summaryrefslogtreecommitdiffstats
path: root/Documentation/kernel-parameters.txt
Commit message (Expand)AuthorAgeFilesLines
* Documentation/hw-vuln: Update spectre docPeter Zijlstra2022-03-111-2/+6
* powerpc/64s: flush L1D after user accessesNicholas Piggin2020-11-221-0/+4
* powerpc/64s: flush L1D on kernel entryNicholas Piggin2020-11-221-0/+3
* xen/events: defer eoi in case of excessive number of eventsJuergen Gross2020-11-181-0/+8
* x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigationMark Gross2020-06-111-0/+20
* ACPI: watchdog: Allow disabling WDAT at bootJean Delvare2020-03-201-0/+4
* Documentation: Document arm64 kpti controlJeremy Linton2020-01-291-0/+6
* x86/speculation: Fix incorrect MDS/TAA mitigation statusWaiman Long2019-11-281-0/+11
* kvm: x86: mmu: Recovery of shattered NX large pagesJunaid Shahid2019-11-161-0/+6
* kvm: mmu: ITLB_MULTIHIT mitigationPaolo Bonzini2019-11-161-0/+19
* x86/speculation/taa: Add documentation for TSX Async AbortPawan Gupta2019-11-161-0/+38
* x86/tsx: Add "auto" option to the tsx= cmdline parameterPawan Gupta2019-11-161-0/+3
* x86/cpu: Add a "tsx=" cmdline option with TSX disabled by defaultPawan Gupta2019-11-161-0/+26
* x86/CPU/AMD: Clear RDRAND CPUID bit on AMD family 15h/16hTom Lendacky2019-09-061-0/+7
* x86/speculation: Enable Spectre v1 swapgs mitigationsJosh Poimboeuf2019-08-111-4/+5
* x86/speculation/mds: Add 'mitigations=' support for MDSJosh Poimboeuf2019-05-141-0/+2
* x86/speculation: Support 'mitigations=' cmdline optionJosh Poimboeuf2019-05-141-5/+11
* cpu/speculation: Add 'mitigations=' cmdline optionJosh Poimboeuf2019-05-141-0/+24
* x86/speculation/mds: Add mds=full,nosmt cmdline optionJosh Poimboeuf2019-05-141-2/+4
* Documentation: Add MDS vulnerability documentationThomas Gleixner2019-05-141-0/+2
* Documentation: Move L1TF to separate directoryThomas Gleixner2019-05-141-1/+1
* x86/speculation/mds: Add mitigation control for MDSThomas Gleixner2019-05-141-0/+22
* x86/speculation: Provide IBPB always command line optionsThomas Gleixner2019-05-141-0/+12
* x86/speculation: Add seccomp Spectre v2 user space protection modeThomas Gleixner2019-05-141-1/+8
* x86/speculation: Enable prctl mode for spectre_v2_userThomas Gleixner2019-05-141-1/+6
* x86/speculation: Add command line control for indirect branch speculationThomas Gleixner2019-05-141-2/+30
* x86/speculation/l1tf: Drop the swap storage limit restriction when l1tf=offMichal Hocko2019-05-141-0/+3
* Documentation: Add nospectre_v1 parameterDiana Craciun2019-05-021-0/+4
* powerpc/fsl: Add FSL_PPC_BOOK3E as supported arch for nospectre_v2 boot argDiana Craciun2019-05-021-1/+1
* ACPI: sysfs: Make ACPI GPE mask kernel parameter cover all GPEsPrarit Bhargava2018-11-101-1/+0
* x86/fpu: Finish excising 'eagerfpu'Andy Lutomirski2018-10-131-6/+0
* x86/bugs, kvm: Introduce boot-time control of L1TF mitigationsJiri Kosina2018-08-151-6/+62
* x86/KVM/VMX: Add module argument for L1TF mitigationKonrad Rzeszutek Wilk2018-08-151-0/+12
* x86/KVM: Warn user if KVM is loaded SMT and L1TF CPU bug being presentKonrad Rzeszutek Wilk2018-08-151-0/+6
* Revert "x86/apic: Ignore secondary threads if nosmt=force"Thomas Gleixner2018-08-151-6/+2
* cpu/hotplug: Provide knobs to control SMTThomas Gleixner2018-08-151-0/+8
* arm64: Add 'ssbd' command-line optionMarc Zyngier2018-07-221-0/+17
* x86/speculation: Make "seccomp" the default mode for Speculative Store BypassKees Cook2018-05-221-9/+17
* x86/speculation: Add prctl for Speculative Store Bypass mitigationThomas Gleixner2018-05-221-1/+5
* x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigationKonrad Rzeszutek Wilk2018-05-221-0/+33
* s390: introduce CPU alternativesVasily Gorbik2018-04-291-0/+3
* x86/paravirt: Remove 'noreplace-paravirt' cmdline optionJosh Poimboeuf2018-02-131-2/+0
* x86/spectre: Add boot time option to select Spectre v2 mitigationDavid Woodhouse2018-01-171-0/+28
* x86/Documentation: Add PTI descriptionDave Hansen2018-01-171-7/+14
* x86/kaiser: Check boottime cmdline paramsBorislav Petkov2018-01-051-0/+6
* x86/kaiser: Rename and simplify X86_FEATURE_KAISER handlingBorislav Petkov2018-01-051-1/+1
* kaiser: add "nokaiser" boot option, using ALTERNATIVEHugh Dickins2018-01-051-0/+2
* x86/mm: Add the 'nopcid' boot option to turn off PCIDAndy Lutomirski2018-01-021-0/+2
* mm: larger stack guard gap, between vmasHugh Dickins2017-06-241-0/+7
* ACPI / sysfs: Provide quirk mechanism to prevent GPE floodingLv Zheng2017-04-121-0/+10