File tree Expand file tree Collapse file tree 4 files changed +1
-21
lines changed
Documentation/admin-guide Expand file tree Collapse file tree 4 files changed +1
-21
lines changed Original file line number Diff line number Diff line change @@ -669,10 +669,6 @@ kernel command line.
669
669
needed.
670
670
off
671
671
Disable the mitigation.
672
- auto
673
- Enable the HW mitigation if needed, but
674
- *don't * enable the SW mitigation except for KVM.
675
- The system may be vulnerable.
676
672
677
673
For spectre_v2_user see Documentation/admin-guide/kernel-parameters.txt
678
674
Original file line number Diff line number Diff line change 6072
6072
on - (default) Enable the HW or SW mitigation
6073
6073
as needed.
6074
6074
off - Disable the mitigation.
6075
- auto - Enable the HW mitigation if needed, but
6076
- *don't* enable the SW mitigation except
6077
- for KVM. The system may be vulnerable.
6078
6075
6079
6076
spectre_v2= [X86,EARLY] Control mitigation of Spectre variant 2
6080
6077
(indirect branch speculation) vulnerability.
Original file line number Diff line number Diff line change @@ -2651,11 +2651,6 @@ config SPECTRE_BHI_OFF
2651
2651
bool "off"
2652
2652
help
2653
2653
Equivalent to setting spectre_bhi=off command line parameter.
2654
- config SPECTRE_BHI_AUTO
2655
- bool "auto"
2656
- depends on BROKEN
2657
- help
2658
- Equivalent to setting spectre_bhi=auto command line parameter.
2659
2654
2660
2655
endchoice
2661
2656
Original file line number Diff line number Diff line change @@ -1625,13 +1625,10 @@ static bool __init spec_ctrl_bhi_dis(void)
1625
1625
enum bhi_mitigations {
1626
1626
BHI_MITIGATION_OFF ,
1627
1627
BHI_MITIGATION_ON ,
1628
- BHI_MITIGATION_AUTO ,
1629
1628
};
1630
1629
1631
1630
static enum bhi_mitigations bhi_mitigation __ro_after_init =
1632
- IS_ENABLED (CONFIG_SPECTRE_BHI_ON ) ? BHI_MITIGATION_ON :
1633
- IS_ENABLED (CONFIG_SPECTRE_BHI_OFF ) ? BHI_MITIGATION_OFF :
1634
- BHI_MITIGATION_AUTO ;
1631
+ IS_ENABLED (CONFIG_SPECTRE_BHI_ON ) ? BHI_MITIGATION_ON : BHI_MITIGATION_OFF ;
1635
1632
1636
1633
static int __init spectre_bhi_parse_cmdline (char * str )
1637
1634
{
@@ -1642,8 +1639,6 @@ static int __init spectre_bhi_parse_cmdline(char *str)
1642
1639
bhi_mitigation = BHI_MITIGATION_OFF ;
1643
1640
else if (!strcmp (str , "on" ))
1644
1641
bhi_mitigation = BHI_MITIGATION_ON ;
1645
- else if (!strcmp (str , "auto" ))
1646
- bhi_mitigation = BHI_MITIGATION_AUTO ;
1647
1642
else
1648
1643
pr_err ("Ignoring unknown spectre_bhi option (%s)" , str );
1649
1644
@@ -1673,9 +1668,6 @@ static void __init bhi_select_mitigation(void)
1673
1668
setup_force_cpu_cap (X86_FEATURE_CLEAR_BHB_LOOP_ON_VMEXIT );
1674
1669
pr_info ("Spectre BHI mitigation: SW BHB clearing on vm exit\n" );
1675
1670
1676
- if (bhi_mitigation == BHI_MITIGATION_AUTO )
1677
- return ;
1678
-
1679
1671
/* Mitigate syscalls when the mitigation is forced =on */
1680
1672
setup_force_cpu_cap (X86_FEATURE_CLEAR_BHB_LOOP );
1681
1673
pr_info ("Spectre BHI mitigation: SW BHB clearing on syscall\n" );
You can’t perform that action at this time.
0 commit comments