Re: [patch V2 26/28] x86/speculation: Enable prctl mode for spectre_v2_user

2018-11-25 Thread Dominik Brodowski
On Sun, Nov 25, 2018 at 07:33:54PM +0100, Thomas Gleixner wrote: > + prctl - Indirect branch speculation is enabled, > + but mitigation can be enabled via prctl s/can be/is only/ or "must be". Thanks, Dominik

Re: [patch V2 26/28] x86/speculation: Enable prctl mode for spectre_v2_user

2018-11-25 Thread Dominik Brodowski
On Sun, Nov 25, 2018 at 07:33:54PM +0100, Thomas Gleixner wrote: > + prctl - Indirect branch speculation is enabled, > + but mitigation can be enabled via prctl s/can be/is only/ or "must be". Thanks, Dominik

[patch V2 26/28] x86/speculation: Enable prctl mode for spectre_v2_user

2018-11-25 Thread Thomas Gleixner
Now that all prerequisites are in place: - Add the prctl command line option - Default the 'auto' mode to 'prctl' - When SMT state changes, update the static key which controls the conditional STIBP evaluation on context switch. - At init update the static key which controls the

[patch V2 26/28] x86/speculation: Enable prctl mode for spectre_v2_user

2018-11-25 Thread Thomas Gleixner
Now that all prerequisites are in place: - Add the prctl command line option - Default the 'auto' mode to 'prctl' - When SMT state changes, update the static key which controls the conditional STIBP evaluation on context switch. - At init update the static key which controls the