| /linux-6.15/drivers/gpu/drm/i915/ |
| H A D | i915_mitigations.c | 15 static unsigned long mitigations __read_mostly = ~0UL; 27 return READ_ONCE(mitigations) & BIT(CLEAR_RESIDUALS); in i915_mitigate_clear_residuals() 37 BUILD_BUG_ON(ARRAY_SIZE(names) >= BITS_PER_TYPE(mitigations)); in mitigations_set() 94 WRITE_ONCE(mitigations, new); in mitigations_set() 100 unsigned long local = READ_ONCE(mitigations); in mitigations_get() 132 module_param_cb_unsafe(mitigations, &ops, NULL, 0600); 133 MODULE_PARM_DESC(mitigations,
|
| /linux-6.15/tools/testing/selftests/x86/bugs/ |
| H A D | common.py | 58 def sysfs_has_either(bugs, mitigations): argument 60 for mitigation in mitigations: 65 def sysfs_has_none(bugs, mitigations): argument 66 return not sysfs_has_either(bugs, mitigations) 68 def sysfs_has_all(bugs, mitigations): argument 70 for mitigation in mitigations:
|
| /linux-6.15/Documentation/admin-guide/hw-vuln/ |
| H A D | index.rst | 6 possible mitigations along with guidance for selecting mitigations if they
|
| H A D | mds.rst | 92 mitigations are active. The relevant sysfs file is: 156 transition mitigations are sufficient and SMT is not affected. 242 The kernel command line allows to control the MDS mitigations at boot 246 full If the CPU is vulnerable, enable all available mitigations 256 off Disables MDS mitigations completely. 285 The protection depends on the state of the L1TF mitigations. 293 Default mitigations 296 The kernel default mitigations for vulnerable processors are:
|
| H A D | cross-thread-rsb.rst | 12 The Spectre v2 mitigations protect the Linux kernel, as it fills the return 75 Both mitigations are required to fully address this issue. 80 Use existing Spectre v2 mitigations that will fill the RSB on context switch.
|
| H A D | l1tf.rst | 108 mitigations are not enabled by default in the Linux kernel because they 111 deployment scenario. The mitigations, their protection scope and impact 124 mitigations are active. The relevant sysfs file is: 367 The kernel command line allows to control the L1TF mitigations at boot 371 full Provides all available mitigations for the L1TF 372 vulnerability. Disables SMT and enables all mitigations in 406 off Disables hypervisor mitigations and doesn't emit any 463 guaranteed to have the L1TF mitigations in place the system is fully 497 mitigations can be employed: 577 Default mitigations [all …]
|
| H A D | multihit.rst | 71 mitigations are active. The relevant sysfs file is: 127 The kernel command line allows to control the iTLB multihit mitigations at 142 was not booted with the "mitigations=off" command line parameter.
|
| H A D | tsx_async_abort.rst | 16 (bit 5) is 0 in the IA32_ARCH_CAPABILITIES MSR, the existing MDS mitigations 148 The kernel command line allows to control the TAA mitigations at boot time with 191 Although there are mitigations for all known security 265 Default mitigations
|
| H A D | processor_mmio_stale_data.rst | 15 changes, depending on the platform and usage model. Some of these mitigations 196 mitigations at boot time with the option "mmio_stale_data=". The valid 215 which mitigations are active. The relevant sysfs file is: 244 * - 'Unknown: No mitigations'
|
| H A D | l1d_flush.rst | 44 The kernel command line allows to control the L1D flush mitigations at boot
|
| H A D | rsb.rst | 4 RSB-related mitigations 21 mitigations. It's meant to be as concise as possible, focused only on 22 the current kernel mitigations: what are the RSB-related attack vectors 98 speculation. Collectively, we refer to these mitigations as "RAP
|
| H A D | spectre.rst | 322 based mitigations (such as IBPB or STIBP on x86) within the guest. 331 vulnerable, and which mitigations are active. 581 The above mitigations are turned on by default on vulnerable CPUs. 595 In general the kernel selects reasonable default mitigations for the 598 Spectre default mitigations can be disabled or changed at the kernel 616 execute externally supplied untrusted code, then the mitigations can 641 All Spectre variant 2 mitigations can be forced on
|
| H A D | reg-file-data-sampling.rst | 75 which mitigations are active. The relevant sysfs file is:
|
| H A D | srso.rst | 37 mitigations to be effective. 51 The processor is vulnerable and no mitigations have been applied.
|
| H A D | gather_data_sampling.rst | 74 "mitigations=off" on the kernel command line. Not specifying either will default
|
| /linux-6.15/tools/testing/selftests/powerpc/security/ |
| H A D | mitigation-patching.sh | 42 mitigations="barrier_nospec stf_barrier count_cache_flush rfi_flush entry_flush uaccess_flush" 44 for m in $mitigations
|
| /linux-6.15/Documentation/userspace-api/ |
| H A D | spec_ctrl.rst | 10 forms. Some of these mitigations are compile-time configurable and some 13 There is also a class of mitigations which are very expensive, but they can 15 environments. The mechanism to control these mitigations is via
|
| /linux-6.15/Documentation/tee/ |
| H A D | op-tee.rst | 109 well as mitigations at the firmware and platform level. 111 There are additional attack vectors/mitigations for the kernel that should be 129 recovery mode, it should be ensured that the same mitigations are applied
|
| /linux-6.15/drivers/tee/optee/ |
| H A D | Kconfig | 23 mitigations at the firmware and platform level.
|
| /linux-6.15/drivers/platform/x86/amd/ |
| H A D | Kconfig | 23 bool "AMD Wifi RF Band mitigations (WBRF)"
|
| /linux-6.15/Documentation/kernel-hacking/ |
| H A D | false-sharing.rst | 135 mitigations should balance performance gains with complexity and 143 networking and memory management) and merged. Some common mitigations 180 Surely, all mitigations should be carefully verified to not cause side
|
| /linux-6.15/Documentation/process/ |
| H A D | embargoed-hardware-issues.rst | 17 issues, software mitigations can depend on microcode or firmware updates, 185 has been successfully used to develop mitigations for various hardware 258 ends. At that point, the prepared mitigations are published into the 260 mitigations are published in public and available to everyone at the same 266 mitigations. Extending embargo time artificially to meet conference talk
|
| /linux-6.15/Documentation/PCI/ |
| H A D | boot-interrupts.rst | 76 Intel. Changes made through the mitigations below have been applied to 86 The mitigations take the form of PCI quirks. The preference has been to
|
| /linux-6.15/Documentation/gpu/ |
| H A D | drm-compute.rst | 22 Since this is undesirable, there need to be mitigations to prevent a workload
|
| /linux-6.15/tools/objtool/Documentation/ |
| H A D | objtool.txt | 25 retpoline thunks, for Spectre v2 mitigations 32 certain CPU mitigations including Retbleed and SRSO 35 can patch them inline, depending on enabled mitigations 52 mitigations
|