Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1538311yba; Thu, 4 Apr 2019 12:50:24 -0700 (PDT) X-Google-Smtp-Source: APXvYqzon5JGrcira4kIIpZMUS744vLGODv7sGF2G29DsJQvEN+8/wX8rfTrLESLwHzQwX+QKwm+ X-Received: by 2002:a17:902:b202:: with SMTP id t2mr8201220plr.50.1554407424326; Thu, 04 Apr 2019 12:50:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554407424; cv=none; d=google.com; s=arc-20160816; b=LRhqeFVYEWAEXIqXJIN5wr9LPmFnaFzblFyyo7IsGnviiJ4Bw4+Z4y6AaTSmP9UUxC MR4+34zKhvDRfPb0So3zEA/Xk7fqk12M2xXi5B8JYCBkRZegXkwpMGk1gmO1cKgOjlKF kWnLr2Z1sGhnN8CjhZIWIUmbPeCR7fljACXZXn/i4dh2LYs7cHKqLwHW+W8vsVbEV42A KrGbQ2mIf2k5lnuNogy+K+4f0GefUra9oz5gm6mQmkDMP4RS54cUWwlKxFQK4O0OdWxT BsnLskSrCHQgKaRU2Qo2IrMILMMor1hxvZXlh0aWHczFRbthlxM7iGG7CVTxHrcjCy2/ nxrA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date:dkim-signature; bh=vQB3i/HgtdnMz8XwOhxmGofKa0GggdhqvAywIiNkG+E=; b=Yzd/enXRVbrJNUeTPgGs/B9TXJ0apkWf1p9t9TwBDGZSyNyNDwTTmIdpHLM8ZhB6Q4 V+OhfzrDC8XnirQdBuC307sRqRcOe8QCdE3jt8mSOHx+BkPlxRi1EOFa6Guen7o/H2+k vf2Mg+7eK8o3O06ekZTmFOSNM7Ie62U3NTOVIyqtlk1sH03V9pc7vRM9bDZ68OGy7aGR mqL5NiT6ymMO5edrRDu/ZEmh6zW1z5fAIlBl2EwsyepVa/+cSyKJvM6GxYnpqhpmqLUN XQCti1QAbl6hvK+y+INDXoZNneU7Q7YJ53lW88MDqYStMyAdwk/Qkvvrk8sbJh3EoHQs H4Tg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=jtp39Wqc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j64si568247pge.398.2019.04.04.12.50.08; Thu, 04 Apr 2019 12:50:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=jtp39Wqc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730402AbfDDTtN (ORCPT + 99 others); Thu, 4 Apr 2019 15:49:13 -0400 Received: from mail.kernel.org ([198.145.29.99]:51566 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729714AbfDDTtN (ORCPT ); Thu, 4 Apr 2019 15:49:13 -0400 Received: from pobox.suse.cz (prg-ext-pat.suse.com [213.151.95.130]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EB69F20652; Thu, 4 Apr 2019 19:49:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1554407352; bh=rbB/d1HoDWLb0C/C4Qg8TRWaUl3+wjPa3bCsuL99K7E=; h=Date:From:To:cc:Subject:In-Reply-To:References:From; b=jtp39WqcWCOuEHOKDrA7A+4wNaB10zupBqoWZNpwLXEL4OA1JZieKHWPvNYhzlyQN U2QKlw5xNA4ER51gwkjJsjjtwTsfAzyvk/KWYV8tR22Y0DTvLZ9LDnSQuE1JXLRNlV tWCpqb4qtv2CJaulaNZPnInCoyoFTbF7Rbg+wQ2c= Date: Thu, 4 Apr 2019 21:49:05 +0200 (CEST) From: Jiri Kosina To: Josh Poimboeuf cc: linux-kernel@vger.kernel.org, x86@kernel.org, Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H . Peter Anvin" , Andy Lutomirski , Peter Zijlstra , Waiman Long , Andrea Arcangeli , Jon Masters , Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman , linuxppc-dev@lists.ozlabs.org, Martin Schwidefsky , Heiko Carstens , linux-s390@vger.kernel.org, Catalin Marinas , Will Deacon , linux-arm-kernel@lists.infradead.org, linux-arch@vger.kernel.org, Greg Kroah-Hartman , Tyler Hicks , Linus Torvalds Subject: Re: [PATCH RFC 3/5] powerpc/speculation: Add support for 'cpu_spec_mitigations=' cmdline options In-Reply-To: <91b92d8182d2f114d92c95689fcd4bb1a8dda1b0.1554396090.git.jpoimboe@redhat.com> Message-ID: References: <91b92d8182d2f114d92c95689fcd4bb1a8dda1b0.1554396090.git.jpoimboe@redhat.com> User-Agent: Alpine 2.21 (LSU 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 4 Apr 2019, Josh Poimboeuf wrote: > Configure powerpc CPU runtime speculation bug mitigations in accordance > with the 'cpu_spec_mitigations=' cmdline options. This affects > Meltdown, Spectre v1, Spectre v2, and Speculative Store Bypass. [ ... snip ... ] > - if (!no_nospec) > + if (!no_nospec && cpu_spec_mitigations != CPU_SPEC_MITIGATIONS_OFF) '!no_nospec' is something that I am sure will come back to hunt me in my bad dreams. But that's been there already, and fixing it is out of scope of this patch. Other than that, as discussed previously -- I really like this new global option. Feel free to add Reviewed-by: Jiri Kosina for the whole set. Thanks, -- Jiri Kosina SUSE Labs