|
|
@@ -2503,15 +2503,20 @@
|
|
|
http://repo.or.cz/w/linux-2.6/mini2440.git
|
|
|
|
|
|
mitigations=
|
|
|
- Control optional mitigations for CPU vulnerabilities.
|
|
|
- This is a set of curated, arch-independent options, each
|
|
|
- of which is an aggregation of existing arch-specific
|
|
|
- options.
|
|
|
+ [X86] Control optional mitigations for CPU
|
|
|
+ vulnerabilities. This is a set of curated,
|
|
|
+ arch-independent options, each of which is an
|
|
|
+ aggregation of existing arch-specific options.
|
|
|
|
|
|
off
|
|
|
Disable all optional CPU mitigations. This
|
|
|
improves system performance, but it may also
|
|
|
expose users to several CPU vulnerabilities.
|
|
|
+ Equivalent to: nopti [X86]
|
|
|
+ nospectre_v2 [X86]
|
|
|
+ spectre_v2_user=off [X86]
|
|
|
+ spec_store_bypass_disable=off [X86]
|
|
|
+ l1tf=off [X86]
|
|
|
|
|
|
auto (default)
|
|
|
Mitigate all CPU vulnerabilities, but leave SMT
|
|
|
@@ -2519,12 +2524,13 @@
|
|
|
users who don't want to be surprised by SMT
|
|
|
getting disabled across kernel upgrades, or who
|
|
|
have other ways of avoiding SMT-based attacks.
|
|
|
- This is the default behavior.
|
|
|
+ Equivalent to: (default behavior)
|
|
|
|
|
|
auto,nosmt
|
|
|
Mitigate all CPU vulnerabilities, disabling SMT
|
|
|
if needed. This is for users who always want to
|
|
|
be fully mitigated, even if it means losing SMT.
|
|
|
+ Equivalent to: l1tf=flush,nosmt [X86]
|
|
|
|
|
|
mminit_loglevel=
|
|
|
[KNL] When CONFIG_DEBUG_MEMORY_INIT is set, this
|