Searched refs:SRBDS (Results 1 – 3 of 3) sorted by relevance
/Linux-v5.10/Documentation/admin-guide/hw-vuln/ |
D | special-register-buffer-data-sampling.rst | 3 SRBDS - Special Register Buffer Data Sampling 6 SRBDS is a hardware vulnerability that allows MDS :doc:`mds` techniques to 21 A processor is affected by SRBDS if its Family_Model and stepping is 49 The following CVE entry is related to this SRBDS issue: 52 CVE-2020-0543 SRBDS Special Register Buffer Data Sampling 112 The kernel command line allows control over the SRBDS mitigation at boot time 116 off This option disables SRBDS mitigation for RDRAND and RDSEED on 120 SRBDS System Information 123 SRBDS this can be accessed by the following sysfs file: 144 SRBDS Default mitigation
|
/Linux-v5.10/arch/x86/kernel/cpu/ |
D | common.c | 1099 #define SRBDS BIT(0) macro 1102 VULNBL_INTEL_STEPPINGS(IVYBRIDGE, X86_STEPPING_ANY, SRBDS), 1103 VULNBL_INTEL_STEPPINGS(HASWELL, X86_STEPPING_ANY, SRBDS), 1104 VULNBL_INTEL_STEPPINGS(HASWELL_L, X86_STEPPING_ANY, SRBDS), 1105 VULNBL_INTEL_STEPPINGS(HASWELL_G, X86_STEPPING_ANY, SRBDS), 1106 VULNBL_INTEL_STEPPINGS(BROADWELL_G, X86_STEPPING_ANY, SRBDS), 1107 VULNBL_INTEL_STEPPINGS(BROADWELL, X86_STEPPING_ANY, SRBDS), 1108 VULNBL_INTEL_STEPPINGS(SKYLAKE_L, X86_STEPPING_ANY, SRBDS), 1109 VULNBL_INTEL_STEPPINGS(SKYLAKE, X86_STEPPING_ANY, SRBDS), 1110 VULNBL_INTEL_STEPPINGS(KABYLAKE_L, X86_STEPPINGS(0x0, 0xC), SRBDS), [all …]
|
/Linux-v5.10/Documentation/admin-guide/ |
D | kernel-parameters.txt | 5077 (SRBDS) mitigation.
|