]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/blame - releases/6.6.26/x86-set-spectre_bhi_on-as-default.patch
Linux 6.6.26
[thirdparty/kernel/stable-queue.git] / releases / 6.6.26 / x86-set-spectre_bhi_on-as-default.patch
CommitLineData
742f5e89
GKH
1From foo@baz Tue Apr 9 07:32:41 PM CEST 2024
2Date: Tue, 09 Apr 2024 19:32:41 +0200
3To: Greg KH <gregkh@linuxfoundation.org>
4From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
5Subject: x86: set SPECTRE_BHI_ON as default
6
7commit 2bb69f5fc72183e1c62547d900f560d0e9334925 upstream.
8
9Part of a merge commit from Linus that adjusted the default setting of
10SPECTRE_BHI_ON.
11
12Cc: Linus Torvalds <torvalds@linux-foundation.org>
13Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
14---
15 arch/x86/Kconfig | 2 +-
16 1 file changed, 1 insertion(+), 1 deletion(-)
17
18--- a/arch/x86/Kconfig
19+++ b/arch/x86/Kconfig
20@@ -2569,7 +2569,7 @@ config MITIGATION_RFDS
21 choice
22 prompt "Clear branch history"
23 depends on CPU_SUP_INTEL
24- default SPECTRE_BHI_AUTO
25+ default SPECTRE_BHI_ON
26 help
27 Enable BHI mitigations. BHI attacks are a form of Spectre V2 attacks
28 where the branch history buffer is poisoned to speculatively steer