Skip to content
Snippets Groups Projects
Commit 5f550a8e authored by Jeremy Linton's avatar Jeremy Linton Committed by 谢秀奇
Browse files

Documentation: Document arm64 kpti control


mainline inclusion
from linux-next
commit de190555
category: feature
bugzilla: 11011
CVE: NA

-------------------------------------------------

For a while Arm64 has been capable of force enabling
or disabling the kpti mitigations. Lets make sure the
documentation reflects that.

Signed-off-by: default avatarJeremy Linton <jeremy.linton@arm.com>
Reviewed-by: default avatarAndre Przywara <andre.przywara@arm.com>
Signed-off-by: default avatarJonathan Corbet <corbet@lwn.net>
Signed-off-by: default avatarHanjun Guo <guohanjun@huawei.com>
Reviewed-by: default avatarYang Yingliang <yangyingliang@huawei.com>
Signed-off-by: default avatarYang Yingliang <yangyingliang@huawei.com>
parent 2d8e8d80
No related branches found
No related tags found
No related merge requests found
...@@ -1963,6 +1963,12 @@ ...@@ -1963,6 +1963,12 @@
Built with CONFIG_DEBUG_KMEMLEAK_DEFAULT_OFF=y, Built with CONFIG_DEBUG_KMEMLEAK_DEFAULT_OFF=y,
the default is off. the default is off.
kpti= [ARM64] Control page table isolation of user
and kernel address spaces.
Default: enabled on cores which need mitigation.
0: force disabled
1: force enabled
kvm.ignore_msrs=[KVM] Ignore guest accesses to unhandled MSRs. kvm.ignore_msrs=[KVM] Ignore guest accesses to unhandled MSRs.
Default is 0 (don't ignore, but inject #GP) Default is 0 (don't ignore, but inject #GP)
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment