summaryrefslogtreecommitdiffstats
path: root/arch/x86/include
diff options
context:
space:
mode:
authorDavid Woodhouse <dwmw@amazon.co.uk>2018-01-25 17:14:13 +0100
committerThomas Gleixner <tglx@linutronix.de>2018-01-26 15:53:18 +0100
commitfec9434a12f38d3aeafeb75711b71d8a1fdef621 (patch)
tree4ad1d81978c9b8a189698ee240b16b952d9ffd47 /arch/x86/include
parentx86/msr: Add definitions for new speculation control MSRs (diff)
downloadlinux-fec9434a12f38d3aeafeb75711b71d8a1fdef621.tar.xz
linux-fec9434a12f38d3aeafeb75711b71d8a1fdef621.zip
x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown
Also, for CPUs which don't speculate at all, don't report that they're vulnerable to the Spectre variants either. Leave the cpu_no_meltdown[] match table with just X86_VENDOR_AMD in it for now, even though that could be done with a simple comparison, on the assumption that we'll have more to add. Based on suggestions from Dave Hansen and Alan Cox. Signed-off-by: David Woodhouse <dwmw@amazon.co.uk> Signed-off-by: Thomas Gleixner <tglx@linutronix.de> Reviewed-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> Reviewed-by: Borislav Petkov <bp@suse.de> Acked-by: Dave Hansen <dave.hansen@intel.com> Cc: gnomes@lxorguk.ukuu.org.uk Cc: ak@linux.intel.com Cc: ashok.raj@intel.com Cc: karahmed@amazon.de Cc: arjan@linux.intel.com Cc: torvalds@linux-foundation.org Cc: peterz@infradead.org Cc: bp@alien8.de Cc: pbonzini@redhat.com Cc: tim.c.chen@linux.intel.com Cc: gregkh@linux-foundation.org Link: https://lkml.kernel.org/r/1516896855-7642-6-git-send-email-dwmw@amazon.co.uk
Diffstat (limited to 'arch/x86/include')
0 files changed, 0 insertions, 0 deletions