ACK/CMNT: [SRU][Xenial][PATCH 1/3] UBUNTU: SAUCE: x86/speculation: Cleanup IBPB runtime control handling
Juerg Haefliger
juerg.haefliger at canonical.com
Mon Dec 3 12:53:50 UTC 2018
> > +int set_ibpb_enabled(unsigned int val)
> > +{
> > + int error = 0;
> > +
> > + mutex_lock(&spec_ctrl_mutex);
> > +
> > + /* Only enable IBPB if the CPU supports it */
> > + if (boot_cpu_has(X86_FEATURE_IBPB)) {
> > + ibpb_enabled = val;
> > + pr_info("Spectre V2 : Spectre v2 mitigation: %s Indirect "
>
> I think the "Spectre V2 : " portion of this message is redundant and is
> also not present in upstream's message which could confuse user or
> scripts that are looking at log messages. Can it be removed when
> applying the patch?
This is exactly how upstream reported it until 5 days ago (commit
4c71a2b6fd7e changed that message format) :-)
$ uname -r
4.18.0-11-generic
$ dmesg | grep 'Spectre V2'
[ 0.028000] Spectre V2 : Mitigation: Full generic retpoline
[ 0.028000] Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
[ 0.028000] Spectre V2 : Spectre v2 mitigation: Enabling Indirect Branch Prediction Barrier
[ 0.028000] Spectre V2 : Enabling Restricted Speculation for firmware calls
...Juerg
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20181203/9fb454b4/attachment.sig>
More information about the kernel-team
mailing list