summaryrefslogtreecommitdiffstats
path: root/Documentation
diff options
context:
space:
mode:
authorDiana Craciun <diana.craciun@nxp.com>2018-07-28 01:06:39 +0200
committerMichael Ellerman <mpe@ellerman.id.au>2018-08-07 16:32:25 +0200
commit26cb1f36c43ee6e89d2a9f48a5a7500d5248f836 (patch)
treef2178f3ee885543626d55eb22ff6395b42276d7f /Documentation
parentpowerpc/fsl: Sanitize the syscall table for NXP PowerPC 32 bit platforms (diff)
downloadlinux-26cb1f36c43ee6e89d2a9f48a5a7500d5248f836.tar.xz
linux-26cb1f36c43ee6e89d2a9f48a5a7500d5248f836.zip
Documentation: Add nospectre_v1 parameter
Currently only supported on powerpc. Signed-off-by: Diana Craciun <diana.craciun@nxp.com> Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Diffstat (limited to 'Documentation')
-rw-r--r--Documentation/admin-guide/kernel-parameters.txt4
1 files changed, 4 insertions, 0 deletions
diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt
index efc7aa7a0670..4167bbea51e1 100644
--- a/Documentation/admin-guide/kernel-parameters.txt
+++ b/Documentation/admin-guide/kernel-parameters.txt
@@ -2687,6 +2687,10 @@
nosmt [KNL,S390] Disable symmetric multithreading (SMT).
Equivalent to smt=1.
+ nospectre_v1 [PPC] Disable mitigations for Spectre Variant 1 (bounds
+ check bypass). With this option data leaks are possible
+ in the system.
+
nospectre_v2 [X86] Disable all mitigations for the Spectre variant 2
(indirect branch prediction) vulnerability. System may
allow data leaks with this option, which is equivalent