This series contains two patches that improve the handling of Spectre v2
user mitigations in the x86 architecture:
1. Make spectre_v2_user_cmd default depend on Kconfig
2. Simplify spectre_v2_user_select_mitigation() using cpu_smt_possible()
The first patch was originally part of a larger patchset [1] but was
removed in version 3 [2] to simplify the revision process. Now that the
original patchset has been merged, I am resubmitting this patch
separately.
This patch aligns the default configuration of spectre_v2_user_cmd with
CONFIG_MITIGATION_SPECTRE_V2, consistent with other user-selectable
mitigations.
The other patch is a simple optimization that leverages the
cpu_smt_possible() helper function to simplify the code in
spectre_v2_user_select_mitigation().
Together, these changes improve code consistency and simplify the
configuration and selection of Spectre v2 user mitigations.
[1] https://lore.kernel.org/all/20240118173213.2008115-4-leitao@debian.org/
[2] https://lore.kernel.org/all/20240422165830.2142904-1-leitao@debian.org/
Breno Leitao (2):
x86/bugs: Use cpu_smt_possible helper
x86/bugs: spectre user default must depend on MITIGATION_SPECTRE_V2
arch/x86/kernel/cpu/bugs.c | 17 ++++++++---------
1 file changed, 8 insertions(+), 9 deletions(-)
--
2.43.5