| /kernel/linux/linux-5.10/Documentation/admin-guide/hw-vuln/ |
| D | processor_mmio_stale_data.rst | 9 are not affected. System environments using virtualization where MMIO access is 61 processors affected by FBSDP, this may expose stale data from the fill buffers 67 into client core fill buffers, processors affected by MFBDS can leak data from 77 Affected Processors 79 Not all the CPUs are affected by all the variants. For instance, most 83 Below is the list of affected Intel processors [#f1]_: 108 If a CPU is in the affected processor list, but not affected by a variant, it 115 Newer processors and microcode update on existing affected processors added new 122 Bit 13 - SBDR_SSDP_NO - When set, processor is not affected by either the 125 Bit 14 - FBSDP_NO - When set, processor is not affected by the Fill Buffer [all …]
|
| D | mds.rst | 8 Affected processors 23 Whether a processor is affected or not can be read out from the MDS 26 Not all processors are affected by all variants of MDS, but the mitigation 100 * - 'Not affected' 143 The kernel detects the affected CPUs and the presence of the microcode 146 If a CPU is affected and the microcode is available, then the kernel 156 The mitigation for MDS clears the affected CPU buffers on return to user 160 is only affected by MSBDS and not any other MDS variant, because the 163 For CPUs which are only affected by MSBDS the user space, guest and idle 164 transition mitigations are sufficient and SMT is not affected. [all …]
|
| D | tsx_async_abort.rst | 10 Affected processors 19 Whether a processor is affected or not can be read out from the TAA 99 …- The CPU is affected by this vulnerability and the microcode and kernel mitigation are not applie… 106 * - 'Not affected' 107 - The CPU is not affected by this issue. 131 The kernel detects the affected CPUs and the presence of the microcode which is 132 required. If a CPU is affected and the microcode is available, then the kernel 142 Affected systems where the host has TAA microcode and TAA is mitigated by 159 off This option disables the TAA mitigation on affected platforms. 161 is affected, the system is vulnerable. [all …]
|
| D | special-register-buffer-data-sampling.rst | 16 Affected processors 19 be affected. 21 A processor is affected by SRBDS if its Family_Model and stepping is 24 latter class of processors are only affected when Intel TSX is enabled 25 by software using TSX_CTRL_MSR otherwise they are not affected. 117 affected platforms. 129 Not affected Processor not vulnerable 140 affected but with no way to know if host
|
| /kernel/linux/linux-4.19/Documentation/admin-guide/hw-vuln/ |
| D | mds.rst | 8 Affected processors 23 Whether a processor is affected or not can be read out from the MDS 26 Not all processors are affected by all variants of MDS, but the mitigation 100 * - 'Not affected' 143 The kernel detects the affected CPUs and the presence of the microcode 146 If a CPU is affected and the microcode is available, then the kernel 156 The mitigation for MDS clears the affected CPU buffers on return to user 160 is only affected by MSBDS and not any other MDS variant, because the 163 For CPUs which are only affected by MSBDS the user space, guest and idle 164 transition mitigations are sufficient and SMT is not affected. [all …]
|
| D | tsx_async_abort.rst | 10 Affected processors 19 Whether a processor is affected or not can be read out from the TAA 99 …- The CPU is affected by this vulnerability and the microcode and kernel mitigation are not applie… 106 * - 'Not affected' 107 - The CPU is not affected by this issue. 131 The kernel detects the affected CPUs and the presence of the microcode which is 132 required. If a CPU is affected and the microcode is available, then the kernel 144 Affected systems where the host has TAA microcode and TAA is mitigated by 161 off This option disables the TAA mitigation on affected platforms. 163 is affected, the system is vulnerable. [all …]
|
| D | special-register-buffer-data-sampling.rst | 16 Affected processors 19 be affected. 21 A processor is affected by SRBDS if its Family_Model and stepping is 24 latter class of processors are only affected when Intel TSX is enabled 25 by software using TSX_CTRL_MSR otherwise they are not affected. 117 affected platforms. 129 Not affected Processor not vulnerable 140 affected but with no way to know if host
|
| /kernel/linux/linux-5.10/arch/x86/kernel/ |
| D | smp.c | 67 * 5AP. symmetric IO mode (normal Linux operation) not affected. 69 * 6AP. 'noapic' mode might be affected - fixed in later steppings 92 * 6AP. not affected - worked around in hardware 93 * 7AP. not affected - worked around in hardware 95 * 9AP. only 'noapic' mode affected. Might generate spurious 98 * 10AP. not affected - worked around in hardware 102 * 12AP. not affected - worked around in hardware 103 * 13AP. not affected - worked around in hardware 105 * 15AP. not affected - worked around in hardware 106 * 16AP. not affected - worked around in hardware [all …]
|
| /kernel/linux/linux-5.10/Documentation/x86/ |
| D | mds.rst | 74 thread case (SMT off): Force the CPU to clear the affected buffers. 78 the affected CPU buffers when the VERW instruction is executed. 83 VERW can be avoided. If the CPU is not affected by L1TF then VERW needs to 116 off Mitigation is disabled. Either the CPU is not affected or 119 full Mitigation is enabled. CPU is affected and MD_CLEAR is 122 vmwerv Mitigation is enabled. CPU is affected and MD_CLEAR is not 129 If the CPU is affected and mds=off is not supplied on the kernel command 140 on affected CPUs when the mitigation is not disabled on the kernel 158 cleared on affected CPUs when SMT is active. This addresses the 165 The idle clearing is enabled on CPUs which are only affected by MSBDS [all …]
|
| /kernel/linux/linux-4.19/Documentation/x86/ |
| D | mds.rst | 74 thread case (SMT off): Force the CPU to clear the affected buffers. 78 the affected CPU buffers when the VERW instruction is executed. 83 VERW can be avoided. If the CPU is not affected by L1TF then VERW needs to 116 off Mitigation is disabled. Either the CPU is not affected or 119 full Mitigation is enabled. CPU is affected and MD_CLEAR is 122 vmwerv Mitigation is enabled. CPU is affected and MD_CLEAR is not 129 If the CPU is affected and mds=off is not supplied on the kernel command 140 on affected CPUs when the mitigation is not disabled on the kernel 158 cleared on affected CPUs when SMT is active. This addresses the 165 The idle clearing is enabled on CPUs which are only affected by MSBDS [all …]
|
| /kernel/linux/linux-4.19/arch/x86/kernel/ |
| D | smp.c | 68 * 5AP. symmetric IO mode (normal Linux operation) not affected. 70 * 6AP. 'noapic' mode might be affected - fixed in later steppings 93 * 6AP. not affected - worked around in hardware 94 * 7AP. not affected - worked around in hardware 96 * 9AP. only 'noapic' mode affected. Might generate spurious 99 * 10AP. not affected - worked around in hardware 103 * 12AP. not affected - worked around in hardware 104 * 13AP. not affected - worked around in hardware 106 * 15AP. not affected - worked around in hardware 107 * 16AP. not affected - worked around in hardware [all …]
|
| /kernel/linux/linux-5.10/security/integrity/evm/ |
| D | evm_main.c | 293 * @dentry: pointer to the affected dentry 367 * @dentry: pointer to the affected dentry 368 * @xattr_name: pointer to the affected extended attribute name 402 * @dentry: pointer to the affected dentry 403 * @xattr_name: pointer to the affected extended attribute name 430 * @dentry: pointer to the affected dentry 431 * @xattr_name: pointer to the affected extended attribute name 455 * @dentry: pointer to the affected dentry 456 * @xattr_name: pointer to the affected extended attribute name 475 * @dentry: pointer to the affected dentry [all …]
|
| /kernel/linux/linux-4.19/arch/alpha/kernel/ |
| D | bugs.c | 25 return sprintf(buf, "Not affected\n"); in cpu_show_meltdown() 34 return sprintf(buf, "Not affected\n"); in cpu_show_spectre_v1() 43 return sprintf(buf, "Not affected\n"); in cpu_show_spectre_v2()
|
| /kernel/linux/linux-5.10/arch/alpha/kernel/ |
| D | bugs.c | 25 return sprintf(buf, "Not affected\n"); in cpu_show_meltdown() 34 return sprintf(buf, "Not affected\n"); in cpu_show_spectre_v1() 43 return sprintf(buf, "Not affected\n"); in cpu_show_spectre_v2()
|
| /kernel/linux/linux-4.19/security/integrity/evm/ |
| D | evm_main.c | 295 * @dentry: pointer to the affected dentry 369 * @dentry: pointer to the affected dentry 370 * @xattr_name: pointer to the affected extended attribute name 404 * @dentry: pointer to the affected dentry 405 * @xattr_name: pointer to the affected extended attribute name 432 * @dentry: pointer to the affected dentry 433 * @xattr_name: pointer to the affected extended attribute name 457 * @dentry: pointer to the affected dentry 458 * @xattr_name: pointer to the affected extended attribute name 477 * @dentry: pointer to the affected dentry [all …]
|
| /kernel/linux/linux-5.10/drivers/base/ |
| D | cpu.c | 555 return sysfs_emit(buf, "Not affected\n"); in cpu_show_meltdown() 561 return sysfs_emit(buf, "Not affected\n"); in cpu_show_spectre_v1() 567 return sysfs_emit(buf, "Not affected\n"); in cpu_show_spectre_v2() 573 return sysfs_emit(buf, "Not affected\n"); in cpu_show_spec_store_bypass() 579 return sysfs_emit(buf, "Not affected\n"); in cpu_show_l1tf() 585 return sysfs_emit(buf, "Not affected\n"); in cpu_show_mds() 592 return sysfs_emit(buf, "Not affected\n"); in cpu_show_tsx_async_abort() 598 return sysfs_emit(buf, "Not affected\n"); in cpu_show_itlb_multihit() 604 return sysfs_emit(buf, "Not affected\n"); in cpu_show_srbds() 610 return sysfs_emit(buf, "Not affected\n"); in cpu_show_mmio_stale_data() [all …]
|
| /kernel/linux/linux-4.19/drivers/base/ |
| D | cpu.c | 522 return sprintf(buf, "Not affected\n"); in cpu_show_meltdown() 528 return sprintf(buf, "Not affected\n"); in cpu_show_spectre_v1() 534 return sprintf(buf, "Not affected\n"); in cpu_show_spectre_v2() 540 return sprintf(buf, "Not affected\n"); in cpu_show_spec_store_bypass() 546 return sprintf(buf, "Not affected\n"); in cpu_show_l1tf() 552 return sprintf(buf, "Not affected\n"); in cpu_show_mds() 559 return sprintf(buf, "Not affected\n"); in cpu_show_tsx_async_abort() 565 return sprintf(buf, "Not affected\n"); in cpu_show_itlb_multihit() 571 return sprintf(buf, "Not affected\n"); in cpu_show_srbds()
|
| /kernel/linux/linux-5.10/include/linux/ |
| D | cpu_pm.h | 28 * CPU notifications apply to a single CPU and must be called on the affected 29 * CPU. They are used to save per-cpu context for affected blocks. 32 * are used to save any global context for affected blocks, and must be called
|
| /kernel/linux/linux-4.19/include/linux/ |
| D | cpu_pm.h | 37 * CPU notifications apply to a single CPU and must be called on the affected 38 * CPU. They are used to save per-cpu context for affected blocks. 41 * are used to save any global context for affected blocks, and must be called
|
| /kernel/linux/linux-4.19/arch/arm64/ |
| D | Kconfig | 330 the kernel if an affected CPU is detected. 351 the kernel if an affected CPU is detected. 373 only patch the kernel if an affected CPU is detected. 394 the kernel if an affected CPU is detected. 405 Affected Cortex-A57 parts might deadlock when exclusive load/store 412 the kernel if an affected CPU is detected. 424 Affected Cortex-A57 parts might report a Stage 2 translation 433 the kernel if an affected CPU is detected. 445 When running a compat (AArch32) userspace on an affected Cortex-A53 454 the kernel if an affected CPU is detected. [all …]
|
| /kernel/linux/linux-5.10/arch/arm64/ |
| D | Kconfig | 375 the kernel if an affected CPU is detected. 397 the kernel if an affected CPU is detected. 420 only patch the kernel if an affected CPU is detected. 442 the kernel if an affected CPU is detected. 453 Affected Cortex-A57 parts might deadlock when exclusive load/store 460 the kernel if an affected CPU is detected. 472 Affected Cortex-A57 parts might report a Stage 2 translation 481 the kernel if an affected CPU is detected. 493 When running a compat (AArch32) userspace on an affected Cortex-A53 502 the kernel if an affected CPU is detected. [all …]
|
| /kernel/linux/linux-5.10/Documentation/PCI/ |
| D | pci-error-recovery.rst | 18 pSeries boxes. A typical action taken is to disconnect the affected device, 22 offered, so that the affected PCI device(s) are reset and put back 24 between the affected device drivers and the PCI controller chip. 31 is reported as soon as possible to all affected device drivers, 128 every driver affected by the error. 173 thus, if one device sleeps/schedules, all devices are affected. 190 DMA), and then calls the mmio_enabled() callback on all affected 337 The platform will call the resume() callback on all affected device
|
| /kernel/linux/linux-4.19/Documentation/PCI/ |
| D | pci-error-recovery.txt | 17 pSeries boxes. A typical action taken is to disconnect the affected device, 21 offered, so that the affected PCI device(s) are reset and put back 23 between the affected device drivers and the PCI controller chip. 30 is reported as soon as possible to all affected device drivers, 123 every driver affected by the error. 165 >>> thus, if one device sleeps/schedules, all devices are affected. 182 DMA), and then calls the mmio_enabled() callback on all affected 319 The platform will call the resume() callback on all affected device
|
| /kernel/linux/linux-5.10/arch/x86/include/asm/ |
| D | cpufeatures.h | 418 #define X86_BUG_AMD_E400 X86_BUG(13) /* CPU is among the affected by Erratum 400 */ 419 #define X86_BUG_CPU_MELTDOWN X86_BUG(14) /* CPU is affected by meltdown attack and needs kernel pa… 420 #define X86_BUG_SPECTRE_V1 X86_BUG(15) /* CPU is affected by Spectre variant 1 attack with conditi… 421 #define X86_BUG_SPECTRE_V2 X86_BUG(16) /* CPU is affected by Spectre variant 2 attack with indirec… 422 #define X86_BUG_SPEC_STORE_BYPASS X86_BUG(17) /* CPU is affected by speculative store bypass attack… 423 #define X86_BUG_L1TF X86_BUG(18) /* CPU is affected by L1 Terminal Fault */ 424 #define X86_BUG_MDS X86_BUG(19) /* CPU is affected by Microarchitectural data sampling */ 425 #define X86_BUG_MSBDS_ONLY X86_BUG(20) /* CPU is only affected by the MSDBS variant of BUG_MDS */ 426 #define X86_BUG_SWAPGS X86_BUG(21) /* CPU is affected by speculation through SWAPGS */ 427 #define X86_BUG_TAA X86_BUG(22) /* CPU is affected by TSX Async Abort(TAA) */ [all …]
|
| /kernel/linux/linux-5.10/tools/arch/x86/include/asm/ |
| D | cpufeatures.h | 416 #define X86_BUG_AMD_E400 X86_BUG(13) /* CPU is among the affected by Erratum 400 */ 417 #define X86_BUG_CPU_MELTDOWN X86_BUG(14) /* CPU is affected by meltdown attack and needs kernel pa… 418 #define X86_BUG_SPECTRE_V1 X86_BUG(15) /* CPU is affected by Spectre variant 1 attack with conditi… 419 #define X86_BUG_SPECTRE_V2 X86_BUG(16) /* CPU is affected by Spectre variant 2 attack with indirec… 420 #define X86_BUG_SPEC_STORE_BYPASS X86_BUG(17) /* CPU is affected by speculative store bypass attack… 421 #define X86_BUG_L1TF X86_BUG(18) /* CPU is affected by L1 Terminal Fault */ 422 #define X86_BUG_MDS X86_BUG(19) /* CPU is affected by Microarchitectural data sampling */ 423 #define X86_BUG_MSBDS_ONLY X86_BUG(20) /* CPU is only affected by the MSDBS variant of BUG_MDS */ 424 #define X86_BUG_SWAPGS X86_BUG(21) /* CPU is affected by speculation through SWAPGS */ 425 #define X86_BUG_TAA X86_BUG(22) /* CPU is affected by TSX Async Abort(TAA) */ [all …]
|