On Wed, 2018-01-03 at 21:11 +0100, Greg Kroah-Hartman wrote:
> 4.9-stable review patch.  If anyone has any objections, please let me know.
> 
> ------------------
> 
> From: Borislav Petkov <b...@suse.de>
> 
> 
> AMD (and possibly other vendors) are not affected by the leak
> KAISER is protecting against.
[...]
> +void __init kaiser_check_boottime_disable(void)
> +{
> +     bool enable = true;
> +     char arg[5];
> +     int ret;
> +
> +     ret = cmdline_find_option(boot_command_line, "pti", arg, sizeof(arg));
> +     if (ret > 0) {
> +             if (!strncmp(arg, "on", 2))
> +                     goto enable;
> +
> +             if (!strncmp(arg, "off", 3))
> +                     goto disable;
> +
> +             if (!strncmp(arg, "auto", 4))
> +                     goto skip;
> +     }
> +
> +     if (cmdline_find_option_bool(boot_command_line, "nopti"))
> +             goto disable;
> +
> +skip:
> +     if (boot_cpu_data.x86_vendor == X86_VENDOR_AMD)
> +             goto disable;
[...]

No such exception has been added upstream, so I don't think it's
appropriate to add it in stable.

Ben.

-- 
Ben Hutchings
Quantity is no substitute for quality, but it's the only one we've got.

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to