@@ -2010,10 +2010,84 @@ bytes respectively. Such letter suffixes can also be entirely omitted.
20102010 (virtualized real and unpaged mode) on capable
20112011 Intel chips. Default is 1 (enabled)
20122012
2013+ kvm-intel.vmentry_l1d_flush=[KVM,Intel] Mitigation for L1 Terminal Fault
2014+ CVE-2018-3620.
2015+
2016+ Valid arguments: never, cond, always
2017+
2018+ always: L1D cache flush on every VMENTER.
2019+ cond: Flush L1D on VMENTER only when the code between
2020+ VMEXIT and VMENTER can leak host memory.
2021+ never: Disables the mitigation
2022+
2023+ Default is cond (do L1 cache flush in specific instances)
2024+
20132025 kvm-intel.vpid= [KVM,Intel] Disable Virtual Processor Identification
20142026 feature (tagged TLBs) on capable Intel chips.
20152027 Default is 1 (enabled)
20162028
2029+ l1tf= [X86] Control mitigation of the L1TF vulnerability on
2030+ affected CPUs
2031+
2032+ The kernel PTE inversion protection is unconditionally
2033+ enabled and cannot be disabled.
2034+
2035+ full
2036+ Provides all available mitigations for the
2037+ L1TF vulnerability. Disables SMT and
2038+ enables all mitigations in the
2039+ hypervisors, i.e. unconditional L1D flush.
2040+
2041+ SMT control and L1D flush control via the
2042+ sysfs interface is still possible after
2043+ boot. Hypervisors will issue a warning
2044+ when the first VM is started in a
2045+ potentially insecure configuration,
2046+ i.e. SMT enabled or L1D flush disabled.
2047+
2048+ full,force
2049+ Same as 'full', but disables SMT and L1D
2050+ flush runtime control. Implies the
2051+ 'nosmt=force' command line option.
2052+ (i.e. sysfs control of SMT is disabled.)
2053+
2054+ flush
2055+ Leaves SMT enabled and enables the default
2056+ hypervisor mitigation, i.e. conditional
2057+ L1D flush.
2058+
2059+ SMT control and L1D flush control via the
2060+ sysfs interface is still possible after
2061+ boot. Hypervisors will issue a warning
2062+ when the first VM is started in a
2063+ potentially insecure configuration,
2064+ i.e. SMT enabled or L1D flush disabled.
2065+
2066+ flush,nosmt
2067+
2068+ Disables SMT and enables the default
2069+ hypervisor mitigation.
2070+
2071+ SMT control and L1D flush control via the
2072+ sysfs interface is still possible after
2073+ boot. Hypervisors will issue a warning
2074+ when the first VM is started in a
2075+ potentially insecure configuration,
2076+ i.e. SMT enabled or L1D flush disabled.
2077+
2078+ flush,nowarn
2079+ Same as 'flush', but hypervisors will not
2080+ warn when a VM is started in a potentially
2081+ insecure configuration.
2082+
2083+ off
2084+ Disables hypervisor mitigations and doesn't
2085+ emit any warnings.
2086+
2087+ Default is 'flush'.
2088+
2089+ For details see: Documentation/admin-guide/l1tf.rst
2090+
20172091 l2cr= [PPC]
20182092
20192093 l3cr= [PPC]
@@ -2694,6 +2768,10 @@ bytes respectively. Such letter suffixes can also be entirely omitted.
26942768 nosmt [KNL,S390] Disable symmetric multithreading (SMT).
26952769 Equivalent to smt=1.
26962770
2771+ [KNL,x86] Disable symmetric multithreading (SMT).
2772+ nosmt=force: Force disable SMT, cannot be undone
2773+ via the sysfs control file.
2774+
26972775 nospectre_v2 [X86] Disable all mitigations for the Spectre variant 2
26982776 (indirect branch prediction) vulnerability. System may
26992777 allow data leaks with this option, which is equivalent
@@ -4023,6 +4101,23 @@ bytes respectively. Such letter suffixes can also be entirely omitted.
40234101 spia_pedr=
40244102 spia_peddr=
40254103
4104+ ssbd= [ARM64,HW]
4105+ Speculative Store Bypass Disable control
4106+
4107+ On CPUs that are vulnerable to the Speculative
4108+ Store Bypass vulnerability and offer a
4109+ firmware based mitigation, this parameter
4110+ indicates how the mitigation should be used:
4111+
4112+ force-on: Unconditionally enable mitigation for
4113+ for both kernel and userspace
4114+ force-off: Unconditionally disable mitigation for
4115+ for both kernel and userspace
4116+ kernel: Always enable mitigation in the
4117+ kernel, and offer a prctl interface
4118+ to allow userspace to register its
4119+ interest in being mitigated too.
4120+
40264121 stack_guard_gap= [MM]
40274122 override the default stack gap protection. The value
40284123 is in page units and it defines how many pages prior
0 commit comments