disabled during boot after policy information is retrieved, improving
performance.
2. Mitigation Changes
Sometimes there are needs to change the mitigation settings in light of new
security findings. For example, AMD-SB-1036 advised of a security issue
with a spectre v2 mitigation and advised using a different one instead.
With dynamic mitigations, such changes can be made without a reboot/kexec
which minimizes disruption in environments which cannot easily tolerate
such an event.
3. Mitigation Testing
Being able to quickly change between different mitigation settings without
having to restart applications is beneficial when conducting mitigation
development and testing.
Note that some bugs have multiple mitigation options, which may have
varying performance impacts. Being able to quickly switch between them
makes evaluating such options easier.
Implementation Details
----------------------
Re-patching the kernel is expected to be a very rare operation and is done
under very big hammers. All tasks are put into the freezer and the
re-patching is then done under the (new) stop_machine_nmi() routine.
To re-patch the kernel, it is first reverted back to its compile-time
state. The original bytes from alternatives, retpolines, etc. are saved
during boot so they can later be used to restore the original kernel image.
After that, the kernel is patched based on the new feature flags.
This simplifies the re-patch process as restoring the original kernel image
is relatively straightforward. In other words, instead of having to
re-patch from mitigation A to mitigation B directly, we first restore the
original image and then patch from that to mitigation B, similar to if the
system had booted with mitigation B selected originally.
Performance
-----------
Testing so far has demonstrated that re-patching takes ~50ms on an AMD EPYC
7713 running a typical Ubuntu kernel with around 100 modules loaded.
Guide to Patch Series
---------------------
As this series is rather lengthy, this may help with understanding it:
Patches 3-18 focus on "resetting" mitigations. Every bug that may set feature
flags, MSRs, static branches, etc. now has matching "reset" functions that will
undo all these changes. This is used at the beginning of the re-patch flow.
Patches 20-22 move various functions and values out of the .init section. Most
of the existing mitigation logic was marked as __init and the mitigation
settings as __ro_after_init but now these can be changed at runtime. The
__ro_after_init marking functioned as a defense-in-depth measure but is arguably
of limited meaningful security value as an attacker who can modify kernel data
can do a lot worse than change some speculation settings. As re-patching
requires being able to modify these settings, it was simplest to remove them
from that section.
Patches 23-27 involve linker and related modifications to keep alternative
information around at runtime instead of free'ing it after boot. This does
result in slightly higher runtime memory consumption which is one reason why
this feature is behind a Kconfig option. On a typical kernel, this was measured
at around 2MB of extra kernel memory usage.
Patches 28-30 focus on the new stop_machine_nmi() which behaves like
stop_machine() but runs the handler in NMI context, thus ensuring that even NMIs
cannot interrupt the handler. As dynamic mitigations involves re-patching
functions used by NMI entry code, this is required for safety.
Patches 31-40 focus on support for restoring the kernel text at runtime. This
involves saving the original kernel bytes when patched the first time and adding
support to then restore those later.
Patches 41-44 start building support for updating code, in particular module
code at runtime.
Patches 45-47 focus on support for the Indirect Target Selection mitigation
which is particularly challenging because it requires runtime memory allocations
and permission changes which are not possible in NMI context. As a result, ITS
memory is pre-allocated before entering NMI context.
Patch 50 adds the complete function for resetting and re-patching the kernel.
Patches 51-53 build the sysfs interface for re-patching and support for parsing
the new options provided.
Patches 54-56 add debugfs interfaces to values which are important for
mitigations. These are useful for userspace test utilities to be able to force
a CPU to appear to be vulnerable or immune to certain bugs as well as being able
to help verify if the kernel is correctly mitigating various vulnerabilities.
David Kaplan (56):
Documentation/admin-guide: Add documentation
x86/Kconfig: Add CONFIG_DYNAMIC_MITIGATIONS
cpu: Reset global mitigations
x86/bugs: Reset spectre_v1 mitigations
x86/bugs: Reset spectre_v2 mitigations
x86/bugs: Reset retbleed mitigations
x86/bugs: Reset spectre_v2_user mitigations
x86/bugs: Reset SSB mitigations
x86/bugs: Reset L1TF mitigations
x86/bugs: Reset MDS mitigations
x86/bugs: Reset MMIO mitigations
x86/bugs: Reset SRBDS mitigations
x86/bugs: Reset SRSO mitigations
x86/bugs: Reset GDS mitigations
x86/bugs: Reset BHI mitigations
x86/bugs: Reset ITS mitigation
x86/bugs: Reset TSA mitigations
x86/bugs: Reset VMSCAPE mitigations
x86/bugs: Define bugs_smt_disable()
x86/bugs: Move bugs.c logic out of .init section
x86/callthunks: Move logic out of .init
cpu: Move mitigation logic out of .init
x86/vmlinux.lds: Move alternative sections
x86/vmlinux.lds: Move altinstr_aux conditionally
x86/vmlinux.lds: Define __init_alt_end
module: Save module ELF info
x86/mm: Conditionally free alternative sections
stop_machine: Add stop_machine_nmi()
x86/apic: Add self-NMI support
x86/nmi: Add support for stop_machine_nmi()
x86/alternative: Prepend nops with retpolines
x86/alternative: Add module param
x86/alternative: Avoid re-patching init code
x86/alternative: Save old bytes for alternatives
x86/alternative: Save old bytes for retpolines
x86/alternative: Do not recompute len on re-patch
x86/alternative: Reset alternatives
x86/callthunks: Reset callthunks
x86/sync_core: Add sync_core_nmi_safe()
x86/alternative: Use sync_core_nmi_safe()
static_call: Add update_all_static_calls()
module: Make memory writeable for re-patching
module: Update alternatives
x86/module: Update alternatives
x86/alternative: Use boot_cpu_has in ITS code
x86/alternative: Add ITS re-patching support
x86/module: Add ITS re-patch support for modules
x86/bugs: Move code for updating speculation MSRs
x86/fpu: Qualify warning in os_xsave
x86/alternative: Add re-patch support
cpu: Parse string of mitigation options
x86/bugs: Support parsing mitigation options
drivers/cpu: Re-patch mitigations through sysfs
x86/debug: Create debugfs interface to x86_capabilities
x86/debug: Show return thunk in debugfs
x86/debug: Show static branch config in debugfs
.../ABI/testing/sysfs-devices-system-cpu | 8 +
.../hw-vuln/dynamic_mitigations.rst | 75 ++
Documentation/admin-guide/hw-vuln/index.rst | 1 +
arch/x86/Kconfig | 12 +
arch/x86/entry/vdso/vma.c | 2 +-
arch/x86/include/asm/alternative.h | 51 +-
arch/x86/include/asm/bugs.h | 4 +
arch/x86/include/asm/module.h | 10 +
arch/x86/include/asm/sync_core.h | 14 +
arch/x86/kernel/alternative.c | 497 ++++++++++++-
arch/x86/kernel/apic/ipi.c | 7 +
arch/x86/kernel/callthunks.c | 85 ++-
arch/x86/kernel/cpu/bugs.c | 686 +++++++++++++-----
arch/x86/kernel/cpu/common.c | 65 +-
arch/x86/kernel/cpu/cpu.h | 4 -
arch/x86/kernel/fpu/xstate.h | 2 +-
arch/x86/kernel/module.c | 96 ++-
arch/x86/kernel/nmi.c | 4 +
arch/x86/kernel/static_call.c | 3 +-
arch/x86/kernel/vmlinux.lds.S | 110 +--
arch/x86/mm/init.c | 12 +-
arch/x86/mm/mm_internal.h | 2 +
arch/x86/tools/relocs.c | 1 +
drivers/base/cpu.c | 113 +++
include/linux/cpu.h | 10 +
include/linux/module.h | 11 +
include/linux/static_call.h | 2 +
include/linux/stop_machine.h | 32 +
kernel/cpu.c | 62 +-
kernel/module/main.c | 78 +-
kernel/static_call_inline.c | 22 +
kernel/stop_machine.c | 79 +-
32 files changed, 1876 insertions(+), 284 deletions(-)
create mode 100644 Documentation/admin-guide/hw-vuln/dynamic_mitigations.rst
base-commit: a5652f0f2a69fadcfb2f687a11a737a57f15b28e
--
2.34.1
next reply other threads:[~2025-10-13 14:35 UTC|newest]
Thread overview: 175+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-10-13 14:33 David Kaplan [this message]
2025-10-13 14:33 ` [RFC PATCH 01/56] Documentation/admin-guide: Add documentation David Kaplan
2025-10-16 21:24 ` Josh Poimboeuf
2025-10-17 14:04 ` Kaplan, David
2025-10-18 13:39 ` Borislav Petkov
2025-10-20 13:53 ` Kaplan, David
2025-10-22 11:43 ` Borislav Petkov
2025-10-13 14:33 ` [RFC PATCH 02/56] x86/Kconfig: Add CONFIG_DYNAMIC_MITIGATIONS David Kaplan
2025-10-16 21:20 ` Josh Poimboeuf
2025-10-17 13:57 ` Kaplan, David
2025-10-13 14:33 ` [RFC PATCH 03/56] cpu: Reset global mitigations David Kaplan
2025-10-16 21:34 ` Josh Poimboeuf
2025-10-17 14:05 ` Kaplan, David
2025-10-17 14:19 ` Kaplan, David
2025-10-17 16:03 ` Josh Poimboeuf
2025-10-17 16:36 ` Borislav Petkov
2025-10-13 14:33 ` [RFC PATCH 04/56] x86/bugs: Reset spectre_v1 mitigations David Kaplan
2025-10-14 18:37 ` Dave Hansen
2025-10-14 19:16 ` Kaplan, David
2025-10-29 11:57 ` Borislav Petkov
2025-10-29 13:48 ` Kaplan, David
2025-11-03 18:24 ` Borislav Petkov
2025-10-13 14:33 ` [RFC PATCH 05/56] x86/bugs: Reset spectre_v2 mitigations David Kaplan
2025-11-03 19:31 ` Borislav Petkov
2025-11-03 20:10 ` Kaplan, David
2025-11-03 20:28 ` Borislav Petkov
2025-11-05 2:29 ` Josh Poimboeuf
2025-11-05 11:03 ` Borislav Petkov
2025-11-05 17:06 ` Josh Poimboeuf
2025-11-05 20:04 ` Borislav Petkov
2025-11-05 20:21 ` Kaplan, David
2025-11-05 20:52 ` Josh Poimboeuf
2025-11-14 17:14 ` [PATCH] x86/bugs: Get rid of the forward declarations Borislav Petkov
2025-11-14 19:19 ` Josh Poimboeuf
2025-11-14 19:31 ` Borislav Petkov
2025-11-14 20:04 ` Pawan Gupta
2025-10-13 14:33 ` [RFC PATCH 06/56] x86/bugs: Reset retbleed mitigations David Kaplan
2025-10-13 14:33 ` [RFC PATCH 07/56] x86/bugs: Reset spectre_v2_user mitigations David Kaplan
2025-10-16 12:54 ` Brendan Jackman
2025-10-16 14:06 ` Kaplan, David
2025-10-16 14:56 ` Brendan Jackman
2025-10-16 15:26 ` Kaplan, David
2025-10-16 16:13 ` Brendan Jackman
2025-11-26 11:23 ` Borislav Petkov
2025-12-01 16:53 ` Kaplan, David
2025-12-03 12:31 ` Borislav Petkov
2025-12-03 17:02 ` Kaplan, David
2025-12-03 17:35 ` Borislav Petkov
2025-12-03 20:14 ` Kaplan, David
2025-12-04 15:07 ` Borislav Petkov
2025-10-13 14:33 ` [RFC PATCH 08/56] x86/bugs: Reset SSB mitigations David Kaplan
2025-10-17 15:13 ` Nikolay Borisov
2025-10-17 15:56 ` Kaplan, David
2026-01-20 13:07 ` Borislav Petkov
2025-10-13 14:33 ` [RFC PATCH 09/56] x86/bugs: Reset L1TF mitigations David Kaplan
2025-10-13 14:33 ` [RFC PATCH 10/56] x86/bugs: Reset MDS mitigations David Kaplan
2025-10-13 14:33 ` [RFC PATCH 11/56] x86/bugs: Reset MMIO mitigations David Kaplan
2026-01-26 13:05 ` Borislav Petkov
2026-01-26 14:51 ` Kaplan, David
2025-10-13 14:34 ` [RFC PATCH 12/56] x86/bugs: Reset SRBDS mitigations David Kaplan
2025-10-13 14:34 ` [RFC PATCH 13/56] x86/bugs: Reset SRSO mitigations David Kaplan
2025-10-13 14:34 ` [RFC PATCH 14/56] x86/bugs: Reset GDS mitigations David Kaplan
2025-10-24 2:40 ` Pawan Gupta
2025-10-24 14:43 ` Kaplan, David
2025-10-13 14:34 ` [RFC PATCH 15/56] x86/bugs: Reset BHI mitigations David Kaplan
2025-10-24 2:49 ` Pawan Gupta
2025-10-24 15:02 ` Kaplan, David
2025-10-13 14:34 ` [RFC PATCH 16/56] x86/bugs: Reset ITS mitigation David Kaplan
2025-10-13 14:34 ` [RFC PATCH 17/56] x86/bugs: Reset TSA mitigations David Kaplan
2025-10-13 14:34 ` [RFC PATCH 18/56] x86/bugs: Reset VMSCAPE mitigations David Kaplan
2025-10-13 14:34 ` [RFC PATCH 19/56] x86/bugs: Define bugs_smt_disable() David Kaplan
2025-10-13 14:34 ` [RFC PATCH 20/56] x86/bugs: Move bugs.c logic out of .init section David Kaplan
2025-10-16 12:31 ` Brendan Jackman
2025-10-16 13:46 ` Kaplan, David
2025-10-16 14:33 ` Brendan Jackman
2025-10-13 14:34 ` [RFC PATCH 21/56] x86/callthunks: Move logic out of .init David Kaplan
2025-10-13 14:34 ` [RFC PATCH 22/56] cpu: Move mitigation " David Kaplan
2025-10-13 14:34 ` [RFC PATCH 23/56] x86/vmlinux.lds: Move alternative sections David Kaplan
2025-10-13 14:34 ` [RFC PATCH 24/56] x86/vmlinux.lds: Move altinstr_aux conditionally David Kaplan
2025-10-13 14:34 ` [RFC PATCH 25/56] x86/vmlinux.lds: Define __init_alt_end David Kaplan
2025-10-13 14:34 ` [RFC PATCH 26/56] module: Save module ELF info David Kaplan
2025-10-13 14:34 ` [RFC PATCH 27/56] x86/mm: Conditionally free alternative sections David Kaplan
2025-10-13 14:34 ` [RFC PATCH 28/56] stop_machine: Add stop_machine_nmi() David Kaplan
2026-01-09 22:16 ` Chang S. Bae
2026-01-09 22:19 ` Kaplan, David
2025-10-13 14:34 ` [RFC PATCH 29/56] x86/apic: Add self-NMI support David Kaplan
2025-10-13 14:34 ` [RFC PATCH 30/56] x86/nmi: Add support for stop_machine_nmi() David Kaplan
2025-10-13 14:34 ` [RFC PATCH 31/56] x86/alternative: Prepend nops with retpolines David Kaplan
2025-10-16 10:32 ` Peter Zijlstra
2025-10-16 11:08 ` Peter Zijlstra
2025-10-16 11:07 ` Peter Zijlstra
2025-10-16 11:10 ` Peter Zijlstra
2025-10-16 11:23 ` Peter Zijlstra
2025-10-16 13:27 ` Kaplan, David
2025-10-16 14:07 ` Peter Zijlstra
2025-10-16 14:16 ` Kaplan, David
2025-10-16 14:23 ` Peter Zijlstra
2025-10-22 8:41 ` David Laight
2025-10-22 10:40 ` Peter Zijlstra
2025-10-13 14:34 ` [RFC PATCH 32/56] x86/alternative: Add module param David Kaplan
2025-10-13 14:34 ` [RFC PATCH 33/56] x86/alternative: Avoid re-patching init code David Kaplan
2025-10-13 14:34 ` [RFC PATCH 34/56] x86/alternative: Save old bytes for alternatives David Kaplan
2025-10-15 10:38 ` Juergen Gross
2025-10-15 13:45 ` Kaplan, David
2025-10-27 11:34 ` Nikolay Borisov
2025-10-27 14:19 ` Kaplan, David
2025-10-29 9:37 ` Nikolay Borisov
2025-10-29 16:26 ` Kaplan, David
2025-10-29 22:14 ` David Laight
2025-10-30 14:39 ` Kaplan, David
2025-10-30 15:42 ` Nikolay Borisov
2025-10-30 15:49 ` Kaplan, David
2025-10-13 14:34 ` [RFC PATCH 35/56] x86/alternative: Save old bytes for retpolines David Kaplan
2025-10-13 14:34 ` [RFC PATCH 36/56] x86/alternative: Do not recompute len on re-patch David Kaplan
2025-10-13 14:34 ` [RFC PATCH 37/56] x86/alternative: Reset alternatives David Kaplan
2025-10-13 14:34 ` [RFC PATCH 38/56] x86/callthunks: Reset callthunks David Kaplan
2025-10-13 14:34 ` [RFC PATCH 39/56] x86/sync_core: Add sync_core_nmi_safe() David Kaplan
2025-10-13 14:34 ` [RFC PATCH 40/56] x86/alternative: Use sync_core_nmi_safe() David Kaplan
2025-10-16 10:35 ` Peter Zijlstra
2025-10-16 14:40 ` Kaplan, David
2025-10-16 14:47 ` Peter Zijlstra
2025-10-16 15:34 ` Kaplan, David
2025-10-16 16:15 ` Dave Hansen
2025-10-16 16:27 ` Borislav Petkov
2025-10-16 18:52 ` Peter Zijlstra
2025-10-16 18:56 ` Kaplan, David
2025-10-16 18:58 ` Peter Zijlstra
2025-10-16 21:53 ` Andrew Cooper
2025-10-20 14:49 ` Kaplan, David
2025-10-20 15:01 ` Peter Zijlstra
2025-10-23 18:50 ` Kaplan, David
2025-10-23 19:26 ` Andrew Cooper
2025-10-23 21:23 ` David Laight
2025-10-21 2:13 ` H. Peter Anvin
2025-10-13 14:34 ` [RFC PATCH 41/56] static_call: Add update_all_static_calls() David Kaplan
2025-10-13 14:34 ` [RFC PATCH 42/56] module: Make memory writeable for re-patching David Kaplan
2025-10-13 14:34 ` [RFC PATCH 43/56] module: Update alternatives David Kaplan
2025-10-13 14:34 ` [RFC PATCH 44/56] x86/module: " David Kaplan
2025-10-13 14:34 ` [RFC PATCH 45/56] x86/alternative: Use boot_cpu_has in ITS code David Kaplan
2025-10-13 14:34 ` [RFC PATCH 46/56] x86/alternative: Add ITS re-patching support David Kaplan
2025-10-13 14:34 ` [RFC PATCH 47/56] x86/module: Add ITS re-patch support for modules David Kaplan
2025-10-13 14:34 ` [RFC PATCH 48/56] x86/bugs: Move code for updating speculation MSRs David Kaplan
2025-10-13 14:34 ` [RFC PATCH 49/56] x86/fpu: Qualify warning in os_xsave David Kaplan
2025-10-13 14:34 ` [RFC PATCH 50/56] x86/alternative: Add re-patch support David Kaplan
2025-10-31 10:22 ` Nikolay Borisov
2025-11-04 16:54 ` Kaplan, David
2025-10-13 14:34 ` [RFC PATCH 51/56] cpu: Parse string of mitigation options David Kaplan
2025-10-13 14:34 ` [RFC PATCH 52/56] x86/bugs: Support parsing " David Kaplan
2025-10-27 11:31 ` Nikolay Borisov
2025-10-27 13:56 ` Kaplan, David
2025-10-13 14:34 ` [RFC PATCH 53/56] drivers/cpu: Re-patch mitigations through sysfs David Kaplan
2025-10-27 12:25 ` Nikolay Borisov
2025-10-27 13:59 ` Kaplan, David
2025-10-13 14:34 ` [RFC PATCH 54/56] x86/debug: Create debugfs interface to x86_capabilities David Kaplan
2025-10-13 14:34 ` [RFC PATCH 55/56] x86/debug: Show return thunk in debugfs David Kaplan
2025-10-27 12:29 ` Nikolay Borisov
2025-10-27 14:24 ` David Laight
2025-10-13 14:34 ` [RFC PATCH 56/56] x86/debug: Show static branch config " David Kaplan
2025-10-14 16:29 ` [RFC PATCH 00/56] Dynamic mitigations Josh Poimboeuf
2025-10-14 18:06 ` Kaplan, David
2025-10-15 9:14 ` Alexander Graf
2025-10-15 23:06 ` Boris Ostrovsky
2025-10-16 12:21 ` Brendan Jackman
2025-10-15 4:10 ` Aaron Rainbolt
2025-10-15 13:53 ` Kaplan, David
2025-10-15 15:43 ` Josh Poimboeuf
2025-10-15 15:51 ` Kaplan, David
2025-10-15 16:02 ` Josh Poimboeuf
2025-10-15 16:10 ` Kaplan, David
2025-10-16 10:00 ` Nicolas Bouchinet
2025-10-16 13:42 ` Kaplan, David
2025-10-16 13:55 ` Nicolas Bouchinet
2025-10-16 13:56 ` Kaplan, David
2025-10-24 5:00 ` Pawan Gupta
2025-10-24 13:41 ` Kaplan, David
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20251013143444.3999-1-david.kaplan@amd.com \
--to=david.kaplan@amd.com \
--cc=boris.ostrovsky@oracle.com \
--cc=bp@alien8.de \
--cc=dave.hansen@linux.intel.com \
--cc=graf@amazon.com \
--cc=hpa@zytor.com \
--cc=jpoimboe@kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=mingo@redhat.com \
--cc=pawan.kumar.gupta@linux.intel.com \
--cc=peterz@infradead.org \
--cc=tglx@linutronix.de \
--cc=x86@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox