Lines Matching refs:mitigation
2441 Default: enabled on cores which need mitigation.
2587 never: Disables the mitigation
2596 Control mitigation for L1D based snooping vulnerability.
2607 This parameter controls the mitigation. The
2610 on - enable the interface for the mitigation
2612 l1tf= [X86] Control mitigation of the L1TF vulnerability on
2639 hypervisor mitigation, i.e. conditional
2652 hypervisor mitigation.
2968 Control mitigation for the Micro-architectural Data
2980 This parameter controls the MDS mitigation. The
2983 full - Enable MDS mitigation on vulnerable CPUs
2984 full,nosmt - Enable MDS mitigation and disable
2986 off - Unconditionally disable MDS mitigation
2989 an active TAA mitigation as both vulnerabilities are
2991 this mitigation, you need to specify tsx_async_abort=off
3265 [X86,INTEL] Control mitigation for the Processor
3272 Therefore, similar to MDS and TAA, the mitigation
3275 This parameter controls the mitigation. The
3278 full - Enable mitigation on vulnerable CPUs
3280 full,nosmt - Enable mitigation and disable SMT on
3283 off - Unconditionally disable mitigation
3287 MDS or TAA mitigation as these vulnerabilities are
3289 disable this mitigation, you need to specify
5294 retbleed= [X86] Control mitigation of RETBleed (Arbitrary
5304 off - no mitigation
5306 auto,nosmt - automatically select a mitigation,
5308 the full mitigation (only on Zen1
5326 Selecting 'auto' will choose a mitigation method at run
5671 spectre_v2= [X86] Control mitigation of Spectre variant 2
5684 mitigation method at run time according to the
5689 Selecting 'on' will also enable the mitigation
5710 [X86] Control mitigation of Spectre variant 2
5721 but mitigation can be enabled via prctl
5722 per thread. The mitigation control state
5733 threads will enable the mitigation unless
5742 auto - Kernel selects the mitigation depending on
5745 Default mitigation: "prctl"
5751 [HW] Control Speculative Store Bypass (SSB) Disable mitigation
5777 picks the most appropriate mitigation. If the
5779 CPU is vulnerable the default mitigation is
5849 (SRBDS) mitigation.
5861 The microcode mitigation can be disabled with
5864 off: Disable mitigation and remove
5939 firmware based mitigation, this parameter
5940 indicates how the mitigation should be used:
5942 force-on: Unconditionally enable mitigation for
5944 force-off: Unconditionally disable mitigation for
5946 kernel: Always enable mitigation in the
6358 tsx_async_abort= [X86,INTEL] Control mitigation for the TSX Async
6373 This parameter controls the TAA mitigation. The
6376 full - Enable TAA mitigation on vulnerable CPUs
6379 full,nosmt - Enable TAA mitigation and disable SMT on
6383 off - Unconditionally disable TAA mitigation
6386 prevented by an active MDS mitigation as both vulnerabilities
6388 this mitigation, you need to specify mds=off too.
6392 and deploy MDS mitigation, TAA mitigation is not
6394 mitigation.