Home
last modified time | relevance | path

Searched refs:MDS (Results 1 – 21 of 21) sorted by relevance

/Linux-v5.15/arch/powerpc/platforms/83xx/
DKconfig29 bool "Freescale MPC832x MDS"
33 This option enables support for the MPC832x MDS evaluation board.
43 bool "Freescale MPC834x MDS"
47 This option enables support for the MPC 834x MDS evaluation board.
49 Be aware that PCI buses can only function when MDS board is plugged
65 bool "Freescale MPC836x MDS"
68 This option enables support for the MPC836x MDS Processor Board.
80 bool "Freescale MPC837x MDS"
84 This option enables support for the MPC837x MDS Processor Board.
/Linux-v5.15/Documentation/admin-guide/hw-vuln/
Dmds.rst1 MDS - Microarchitectural Data Sampling
23 Whether a processor is affected or not can be read out from the MDS
26 Not all processors are affected by all variants of MDS, but the mitigation
33 The following CVE entries are related to the MDS vulnerability:
60 Deeper technical information is available in the MDS specific x86
67 Attacks against the MDS vulnerabilities can be mounted from malicious non
71 Contrary to other speculation based vulnerabilities the MDS vulnerability
87 MDS system information
90 The Linux kernel provides a sysfs interface to enumerate the current MDS
156 The mitigation for MDS clears the affected CPU buffers on return to user
[all …]
Dtsx_async_abort.rst16 (bit 5) is 0 in the IA32_ARCH_CAPABILITIES MSR, the existing MDS mitigations
75 As for MDS, the attacker has no control over the memory addresses that can
165 systems which are MDS-affected and deploy MDS mitigation,
176 processors that are affected by both TAA and MDS, specifying just
191 not vulnerable to MDS, i.e., have MSR_IA32_ARCH_CAPABILITIES.MDS_NO=1
239 0 1 0 MDS and TAA mitigated via VERW
240 1 1 0 MDS fixed, TAA vulnerable if TSX enabled
243 1 X 1 MDS fixed, TAA can be mitigated by
Dspecial-register-buffer-data-sampling.rst6 SRBDS is a hardware vulnerability that allows MDS
15 to MDS attacks.
59 executed on another core or sibling thread using MDS techniques.
Dcore-scheduling.rst17 Threads of the same core. MDS and L1TF are examples of such attacks. The only
182 1. For MDS
184 Core scheduling cannot protect against MDS attacks between the siblings
198 For both MDS and L1TF, if the guest vCPU is configured to not trust each
/Linux-v5.15/Documentation/x86/
Dtsx_async_abort.rst12 Intel processors similar to Microachitectural Data Sampling (MDS). In this
17 the same uarch data structures as in MDS, with same scope of exposure i.e.
29 b) Clear CPU buffers - similar to MDS, clearing the CPU buffers mitigates this
69 …0 0 0 HW default Yes Same as MDS Same as MDS
84 … 0 0 0 HW default Yes Same as MDS Same as MDS
87 … 0 1 1 Enabled Yes None Same as MDS
99 …0 0 0 HW default Yes Same as MDS Same as MDS
Dmds.rst1 Microarchitectural Data Sampling (MDS) mitigation
9 Microarchitectural Data Sampling (MDS) is a family of side channel attacks
52 needed for exploiting MDS requires:
166 and not by any other MDS variant. The other MDS variants cannot be
/Linux-v5.15/Documentation/admin-guide/nfs/
Dpnfs-scsi-server.rst7 With pNFS SCSI layouts, the NFS server acts as Metadata Server (MDS) for pNFS,
15 addition to the MDS. As of now the file system needs to sit directly on the
16 exported LUN, striping or concatenation of LUNs on the MDS and clients
Dpnfs-block-server.rst6 case the NFS server acts as Metadata Server (MDS) for pNFS, which in addition
14 to the clients in addition to the MDS. As of now the file system needs to
16 volumes on the MDS and clients is not supported yet.
/Linux-v5.15/arch/powerpc/platforms/85xx/
DKconfig74 bool "Freescale MPC85xx MDS"
80 This option enables support for the MPC85xx MDS board
/Linux-v5.15/arch/powerpc/boot/dts/fsl/
Dp1021mds.dts3 * P1021 MDS Device Tree Source
Dmpc8568mds.dts3 * MPC8568E MDS Device Tree Source
Dmpc8569mds.dts3 * MPC8569E MDS Device Tree Source
/Linux-v5.15/arch/powerpc/boot/dts/
Dmpc832x_mds.dts8 * To enable external serial I/O on a Freescale MPC 8323 SYS/MDS board, do
Dmpc834x_mds.dts3 * MPC8349E MDS Device Tree Source
Dmpc8377_mds.dts3 * MPC8377E MDS Device Tree Source
Dmpc8378_mds.dts3 * MPC8378E MDS Device Tree Source
Dmpc8379_mds.dts3 * MPC8379E MDS Device Tree Source
/Linux-v5.15/Documentation/filesystems/
Dceph.rst175 After reconnect, file locks become stale because the MDS loses track
/Linux-v5.15/Documentation/admin-guide/
Dkernel-parameters.txt2775 Sampling (MDS) vulnerability.
2786 This parameter controls the MDS mitigation. The
2789 full - Enable MDS mitigation on vulnerable CPUs
2790 full,nosmt - Enable MDS mitigation and disable
2792 off - Unconditionally disable MDS mitigation
5413 Certain CPUs are vulnerable to an MDS-like
5815 not vulnerable to MDS, i.e., have
5832 Similar to Micro-architectural Data Sampling (MDS)
5856 On MDS-affected machines, tsx_async_abort=off can be
5857 prevented by an active MDS mitigation as both vulnerabilities
[all …]
/Linux-v5.15/arch/powerpc/xmon/
Dppc-opc.c2487 #define MDS(op, xop, rc) (OP (op) | ((((unsigned long)(xop)) & 0xf) << 1) | ((rc) & 1)) macro
2488 #define MDS_MASK MDS (0x3f, 0xf, 1)
4648 {"rotld", MDS(30,8,0), MDSMB_MASK, PPC64, PPCVLE, {RA, RS, RB}},
4649 {"rldcl", MDS(30,8,0), MDS_MASK, PPC64, PPCVLE, {RA, RS, RB, MB6}},
4650 {"rotld.", MDS(30,8,1), MDSMB_MASK, PPC64, PPCVLE, {RA, RS, RB}},
4651 {"rldcl.", MDS(30,8,1), MDS_MASK, PPC64, PPCVLE, {RA, RS, RB, MB6}},
4653 {"rldcr", MDS(30,9,0), MDS_MASK, PPC64, PPCVLE, {RA, RS, RB, ME6}},
4654 {"rldcr.", MDS(30,9,1), MDS_MASK, PPC64, PPCVLE, {RA, RS, RB, ME6}},