diff options
author | David Kaplan <david.kaplan@amd.com> | 2025-01-08 23:24:41 +0300 |
---|---|---|
committer | Borislav Petkov (AMD) <bp@alien8.de> | 2025-02-28 14:34:30 +0300 |
commit | 98c7a713db91c5a9a7ffc47cd85e7158e0963cb8 (patch) | |
tree | ef411f3eb9b069dcdcd1fb372859c4803208534a /lib/string_helpers.c | |
parent | 8f64eee70cdd3bb8c3ec7d30f0d1f52922aaef7c (diff) | |
download | linux-98c7a713db91c5a9a7ffc47cd85e7158e0963cb8.tar.xz |
x86/bugs: Add X86_BUG_SPECTRE_V2_USER
All CPU vulnerabilities with command line options map to a single X86_BUG bit
except for Spectre V2 where both the spectre_v2 and spectre_v2_user command
line options are related to the same bug.
The spectre_v2 command line options mostly relate to user->kernel and
guest->host mitigations, while the spectre_v2_user command line options relate
to user->user or guest->guest protections.
Define a new X86_BUG bit for spectre_v2_user so each *_select_mitigation()
function in bugs.c is related to a unique X86_BUG bit.
No functional changes.
Signed-off-by: David Kaplan <david.kaplan@amd.com>
Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Link: https://lore.kernel.org/r/20250108202515.385902-2-david.kaplan@amd.com
Diffstat (limited to 'lib/string_helpers.c')
0 files changed, 0 insertions, 0 deletions