Lines Matching +full:auto +full:- +full:detects
1 .. SPDX-License-Identifier: GPL-2.0
3 TAA - TSX Asynchronous Abort
11 -------------------
23 ------------
28 CVE-2019-11135 TAA TSX Asynchronous Abort (TAA) condition on some
36 -------
43 hardware transactional memory support to improve performance of multi-threaded
58 Because the buffers are potentially shared between Hyper-Threads cross
59 Hyper-Thread attacks are possible.
70 ----------------
87 -----------------------
96 .. list-table::
98 * - 'Vulnerable'
99 …- The CPU is affected by this vulnerability and the microcode and kernel mitigation are not applie…
100 * - 'Vulnerable: Clear CPU buffers attempted, no microcode'
101 - The system tries to clear the buffers but the microcode might not support the operation.
102 * - 'Mitigation: Clear CPU buffers'
103 - The microcode has been updated to clear the buffers. TSX is still enabled.
104 * - 'Mitigation: TSX disabled'
105 - TSX is disabled.
106 * - 'Not affected'
107 - The CPU is not affected by this issue.
114 If the processor is vulnerable, but the availability of the microcode-based
129 --------------------
131 The kernel detects the affected CPUs and the presence of the microcode which is
153 ---------------------------------------------
165 systems which are MDS-affected and deploy MDS mitigation,
172 CPU is not vulnerable to cross-thread TAA attacks.
200 several previous speculation-related CVEs, and so there may be
203 auto Disables TSX if X86_BUG_TAA is present, otherwise enables TSX
210 affected platforms tsx=auto is equivalent to tsx=off and the result will be:
214 buffers. Cross-thread attacks are still
216 tsx=on tsx_async_abort=full,nosmt As above, cross-thread attacks on SMT
248 --------------------------
273 -------------------
277 - Deploy TSX disable mitigation (tsx_async_abort=full tsx=off).