Searched refs:SRBDS (Results 1 – 4 of 4) sorted by relevance
/Linux-v6.6/Documentation/admin-guide/hw-vuln/ |
D | special-register-buffer-data-sampling.rst | 3 SRBDS - Special Register Buffer Data Sampling 6 SRBDS is a hardware vulnerability that allows MDS 22 A processor is affected by SRBDS if its Family_Model and stepping is 50 The following CVE entry is related to this SRBDS issue: 53 CVE-2020-0543 SRBDS Special Register Buffer Data Sampling 113 The kernel command line allows control over the SRBDS mitigation at boot time 117 off This option disables SRBDS mitigation for RDRAND and RDSEED on 121 SRBDS System Information 124 SRBDS this can be accessed by the following sysfs file: 145 SRBDS Default mitigation
|
D | processor_mmio_stale_data.rst | 17 those used to mitigate Special Register Buffer Data Sampling (SRBDS).
|
/Linux-v6.6/arch/x86/kernel/cpu/ |
D | common.c | 1259 #define SRBDS BIT(0) macro 1274 VULNBL_INTEL_STEPPINGS(IVYBRIDGE, X86_STEPPING_ANY, SRBDS), 1275 VULNBL_INTEL_STEPPINGS(HASWELL, X86_STEPPING_ANY, SRBDS), 1276 VULNBL_INTEL_STEPPINGS(HASWELL_L, X86_STEPPING_ANY, SRBDS), 1277 VULNBL_INTEL_STEPPINGS(HASWELL_G, X86_STEPPING_ANY, SRBDS), 1280 VULNBL_INTEL_STEPPINGS(BROADWELL_G, X86_STEPPING_ANY, SRBDS), 1282 VULNBL_INTEL_STEPPINGS(BROADWELL, X86_STEPPING_ANY, SRBDS), 1284 VULNBL_INTEL_STEPPINGS(SKYLAKE_L, X86_STEPPING_ANY, MMIO | RETBLEED | GDS | SRBDS), 1285 VULNBL_INTEL_STEPPINGS(SKYLAKE, X86_STEPPING_ANY, MMIO | RETBLEED | GDS | SRBDS), 1286 VULNBL_INTEL_STEPPINGS(KABYLAKE_L, X86_STEPPING_ANY, MMIO | RETBLEED | GDS | SRBDS), [all …]
|
/Linux-v6.6/Documentation/admin-guide/ |
D | kernel-parameters.txt | 6086 (SRBDS) mitigation.
|