On 11/20/2018 04:44 PM, Jiri Kosina wrote:
> On Tue, 20 Nov 2018, Tim Chen wrote:
> 
>> diff --git a/Documentation/admin-guide/kernel-parameters.txt 
>> b/Documentation/admin-guide/kernel-parameters.txt
>> index d2255f7..89b193c 100644
>> --- a/Documentation/admin-guide/kernel-parameters.txt
>> +++ b/Documentation/admin-guide/kernel-parameters.txt
>> @@ -4227,12 +4227,17 @@
>>                                and STIBP mitigations against Spectre V2 
>> attacks.
>>                                If the CPU is not vulnerable, "off" is 
>> selected.
>>                                If the CPU is vulnerable, the default 
>> mitigation
>> -                              is "prctl".
>> +                              is architecture and Kconfig dependent. See 
>> below.
>>                      prctl   - Enable mitigations per thread by restricting
>>                                indirect branch speculation via prctl.
>>                                Mitigation for a thread is not enabled by 
>> default to
>>                                avoid mitigation overhead. The state of
>>                                of the control is inherited on fork.
>> +                    seccomp - Same as "prctl" above, but all seccomp threads
>> +                              will disable SSB unless they explicitly opt 
>> out.
> 
> As Dave already pointed out elsewhere -- the "SSB" here is probably a 
> copy/paste error. It should read something along the lines of "... will 
> restrict indirect branch speculation ..."
> 

Thanks.  Should have caught it.

Tim

Reply via email to