aboutsummaryrefslogtreecommitdiff
path: root/.gitattributes
diff options
context:
space:
mode:
authorGravatar Pawan Gupta <pawan.kumar.gupta@linux.intel.com> 2024-03-11 08:57:09 -0700
committerGravatar Thomas Gleixner <tglx@linutronix.de> 2024-04-08 19:27:06 +0200
commit95a6ccbdc7199a14b71ad8901cb788ba7fb5167b (patch)
tree2756d1354b90ff94be54ba551fbe6570365d2bf7 /.gitattributes
parentx86/bhi: Add BHI mitigation knob (diff)
downloadlinux-95a6ccbdc7199a14b71ad8901cb788ba7fb5167b.tar.gz
linux-95a6ccbdc7199a14b71ad8901cb788ba7fb5167b.tar.bz2
linux-95a6ccbdc7199a14b71ad8901cb788ba7fb5167b.zip
x86/bhi: Mitigate KVM by default
BHI mitigation mode spectre_bhi=auto does not deploy the software mitigation by default. In a cloud environment, it is a likely scenario where userspace is trusted but the guests are not trusted. Deploying system wide mitigation in such cases is not desirable. Update the auto mode to unconditionally mitigate against malicious guests. Deploy the software sequence at VMexit in auto mode also, when hardware mitigation is not available. Unlike the force =on mode, software sequence is not deployed at syscalls in auto mode. Suggested-by: Alexandre Chartre <alexandre.chartre@oracle.com> Signed-off-by: Pawan Gupta <pawan.kumar.gupta@linux.intel.com> Signed-off-by: Daniel Sneddon <daniel.sneddon@linux.intel.com> Signed-off-by: Thomas Gleixner <tglx@linutronix.de> Reviewed-by: Alexandre Chartre <alexandre.chartre@oracle.com> Reviewed-by: Josh Poimboeuf <jpoimboe@kernel.org>
Diffstat (limited to '.gitattributes')
0 files changed, 0 insertions, 0 deletions