File tree Expand file tree Collapse file tree 4 files changed +1
-20
lines changed
Documentation/admin-guide Expand file tree Collapse file tree 4 files changed +1
-20
lines changed Original file line number Diff line number Diff line change @@ -669,10 +669,6 @@ kernel command line.
669
669
needed.
670
670
off
671
671
Disable the mitigation.
672
- auto
673
- Enable the HW mitigation if needed, but
674
- *don't * enable the SW mitigation except for KVM.
675
- The system may be vulnerable.
676
672
677
673
For spectre_v2_user see Documentation/admin-guide/kernel-parameters.txt
678
674
Original file line number Diff line number Diff line change 5929
5929
on - (default) Enable the HW or SW mitigation
5930
5930
as needed.
5931
5931
off - Disable the mitigation.
5932
- auto - Enable the HW mitigation if needed, but
5933
- *don't* enable the SW mitigation except
5934
- for KVM. The system may be vulnerable.
5935
5932
5936
5933
spectre_v2= [X86] Control mitigation of Spectre variant 2
5937
5934
(indirect branch speculation) vulnerability.
Original file line number Diff line number Diff line change @@ -2584,10 +2584,6 @@ config SPECTRE_BHI_OFF
2584
2584
bool "off"
2585
2585
help
2586
2586
Equivalent to setting spectre_bhi=off command line parameter.
2587
- config SPECTRE_BHI_AUTO
2588
- bool "auto"
2589
- help
2590
- Equivalent to setting spectre_bhi=auto command line parameter.
2591
2587
2592
2588
endchoice
2593
2589
Original file line number Diff line number Diff line change @@ -1624,13 +1624,10 @@ static bool __init spec_ctrl_bhi_dis(void)
1624
1624
enum bhi_mitigations {
1625
1625
BHI_MITIGATION_OFF ,
1626
1626
BHI_MITIGATION_ON ,
1627
- BHI_MITIGATION_AUTO ,
1628
1627
};
1629
1628
1630
1629
static enum bhi_mitigations bhi_mitigation __ro_after_init =
1631
- IS_ENABLED (CONFIG_SPECTRE_BHI_ON ) ? BHI_MITIGATION_ON :
1632
- IS_ENABLED (CONFIG_SPECTRE_BHI_OFF ) ? BHI_MITIGATION_OFF :
1633
- BHI_MITIGATION_AUTO ;
1630
+ IS_ENABLED (CONFIG_SPECTRE_BHI_ON ) ? BHI_MITIGATION_ON : BHI_MITIGATION_OFF ;
1634
1631
1635
1632
static int __init spectre_bhi_parse_cmdline (char * str )
1636
1633
{
@@ -1641,8 +1638,6 @@ static int __init spectre_bhi_parse_cmdline(char *str)
1641
1638
bhi_mitigation = BHI_MITIGATION_OFF ;
1642
1639
else if (!strcmp (str , "on" ))
1643
1640
bhi_mitigation = BHI_MITIGATION_ON ;
1644
- else if (!strcmp (str , "auto" ))
1645
- bhi_mitigation = BHI_MITIGATION_AUTO ;
1646
1641
else
1647
1642
pr_err ("Ignoring unknown spectre_bhi option (%s)" , str );
1648
1643
@@ -1672,9 +1667,6 @@ static void __init bhi_select_mitigation(void)
1672
1667
setup_force_cpu_cap (X86_FEATURE_CLEAR_BHB_LOOP_ON_VMEXIT );
1673
1668
pr_info ("Spectre BHI mitigation: SW BHB clearing on vm exit\n" );
1674
1669
1675
- if (bhi_mitigation == BHI_MITIGATION_AUTO )
1676
- return ;
1677
-
1678
1670
/* Mitigate syscalls when the mitigation is forced =on */
1679
1671
setup_force_cpu_cap (X86_FEATURE_CLEAR_BHB_LOOP );
1680
1672
pr_info ("Spectre BHI mitigation: SW BHB clearing on syscall\n" );
You can’t perform that action at this time.
0 commit comments