@@ -2010,10 +2010,84 @@ bytes respectively. Such letter suffixes can also be entirely omitted.
20102010			(virtualized real and unpaged mode) on capable
20112011			Intel chips. Default is 1 (enabled)
20122012
2013+ 	kvm-intel.vmentry_l1d_flush=[KVM,Intel] Mitigation for L1 Terminal Fault
2014+ 			CVE-2018-3620.
2015+ 
2016+ 			Valid arguments: never, cond, always
2017+ 
2018+ 			always: L1D cache flush on every VMENTER.
2019+ 			cond:	Flush L1D on VMENTER only when the code between
2020+ 				VMEXIT and VMENTER can leak host memory.
2021+ 			never:	Disables the mitigation
2022+ 
2023+ 			Default is cond (do L1 cache flush in specific instances)
2024+ 
20132025	kvm-intel.vpid=	[KVM,Intel] Disable Virtual Processor Identification
20142026			feature (tagged TLBs) on capable Intel chips.
20152027			Default is 1 (enabled)
20162028
2029+ 	l1tf=           [X86] Control mitigation of the L1TF vulnerability on
2030+ 			      affected CPUs
2031+ 
2032+ 			The kernel PTE inversion protection is unconditionally
2033+ 			enabled and cannot be disabled.
2034+ 
2035+ 			full
2036+ 				Provides all available mitigations for the
2037+ 				L1TF vulnerability. Disables SMT and
2038+ 				enables all mitigations in the
2039+ 				hypervisors, i.e. unconditional L1D flush.
2040+ 
2041+ 				SMT control and L1D flush control via the
2042+ 				sysfs interface is still possible after
2043+ 				boot.  Hypervisors will issue a warning
2044+ 				when the first VM is started in a
2045+ 				potentially insecure configuration,
2046+ 				i.e. SMT enabled or L1D flush disabled.
2047+ 
2048+ 			full,force
2049+ 				Same as 'full', but disables SMT and L1D
2050+ 				flush runtime control. Implies the
2051+ 				'nosmt=force' command line option.
2052+ 				(i.e. sysfs control of SMT is disabled.)
2053+ 
2054+ 			flush
2055+ 				Leaves SMT enabled and enables the default
2056+ 				hypervisor mitigation, i.e. conditional
2057+ 				L1D flush.
2058+ 
2059+ 				SMT control and L1D flush control via the
2060+ 				sysfs interface is still possible after
2061+ 				boot.  Hypervisors will issue a warning
2062+ 				when the first VM is started in a
2063+ 				potentially insecure configuration,
2064+ 				i.e. SMT enabled or L1D flush disabled.
2065+ 
2066+ 			flush,nosmt
2067+ 
2068+ 				Disables SMT and enables the default
2069+ 				hypervisor mitigation.
2070+ 
2071+ 				SMT control and L1D flush control via the
2072+ 				sysfs interface is still possible after
2073+ 				boot.  Hypervisors will issue a warning
2074+ 				when the first VM is started in a
2075+ 				potentially insecure configuration,
2076+ 				i.e. SMT enabled or L1D flush disabled.
2077+ 
2078+ 			flush,nowarn
2079+ 				Same as 'flush', but hypervisors will not
2080+ 				warn when a VM is started in a potentially
2081+ 				insecure configuration.
2082+ 
2083+ 			off
2084+ 				Disables hypervisor mitigations and doesn't
2085+ 				emit any warnings.
2086+ 
2087+ 			Default is 'flush'.
2088+ 
2089+ 			For details see: Documentation/admin-guide/l1tf.rst
2090+ 
20172091	l2cr=		[PPC]
20182092
20192093	l3cr=		[PPC]
@@ -2694,6 +2768,10 @@ bytes respectively. Such letter suffixes can also be entirely omitted.
26942768	nosmt		[KNL,S390] Disable symmetric multithreading (SMT).
26952769			Equivalent to smt=1.
26962770
2771+ 			[KNL,x86] Disable symmetric multithreading (SMT).
2772+ 			nosmt=force: Force disable SMT, cannot be undone
2773+ 				     via the sysfs control file.
2774+ 
26972775	nospectre_v2	[X86] Disable all mitigations for the Spectre variant 2
26982776			(indirect branch prediction) vulnerability. System may
26992777			allow data leaks with this option, which is equivalent
@@ -4023,6 +4101,23 @@ bytes respectively. Such letter suffixes can also be entirely omitted.
40234101	spia_pedr=
40244102	spia_peddr=
40254103
4104+ 	ssbd=		[ARM64,HW]
4105+ 			Speculative Store Bypass Disable control
4106+ 
4107+ 			On CPUs that are vulnerable to the Speculative
4108+ 			Store Bypass vulnerability and offer a
4109+ 			firmware based mitigation, this parameter
4110+ 			indicates how the mitigation should be used:
4111+ 
4112+ 			force-on:  Unconditionally enable mitigation for
4113+ 				   for both kernel and userspace
4114+ 			force-off: Unconditionally disable mitigation for
4115+ 				   for both kernel and userspace
4116+ 			kernel:    Always enable mitigation in the
4117+ 				   kernel, and offer a prctl interface
4118+ 				   to allow userspace to register its
4119+ 				   interest in being mitigated too.
4120+ 
40264121	stack_guard_gap=	[MM]
40274122			override the default stack gap protection. The value
40284123			is in page units and it defines how many pages prior
0 commit comments