Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757350AbcC2T7J (ORCPT ); Tue, 29 Mar 2016 15:59:09 -0400 Received: from mga04.intel.com ([192.55.52.120]:30674 "EHLO mga04.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753844AbcC2T7I (ORCPT ); Tue, 29 Mar 2016 15:59:08 -0400 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.24,412,1455004800"; d="scan'208";a="943955917" Date: Tue, 29 Mar 2016 12:59:06 -0700 From: Andi Kleen To: Scott Bauer Cc: linux-kernel@vger.kernel.org, kernel-hardening@lists.openwall.com, x86@kernel.org, luto@amacapital.net, mingo@redhat.com, tglx@linutronix.de, wmealing@redhat.com, torvalds@linux-foundation.org, Abhiram Balasubramanian , Scott Bauer Subject: Re: [PATCH v4 3/4] Sysctl: SROP Mitigation: Add Sysctl argument to disable SROP. Message-ID: <20160329195906.GA9083@tassilo.jf.intel.com> References: <1459281207-24377-1-git-send-email-sbauer@eng.utah.edu> <1459281207-24377-4-git-send-email-sbauer@eng.utah.edu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1459281207-24377-4-git-send-email-sbauer@eng.utah.edu> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 259 Lines: 8 On Tue, Mar 29, 2016 at 01:53:26PM -0600, Scott Bauer wrote: > This patch adds a sysctl argument to disable SROP protection. Sysctl needs to be documented in Documentation/sysctl/ Also negated sysctl is weird, normally they are positive (enable-xxx) -Andi