x86/retbleed: add "stuff" mode admin documentation
Commit Message
Add admin documentation for "retbleed=stuff", based on commit
description and source code.
Fixes: d82a0345cf21 ("x86/retbleed: Add call depth tracking mitigation")
Signed-off-by: Randy Dunlap <rdunlap@infradead.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Dave Hansen <dave.hansen@linux.intel.com>
Cc: x86@kernel.org
Cc: Jonathan Corbet <corbet@lwn.net>
Cc: linux-doc@vger.kernel.org
---
Documentation/admin-guide/kernel-parameters.txt | 8 ++++++++
1 file changed, 8 insertions(+)
Comments
* Randy Dunlap <rdunlap@infradead.org> wrote:
> Add admin documentation for "retbleed=stuff", based on commit
> description and source code.
>
> Fixes: d82a0345cf21 ("x86/retbleed: Add call depth tracking mitigation")
> Signed-off-by: Randy Dunlap <rdunlap@infradead.org>
> Cc: Thomas Gleixner <tglx@linutronix.de>
> Cc: Borislav Petkov <bp@alien8.de>
> Cc: Ingo Molnar <mingo@redhat.com>
> Cc: Dave Hansen <dave.hansen@linux.intel.com>
> Cc: x86@kernel.org
> Cc: Jonathan Corbet <corbet@lwn.net>
> Cc: linux-doc@vger.kernel.org
> ---
> Documentation/admin-guide/kernel-parameters.txt | 8 ++++++++
> 1 file changed, 8 insertions(+)
>
> diff -- a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt
> --- a/Documentation/admin-guide/kernel-parameters.txt
> +++ b/Documentation/admin-guide/kernel-parameters.txt
> @@ -5364,6 +5364,14 @@
> when STIBP is not available. This is
> the alternative for systems which do not
> have STIBP.
> + stuff - Enables "stuffing" mode mitigation,
> + which uses return thunking and call depth
> + tracking. Only if effect if
> + CONFIG_CALL_DEPTH_TRACKING is set and
> + Spectre V2 mitigation mode is
> + "retpoline".
> + IBRS is fully secure mitigation but is
> + more costly (slower) than stuffing.
Typo:
s/only if effect if
/only in effect if
Other than that:
Acked-by: Ingo Molnar <mingo@kernel.org>
Thanks,
Ingo
@@ -5364,6 +5364,14 @@
when STIBP is not available. This is
the alternative for systems which do not
have STIBP.
+ stuff - Enables "stuffing" mode mitigation,
+ which uses return thunking and call depth
+ tracking. Only if effect if
+ CONFIG_CALL_DEPTH_TRACKING is set and
+ Spectre V2 mitigation mode is
+ "retpoline".
+ IBRS is fully secure mitigation but is
+ more costly (slower) than stuffing.
unret - Force enable untrained return thunks,
only effective on AMD f15h-f17h based
systems.