diff options
author | Alexandre Chartre <alexandre.chartre@oracle.com> | 2022-06-14 23:15:50 +0200 |
---|---|---|
committer | Borislav Petkov <bp@suse.de> | 2022-06-27 10:33:59 +0200 |
commit | 7fbf47c7ce50b38a64576b150e7011ae73d54669 (patch) | |
tree | 8cb177c7abdd79b9f1344be6881ef9a46631a2e2 /drivers/pwm/pwm-img.c | |
parent | x86/bugs: Report AMD retbleed vulnerability (diff) | |
download | linux-7fbf47c7ce50b38a64576b150e7011ae73d54669.tar.xz linux-7fbf47c7ce50b38a64576b150e7011ae73d54669.zip |
x86/bugs: Add AMD retbleed= boot parameter
Add the "retbleed=<value>" boot parameter to select a mitigation for
RETBleed. Possible values are "off", "auto" and "unret"
(JMP2RET mitigation). The default value is "auto".
Currently, "retbleed=auto" will select the unret mitigation on
AMD and Hygon and no mitigation on Intel (JMP2RET is not effective on
Intel).
[peterz: rebase; add hygon]
[jpoimboe: cleanups]
Signed-off-by: Alexandre Chartre <alexandre.chartre@oracle.com>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Borislav Petkov <bp@suse.de>
Reviewed-by: Josh Poimboeuf <jpoimboe@kernel.org>
Signed-off-by: Borislav Petkov <bp@suse.de>
Diffstat (limited to 'drivers/pwm/pwm-img.c')
0 files changed, 0 insertions, 0 deletions