| .. | .. |
|---|
| 894 | 894 | |
|---|
| 895 | 895 | debugpat [X86] Enable PAT debugging |
|---|
| 896 | 896 | |
|---|
| 897 | | - decnet.addr= [HW,NET] |
|---|
| 898 | | - Format: <area>[,<node>] |
|---|
| 899 | | - See also Documentation/networking/decnet.rst. |
|---|
| 900 | | - |
|---|
| 901 | 897 | default_hugepagesz= |
|---|
| 902 | 898 | [HW] The size of the default HugeTLB page. This is |
|---|
| 903 | 899 | the size represented by the legacy /proc/ hugepages |
|---|
| .. | .. |
|---|
| 1487 | 1483 | gart_fix_e820= [X86-64] disable the fix e820 for K8 GART |
|---|
| 1488 | 1484 | Format: off | on |
|---|
| 1489 | 1485 | default: on |
|---|
| 1486 | + |
|---|
| 1487 | + gather_data_sampling= |
|---|
| 1488 | + [X86,INTEL] Control the Gather Data Sampling (GDS) |
|---|
| 1489 | + mitigation. |
|---|
| 1490 | + |
|---|
| 1491 | + Gather Data Sampling is a hardware vulnerability which |
|---|
| 1492 | + allows unprivileged speculative access to data which was |
|---|
| 1493 | + previously stored in vector registers. |
|---|
| 1494 | + |
|---|
| 1495 | + This issue is mitigated by default in updated microcode. |
|---|
| 1496 | + The mitigation may have a performance impact but can be |
|---|
| 1497 | + disabled. On systems without the microcode mitigation |
|---|
| 1498 | + disabling AVX serves as a mitigation. |
|---|
| 1499 | + |
|---|
| 1500 | + force: Disable AVX to mitigate systems without |
|---|
| 1501 | + microcode mitigation. No effect if the microcode |
|---|
| 1502 | + mitigation is present. Known to cause crashes in |
|---|
| 1503 | + userspace with buggy AVX enumeration. |
|---|
| 1504 | + |
|---|
| 1505 | + off: Disable GDS mitigation. |
|---|
| 1490 | 1506 | |
|---|
| 1491 | 1507 | gcov_persist= [GCOV] When non-zero (default), profiling data for |
|---|
| 1492 | 1508 | kernel modules is saved and remains accessible via |
|---|
| .. | .. |
|---|
| 2144 | 2160 | |
|---|
| 2145 | 2161 | ivrs_ioapic [HW,X86-64] |
|---|
| 2146 | 2162 | Provide an override to the IOAPIC-ID<->DEVICE-ID |
|---|
| 2147 | | - mapping provided in the IVRS ACPI table. For |
|---|
| 2148 | | - example, to map IOAPIC-ID decimal 10 to |
|---|
| 2149 | | - PCI device 00:14.0 write the parameter as: |
|---|
| 2163 | + mapping provided in the IVRS ACPI table. |
|---|
| 2164 | + By default, PCI segment is 0, and can be omitted. |
|---|
| 2165 | + |
|---|
| 2166 | + For example, to map IOAPIC-ID decimal 10 to |
|---|
| 2167 | + PCI segment 0x1 and PCI device 00:14.0, |
|---|
| 2168 | + write the parameter as: |
|---|
| 2169 | + ivrs_ioapic=10@0001:00:14.0 |
|---|
| 2170 | + |
|---|
| 2171 | + Deprecated formats: |
|---|
| 2172 | + * To map IOAPIC-ID decimal 10 to PCI device 00:14.0 |
|---|
| 2173 | + write the parameter as: |
|---|
| 2150 | 2174 | ivrs_ioapic[10]=00:14.0 |
|---|
| 2175 | + * To map IOAPIC-ID decimal 10 to PCI segment 0x1 and |
|---|
| 2176 | + PCI device 00:14.0 write the parameter as: |
|---|
| 2177 | + ivrs_ioapic[10]=0001:00:14.0 |
|---|
| 2151 | 2178 | |
|---|
| 2152 | 2179 | ivrs_hpet [HW,X86-64] |
|---|
| 2153 | 2180 | Provide an override to the HPET-ID<->DEVICE-ID |
|---|
| 2154 | | - mapping provided in the IVRS ACPI table. For |
|---|
| 2155 | | - example, to map HPET-ID decimal 0 to |
|---|
| 2156 | | - PCI device 00:14.0 write the parameter as: |
|---|
| 2181 | + mapping provided in the IVRS ACPI table. |
|---|
| 2182 | + By default, PCI segment is 0, and can be omitted. |
|---|
| 2183 | + |
|---|
| 2184 | + For example, to map HPET-ID decimal 10 to |
|---|
| 2185 | + PCI segment 0x1 and PCI device 00:14.0, |
|---|
| 2186 | + write the parameter as: |
|---|
| 2187 | + ivrs_hpet=10@0001:00:14.0 |
|---|
| 2188 | + |
|---|
| 2189 | + Deprecated formats: |
|---|
| 2190 | + * To map HPET-ID decimal 0 to PCI device 00:14.0 |
|---|
| 2191 | + write the parameter as: |
|---|
| 2157 | 2192 | ivrs_hpet[0]=00:14.0 |
|---|
| 2193 | + * To map HPET-ID decimal 10 to PCI segment 0x1 and |
|---|
| 2194 | + PCI device 00:14.0 write the parameter as: |
|---|
| 2195 | + ivrs_ioapic[10]=0001:00:14.0 |
|---|
| 2158 | 2196 | |
|---|
| 2159 | 2197 | ivrs_acpihid [HW,X86-64] |
|---|
| 2160 | 2198 | Provide an override to the ACPI-HID:UID<->DEVICE-ID |
|---|
| 2161 | | - mapping provided in the IVRS ACPI table. For |
|---|
| 2162 | | - example, to map UART-HID:UID AMD0020:0 to |
|---|
| 2163 | | - PCI device 00:14.5 write the parameter as: |
|---|
| 2199 | + mapping provided in the IVRS ACPI table. |
|---|
| 2200 | + By default, PCI segment is 0, and can be omitted. |
|---|
| 2201 | + |
|---|
| 2202 | + For example, to map UART-HID:UID AMD0020:0 to |
|---|
| 2203 | + PCI segment 0x1 and PCI device ID 00:14.5, |
|---|
| 2204 | + write the parameter as: |
|---|
| 2205 | + ivrs_acpihid=AMD0020:0@0001:00:14.5 |
|---|
| 2206 | + |
|---|
| 2207 | + Deprecated formats: |
|---|
| 2208 | + * To map UART-HID:UID AMD0020:0 to PCI segment is 0, |
|---|
| 2209 | + PCI device ID 00:14.5, write the parameter as: |
|---|
| 2164 | 2210 | ivrs_acpihid[00:14.5]=AMD0020:0 |
|---|
| 2211 | + * To map UART-HID:UID AMD0020:0 to PCI segment 0x1 and |
|---|
| 2212 | + PCI device ID 00:14.5, write the parameter as: |
|---|
| 2213 | + ivrs_acpihid[0001:00:14.5]=AMD0020:0 |
|---|
| 2165 | 2214 | |
|---|
| 2166 | 2215 | js= [HW,JOY] Analog joystick |
|---|
| 2167 | 2216 | See Documentation/input/joydev/joystick.rst. |
|---|
| .. | .. |
|---|
| 2310 | 2359 | |
|---|
| 2311 | 2360 | kvm-arm.mode= |
|---|
| 2312 | 2361 | [KVM,ARM] Select one of KVM/arm64's modes of operation. |
|---|
| 2362 | + |
|---|
| 2363 | + none: Forcefully disable KVM. |
|---|
| 2313 | 2364 | |
|---|
| 2314 | 2365 | nvhe: Standard nVHE-based mode, without support for |
|---|
| 2315 | 2366 | protected guests. |
|---|
| .. | .. |
|---|
| 2918 | 2969 | Disable all optional CPU mitigations. This |
|---|
| 2919 | 2970 | improves system performance, but it may also |
|---|
| 2920 | 2971 | expose users to several CPU vulnerabilities. |
|---|
| 2921 | | - Equivalent to: nopti [X86,PPC] |
|---|
| 2972 | + Equivalent to: gather_data_sampling=off [X86] |
|---|
| 2922 | 2973 | kpti=0 [ARM64] |
|---|
| 2923 | | - nospectre_v1 [X86,PPC] |
|---|
| 2924 | | - nobp=0 [S390] |
|---|
| 2925 | | - nospectre_v2 [X86,PPC,S390,ARM64] |
|---|
| 2926 | | - spectre_v2_user=off [X86] |
|---|
| 2927 | | - spec_store_bypass_disable=off [X86,PPC] |
|---|
| 2928 | | - ssbd=force-off [ARM64] |
|---|
| 2974 | + kvm.nx_huge_pages=off [X86] |
|---|
| 2929 | 2975 | l1tf=off [X86] |
|---|
| 2930 | 2976 | mds=off [X86] |
|---|
| 2931 | | - tsx_async_abort=off [X86] |
|---|
| 2932 | | - kvm.nx_huge_pages=off [X86] |
|---|
| 2977 | + mmio_stale_data=off [X86] |
|---|
| 2933 | 2978 | no_entry_flush [PPC] |
|---|
| 2934 | 2979 | no_uaccess_flush [PPC] |
|---|
| 2935 | | - mmio_stale_data=off [X86] |
|---|
| 2980 | + nobp=0 [S390] |
|---|
| 2981 | + nopti [X86,PPC] |
|---|
| 2982 | + nospectre_v1 [X86,PPC] |
|---|
| 2983 | + nospectre_v2 [X86,PPC,S390,ARM64] |
|---|
| 2936 | 2984 | retbleed=off [X86] |
|---|
| 2985 | + spec_store_bypass_disable=off [X86,PPC] |
|---|
| 2986 | + spectre_v2_user=off [X86] |
|---|
| 2987 | + ssbd=force-off [ARM64] |
|---|
| 2988 | + tsx_async_abort=off [X86] |
|---|
| 2937 | 2989 | |
|---|
| 2938 | 2990 | Exceptions: |
|---|
| 2939 | 2991 | This does not have any effect on |
|---|
| .. | .. |
|---|
| 5191 | 5243 | Not specifying this option is equivalent to |
|---|
| 5192 | 5244 | spectre_v2_user=auto. |
|---|
| 5193 | 5245 | |
|---|
| 5246 | + spec_rstack_overflow= |
|---|
| 5247 | + [X86] Control RAS overflow mitigation on AMD Zen CPUs |
|---|
| 5248 | + |
|---|
| 5249 | + off - Disable mitigation |
|---|
| 5250 | + microcode - Enable microcode mitigation only |
|---|
| 5251 | + safe-ret - Enable sw-only safe RET mitigation (default) |
|---|
| 5252 | + ibpb - Enable mitigation by issuing IBPB on |
|---|
| 5253 | + kernel entry |
|---|
| 5254 | + ibpb-vmexit - Issue IBPB only on VMEXIT |
|---|
| 5255 | + (cloud-specific mitigation) |
|---|
| 5256 | + |
|---|
| 5194 | 5257 | spec_store_bypass_disable= |
|---|
| 5195 | 5258 | [HW] Control Speculative Store Bypass (SSB) Disable mitigation |
|---|
| 5196 | 5259 | (Speculative Store Bypass vulnerability) |
|---|