]> www.infradead.org Git - nvme.git/commit
x86/bugs: Add X86_BUG_SPECTRE_V2_USER
authorDavid Kaplan <david.kaplan@amd.com>
Wed, 8 Jan 2025 20:24:41 +0000 (14:24 -0600)
committerBorislav Petkov (AMD) <bp@alien8.de>
Fri, 28 Feb 2025 11:34:30 +0000 (12:34 +0100)
commit98c7a713db91c5a9a7ffc47cd85e7158e0963cb8
treeef411f3eb9b069dcdcd1fb372859c4803208534a
parent8f64eee70cdd3bb8c3ec7d30f0d1f52922aaef7c
x86/bugs: Add X86_BUG_SPECTRE_V2_USER

All CPU vulnerabilities with command line options map to a single X86_BUG bit
except for Spectre V2 where both the spectre_v2 and spectre_v2_user command
line options are related to the same bug.

The spectre_v2 command line options mostly relate to user->kernel and
guest->host mitigations, while the spectre_v2_user command line options relate
to user->user or guest->guest protections.

Define a new X86_BUG bit for spectre_v2_user so each *_select_mitigation()
function in bugs.c is related to a unique X86_BUG bit.

No functional changes.

Signed-off-by: David Kaplan <david.kaplan@amd.com>
Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Link: https://lore.kernel.org/r/20250108202515.385902-2-david.kaplan@amd.com
arch/x86/include/asm/cpufeatures.h
arch/x86/kernel/cpu/common.c