kernel-parameters.txt (ca31fef11dc83e672415d5925a134749761329bd) kernel-parameters.txt (b7fe54f6c2d437082dcbecfbd832f38edd9caaf4)
1 acpi= [HW,ACPI,X86,ARM64]
2 Advanced Configuration and Power Interface
3 Format: { force | on | off | strict | noirq | rsdt |
4 copy_dsdt }
5 force -- enable ACPI if default was off
6 on -- enable ACPI but allow fallback to DT [arm64]
7 off -- disable ACPI if default was on
8 noirq -- do not use ACPI for IRQ routing

--- 2407 unchanged lines hidden (view full) ---

2416 never: Disables the mitigation
2417
2418 Default is cond (do L1 cache flush in specific instances)
2419
2420 kvm-intel.vpid= [KVM,Intel] Disable Virtual Processor Identification
2421 feature (tagged TLBs) on capable Intel chips.
2422 Default is 1 (enabled)
2423
1 acpi= [HW,ACPI,X86,ARM64]
2 Advanced Configuration and Power Interface
3 Format: { force | on | off | strict | noirq | rsdt |
4 copy_dsdt }
5 force -- enable ACPI if default was off
6 on -- enable ACPI but allow fallback to DT [arm64]
7 off -- disable ACPI if default was on
8 noirq -- do not use ACPI for IRQ routing

--- 2407 unchanged lines hidden (view full) ---

2416 never: Disables the mitigation
2417
2418 Default is cond (do L1 cache flush in specific instances)
2419
2420 kvm-intel.vpid= [KVM,Intel] Disable Virtual Processor Identification
2421 feature (tagged TLBs) on capable Intel chips.
2422 Default is 1 (enabled)
2423
2424 l1d_flush= [X86,INTEL]
2425 Control mitigation for L1D based snooping vulnerability.
2426
2427 Certain CPUs are vulnerable to an exploit against CPU
2428 internal buffers which can forward information to a
2429 disclosure gadget under certain conditions.
2430
2431 In vulnerable processors, the speculatively
2432 forwarded data can be used in a cache side channel
2433 attack, to access data to which the attacker does
2434 not have direct access.
2435
2436 This parameter controls the mitigation. The
2437 options are:
2438
2439 on - enable the interface for the mitigation
2440
2424 l1tf= [X86] Control mitigation of the L1TF vulnerability on
2425 affected CPUs
2426
2427 The kernel PTE inversion protection is unconditionally
2428 enabled and cannot be disabled.
2429
2430 full
2431 Provides all available mitigations for the

--- 3943 unchanged lines hidden ---
2441 l1tf= [X86] Control mitigation of the L1TF vulnerability on
2442 affected CPUs
2443
2444 The kernel PTE inversion protection is unconditionally
2445 enabled and cannot be disabled.
2446
2447 full
2448 Provides all available mitigations for the

--- 3943 unchanged lines hidden ---