File tree Expand file tree Collapse file tree 3 files changed +9
-11
lines changed
Documentation/admin-guide Expand file tree Collapse file tree 3 files changed +9
-11
lines changed Original file line number Diff line number Diff line change @@ -441,10 +441,10 @@ The possible values in this file are:
441
441
- System is protected by BHI_DIS_S
442
442
* - BHI: SW loop, KVM SW loop
443
443
- System is protected by software clearing sequence
444
- * - BHI: Syscall hardening
445
- - Syscalls are hardened against BHI
446
- * - BHI: Syscall hardening , KVM: SW loop
447
- - System is protected from userspace attacks by syscall hardening ; KVM is protected by software clearing sequence
444
+ * - BHI: Vulnerable
445
+ - System is vulnerable to BHI
446
+ * - BHI: Vulnerable , KVM: SW loop
447
+ - System is vulnerable ; KVM is protected by software clearing sequence
448
448
449
449
Full mitigation might require a microcode update from the CPU
450
450
vendor. When the necessary microcode is not available, the kernel will
@@ -661,8 +661,7 @@ kernel command line.
661
661
spectre_bhi=
662
662
663
663
[X86] Control mitigation of Branch History Injection
664
- (BHI) vulnerability. Syscalls are hardened against BHI
665
- regardless of this setting. This setting affects the deployment
664
+ (BHI) vulnerability. This setting affects the deployment
666
665
of the HW BHI control and the SW BHB clearing sequence.
667
666
668
667
on
Original file line number Diff line number Diff line change 6065
6065
See Documentation/admin-guide/laptops/sonypi.rst
6066
6066
6067
6067
spectre_bhi= [X86] Control mitigation of Branch History Injection
6068
- (BHI) vulnerability. Syscalls are hardened against BHI
6069
- reglardless of this setting. This setting affects the
6068
+ (BHI) vulnerability. This setting affects the
6070
6069
deployment of the HW BHI control and the SW BHB
6071
6070
clearing sequence.
6072
6071
Original file line number Diff line number Diff line change @@ -2818,10 +2818,10 @@ static const char *spectre_bhi_state(void)
2818
2818
return "; BHI: SW loop, KVM: SW loop" ;
2819
2819
else if (boot_cpu_has (X86_FEATURE_RETPOLINE ) && rrsba_disabled )
2820
2820
return "; BHI: Retpoline" ;
2821
- else if (boot_cpu_has (X86_FEATURE_CLEAR_BHB_LOOP_ON_VMEXIT ))
2822
- return "; BHI: Syscall hardening , KVM: SW loop" ;
2821
+ else if (boot_cpu_has (X86_FEATURE_CLEAR_BHB_LOOP_ON_VMEXIT ))
2822
+ return "; BHI: Vulnerable , KVM: SW loop" ;
2823
2823
2824
- return "; BHI: Vulnerable (Syscall hardening enabled) " ;
2824
+ return "; BHI: Vulnerable" ;
2825
2825
}
2826
2826
2827
2827
static ssize_t spectre_v2_show_state (char * buf )
You can’t perform that action at this time.
0 commit comments