diff options
author | Diana Craciun <diana.craciun@nxp.com> | 2018-07-28 01:06:39 +0200 |
---|---|---|
committer | Michael Ellerman <mpe@ellerman.id.au> | 2018-08-07 16:32:25 +0200 |
commit | 26cb1f36c43ee6e89d2a9f48a5a7500d5248f836 (patch) | |
tree | f2178f3ee885543626d55eb22ff6395b42276d7f /Documentation/admin-guide | |
parent | powerpc/fsl: Sanitize the syscall table for NXP PowerPC 32 bit platforms (diff) | |
download | linux-26cb1f36c43ee6e89d2a9f48a5a7500d5248f836.tar.xz linux-26cb1f36c43ee6e89d2a9f48a5a7500d5248f836.zip |
Documentation: Add nospectre_v1 parameter
Currently only supported on powerpc.
Signed-off-by: Diana Craciun <diana.craciun@nxp.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Diffstat (limited to 'Documentation/admin-guide')
-rw-r--r-- | Documentation/admin-guide/kernel-parameters.txt | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt index efc7aa7a0670..4167bbea51e1 100644 --- a/Documentation/admin-guide/kernel-parameters.txt +++ b/Documentation/admin-guide/kernel-parameters.txt @@ -2687,6 +2687,10 @@ nosmt [KNL,S390] Disable symmetric multithreading (SMT). Equivalent to smt=1. + nospectre_v1 [PPC] Disable mitigations for Spectre Variant 1 (bounds + check bypass). With this option data leaks are possible + in the system. + nospectre_v2 [X86] Disable all mitigations for the Spectre variant 2 (indirect branch prediction) vulnerability. System may allow data leaks with this option, which is equivalent |