diff options
author | Balbir Singh <sblbir@amazon.com> | 2021-01-08 15:10:56 +0300 |
---|---|---|
committer | Thomas Gleixner <tglx@linutronix.de> | 2021-07-28 12:42:25 +0300 |
commit | b7fe54f6c2d437082dcbecfbd832f38edd9caaf4 (patch) | |
tree | f0483d05dd7cc20f613c45568b74a4399073863d /Documentation/admin-guide/kernel-parameters.txt | |
parent | e893bb1bb4d2eb635eba61e5d9c5135d96855773 (diff) | |
download | linux-b7fe54f6c2d437082dcbecfbd832f38edd9caaf4.tar.xz |
Documentation: Add L1D flushing Documentation
Add documentation of l1d flushing, explain the need for the
feature and how it can be used.
Signed-off-by: Balbir Singh <sblbir@amazon.com>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Link: https://lore.kernel.org/r/20210108121056.21940-6-sblbir@amazon.com
Diffstat (limited to 'Documentation/admin-guide/kernel-parameters.txt')
-rw-r--r-- | Documentation/admin-guide/kernel-parameters.txt | 17 |
1 files changed, 17 insertions, 0 deletions
diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt index bdb22006f713..b105db25f7a5 100644 --- a/Documentation/admin-guide/kernel-parameters.txt +++ b/Documentation/admin-guide/kernel-parameters.txt @@ -2421,6 +2421,23 @@ feature (tagged TLBs) on capable Intel chips. Default is 1 (enabled) + l1d_flush= [X86,INTEL] + Control mitigation for L1D based snooping vulnerability. + + Certain CPUs are vulnerable to an exploit against CPU + internal buffers which can forward information to a + disclosure gadget under certain conditions. + + In vulnerable processors, the speculatively + forwarded data can be used in a cache side channel + attack, to access data to which the attacker does + not have direct access. + + This parameter controls the mitigation. The + options are: + + on - enable the interface for the mitigation + l1tf= [X86] Control mitigation of the L1TF vulnerability on affected CPUs |