]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/blame - queue-4.4/documentation-add-nospectre_v1-parameter.patch
4.4-stable patches
[thirdparty/kernel/stable-queue.git] / queue-4.4 / documentation-add-nospectre_v1-parameter.patch
CommitLineData
ad99ec7c
GKH
1From 26cb1f36c43ee6e89d2a9f48a5a7500d5248f836 Mon Sep 17 00:00:00 2001
2From: Diana Craciun <diana.craciun@nxp.com>
3Date: Sat, 28 Jul 2018 09:06:39 +1000
4Subject: Documentation: Add nospectre_v1 parameter
5
6From: Diana Craciun <diana.craciun@nxp.com>
7
8commit 26cb1f36c43ee6e89d2a9f48a5a7500d5248f836 upstream.
9
10Currently only supported on powerpc.
11
12Signed-off-by: Diana Craciun <diana.craciun@nxp.com>
13Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
14Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
15
16---
17 Documentation/kernel-parameters.txt | 4 ++++
18 1 file changed, 4 insertions(+)
19
20--- a/Documentation/kernel-parameters.txt
21+++ b/Documentation/kernel-parameters.txt
22@@ -2450,6 +2450,10 @@ bytes respectively. Such letter suffixes
23
24 nohugeiomap [KNL,x86] Disable kernel huge I/O mappings.
25
26+ nospectre_v1 [PPC] Disable mitigations for Spectre Variant 1 (bounds
27+ check bypass). With this option data leaks are possible
28+ in the system.
29+
30 nospectre_v2 [X86,PPC_FSL_BOOK3E] Disable all mitigations for the Spectre variant 2
31 (indirect branch prediction) vulnerability. System may
32 allow data leaks with this option, which is equivalent