Home
last modified time | relevance | path

Searched refs:mitigations (Results 1 – 25 of 33) sorted by relevance

12

/linux-6.15/drivers/gpu/drm/i915/
H A Di915_mitigations.c15 static unsigned long mitigations __read_mostly = ~0UL;
27 return READ_ONCE(mitigations) & BIT(CLEAR_RESIDUALS); in i915_mitigate_clear_residuals()
37 BUILD_BUG_ON(ARRAY_SIZE(names) >= BITS_PER_TYPE(mitigations)); in mitigations_set()
94 WRITE_ONCE(mitigations, new); in mitigations_set()
100 unsigned long local = READ_ONCE(mitigations); in mitigations_get()
132 module_param_cb_unsafe(mitigations, &ops, NULL, 0600);
133 MODULE_PARM_DESC(mitigations,
/linux-6.15/tools/testing/selftests/x86/bugs/
H A Dcommon.py58 def sysfs_has_either(bugs, mitigations): argument
60 for mitigation in mitigations:
65 def sysfs_has_none(bugs, mitigations): argument
66 return not sysfs_has_either(bugs, mitigations)
68 def sysfs_has_all(bugs, mitigations): argument
70 for mitigation in mitigations:
/linux-6.15/Documentation/admin-guide/hw-vuln/
H A Dindex.rst6 possible mitigations along with guidance for selecting mitigations if they
H A Dmds.rst92 mitigations are active. The relevant sysfs file is:
156 transition mitigations are sufficient and SMT is not affected.
242 The kernel command line allows to control the MDS mitigations at boot
246 full If the CPU is vulnerable, enable all available mitigations
256 off Disables MDS mitigations completely.
285 The protection depends on the state of the L1TF mitigations.
293 Default mitigations
296 The kernel default mitigations for vulnerable processors are:
H A Dcross-thread-rsb.rst12 The Spectre v2 mitigations protect the Linux kernel, as it fills the return
75 Both mitigations are required to fully address this issue.
80 Use existing Spectre v2 mitigations that will fill the RSB on context switch.
H A Dl1tf.rst108 mitigations are not enabled by default in the Linux kernel because they
111 deployment scenario. The mitigations, their protection scope and impact
124 mitigations are active. The relevant sysfs file is:
367 The kernel command line allows to control the L1TF mitigations at boot
371 full Provides all available mitigations for the L1TF
372 vulnerability. Disables SMT and enables all mitigations in
406 off Disables hypervisor mitigations and doesn't emit any
463 guaranteed to have the L1TF mitigations in place the system is fully
497 mitigations can be employed:
577 Default mitigations
[all …]
H A Dmultihit.rst71 mitigations are active. The relevant sysfs file is:
127 The kernel command line allows to control the iTLB multihit mitigations at
142 was not booted with the "mitigations=off" command line parameter.
H A Dtsx_async_abort.rst16 (bit 5) is 0 in the IA32_ARCH_CAPABILITIES MSR, the existing MDS mitigations
148 The kernel command line allows to control the TAA mitigations at boot time with
191 Although there are mitigations for all known security
265 Default mitigations
H A Dprocessor_mmio_stale_data.rst15 changes, depending on the platform and usage model. Some of these mitigations
196 mitigations at boot time with the option "mmio_stale_data=". The valid
215 which mitigations are active. The relevant sysfs file is:
244 * - 'Unknown: No mitigations'
H A Dl1d_flush.rst44 The kernel command line allows to control the L1D flush mitigations at boot
H A Drsb.rst4 RSB-related mitigations
21 mitigations. It's meant to be as concise as possible, focused only on
22 the current kernel mitigations: what are the RSB-related attack vectors
98 speculation. Collectively, we refer to these mitigations as "RAP
H A Dspectre.rst322 based mitigations (such as IBPB or STIBP on x86) within the guest.
331 vulnerable, and which mitigations are active.
581 The above mitigations are turned on by default on vulnerable CPUs.
595 In general the kernel selects reasonable default mitigations for the
598 Spectre default mitigations can be disabled or changed at the kernel
616 execute externally supplied untrusted code, then the mitigations can
641 All Spectre variant 2 mitigations can be forced on
H A Dreg-file-data-sampling.rst75 which mitigations are active. The relevant sysfs file is:
H A Dsrso.rst37 mitigations to be effective.
51 The processor is vulnerable and no mitigations have been applied.
H A Dgather_data_sampling.rst74 "mitigations=off" on the kernel command line. Not specifying either will default
/linux-6.15/tools/testing/selftests/powerpc/security/
H A Dmitigation-patching.sh42 mitigations="barrier_nospec stf_barrier count_cache_flush rfi_flush entry_flush uaccess_flush"
44 for m in $mitigations
/linux-6.15/Documentation/userspace-api/
H A Dspec_ctrl.rst10 forms. Some of these mitigations are compile-time configurable and some
13 There is also a class of mitigations which are very expensive, but they can
15 environments. The mechanism to control these mitigations is via
/linux-6.15/Documentation/tee/
H A Dop-tee.rst109 well as mitigations at the firmware and platform level.
111 There are additional attack vectors/mitigations for the kernel that should be
129 recovery mode, it should be ensured that the same mitigations are applied
/linux-6.15/drivers/tee/optee/
H A DKconfig23 mitigations at the firmware and platform level.
/linux-6.15/drivers/platform/x86/amd/
H A DKconfig23 bool "AMD Wifi RF Band mitigations (WBRF)"
/linux-6.15/Documentation/kernel-hacking/
H A Dfalse-sharing.rst135 mitigations should balance performance gains with complexity and
143 networking and memory management) and merged. Some common mitigations
180 Surely, all mitigations should be carefully verified to not cause side
/linux-6.15/Documentation/process/
H A Dembargoed-hardware-issues.rst17 issues, software mitigations can depend on microcode or firmware updates,
185 has been successfully used to develop mitigations for various hardware
258 ends. At that point, the prepared mitigations are published into the
260 mitigations are published in public and available to everyone at the same
266 mitigations. Extending embargo time artificially to meet conference talk
/linux-6.15/Documentation/PCI/
H A Dboot-interrupts.rst76 Intel. Changes made through the mitigations below have been applied to
86 The mitigations take the form of PCI quirks. The preference has been to
/linux-6.15/Documentation/gpu/
H A Ddrm-compute.rst22 Since this is undesirable, there need to be mitigations to prevent a workload
/linux-6.15/tools/objtool/Documentation/
H A Dobjtool.txt25 retpoline thunks, for Spectre v2 mitigations
32 certain CPU mitigations including Retbleed and SRSO
35 can patch them inline, depending on enabled mitigations
52 mitigations

12