Lines Matching refs:mitigation
99 …- The CPU is affected by this vulnerability and the microcode and kernel mitigation are not applie…
111 Best effort mitigation mode
115 mitigation mechanism is not advertised via CPUID the kernel selects a best
116 effort mitigation mode. This mode invokes the mitigation instructions
133 enables the mitigation by default.
136 The mitigation can be controlled at boot time via a kernel command line option.
139 Virtualization mitigation
159 off This option disables the TAA mitigation on affected platforms.
163 full TAA mitigation is enabled. If TSX is enabled, on an affected
165 systems which are MDS-affected and deploy MDS mitigation,
171 mitigation. When TSX is disabled, SMT is not disabled because
178 effect as the same mitigation is used for both vulnerabilities.
231 For the affected platforms below table indicates the mitigation status for the
254 untrusted code which is supplied externally, then the mitigation can be
267 explicitly enable the mitigation.
277 - Deploy TSX disable mitigation (tsx_async_abort=full tsx=off).