summaryrefslogtreecommitdiff
path: root/Documentation
diff options
context:
space:
mode:
authorDiana Craciun <diana.craciun@nxp.com>2018-07-28 09:06:39 +1000
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2019-05-02 09:40:34 +0200
commit0a5112f20c1deca4b3899fdbf711f309ee977a18 (patch)
treea1521bb6c9d98b90dd9104701711d012209eb3ce /Documentation
parent07198c41d25aa963d33b2ccc7909c06655b6613c (diff)
Documentation: Add nospectre_v1 parameter
commit 26cb1f36c43ee6e89d2a9f48a5a7500d5248f836 upstream. Currently only supported on powerpc. Signed-off-by: Diana Craciun <diana.craciun@nxp.com> Signed-off-by: Michael Ellerman <mpe@ellerman.id.au> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'Documentation')
-rw-r--r--Documentation/admin-guide/kernel-parameters.txt4
1 files changed, 4 insertions, 0 deletions
diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt
index 9372918e2b2a..94fa46d2d805 100644
--- a/Documentation/admin-guide/kernel-parameters.txt
+++ b/Documentation/admin-guide/kernel-parameters.txt
@@ -2680,6 +2680,10 @@
nosmt=force: Force disable SMT, cannot be undone
via the sysfs control file.
+ nospectre_v1 [PPC] Disable mitigations for Spectre Variant 1 (bounds
+ check bypass). With this option data leaks are possible
+ in the system.
+
nospectre_v2 [X86,PPC_FSL_BOOK3E] Disable all mitigations for the Spectre variant 2
(indirect branch prediction) vulnerability. System may
allow data leaks with this option, which is equivalent