BugLink: https://bugs.launchpad.net/bugs/1838459
commit
26cb1f36c43ee6e89d2a9f48a5a7500d5248f836 upstream.
Currently only supported on powerpc.
Signed-off-by: Diana Craciun <diana.craciun@nxp.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Kamal Mostafa <kamal@canonical.com>
Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>
nosmt=force: Force disable SMT, cannot be undone
via the sysfs control file.
- nospectre_v1 [X86] Disable mitigations for Spectre Variant 1 (bounds
+ nospectre_v1 [X86,PPC] Disable mitigations for Spectre Variant 1 (bounds
check bypass). With this option data leaks are possible
in the system.