Home
last modified time | relevance | path

Searched refs:SRBDS (Results 1 – 4 of 4) sorted by relevance

/kernel/linux/linux-5.10/Documentation/admin-guide/hw-vuln/
Dspecial-register-buffer-data-sampling.rst3 SRBDS - Special Register Buffer Data Sampling
6 SRBDS is a hardware vulnerability that allows MDS :doc:`mds` techniques to
21 A processor is affected by SRBDS if its Family_Model and stepping is
49 The following CVE entry is related to this SRBDS issue:
52 CVE-2020-0543 SRBDS Special Register Buffer Data Sampling
112 The kernel command line allows control over the SRBDS mitigation at boot time
116 off This option disables SRBDS mitigation for RDRAND and RDSEED on
120 SRBDS System Information
123 SRBDS this can be accessed by the following sysfs file:
144 SRBDS Default mitigation
Dprocessor_mmio_stale_data.rst17 those used to mitigate Special Register Buffer Data Sampling (SRBDS).
/kernel/linux/linux-5.10/arch/x86/kernel/cpu/
Dcommon.c1118 #define SRBDS BIT(0) macro
1127 VULNBL_INTEL_STEPPINGS(IVYBRIDGE, X86_STEPPING_ANY, SRBDS),
1128 VULNBL_INTEL_STEPPINGS(HASWELL, X86_STEPPING_ANY, SRBDS),
1129 VULNBL_INTEL_STEPPINGS(HASWELL_L, X86_STEPPING_ANY, SRBDS),
1130 VULNBL_INTEL_STEPPINGS(HASWELL_G, X86_STEPPING_ANY, SRBDS),
1133 VULNBL_INTEL_STEPPINGS(BROADWELL_G, X86_STEPPING_ANY, SRBDS),
1135 VULNBL_INTEL_STEPPINGS(BROADWELL, X86_STEPPING_ANY, SRBDS),
1136 VULNBL_INTEL_STEPPINGS(SKYLAKE_L, X86_STEPPING_ANY, SRBDS | MMIO | RETBLEED),
1138 VULNBL_INTEL_STEPPINGS(SKYLAKE, X86_STEPPING_ANY, SRBDS | MMIO | RETBLEED),
1139 VULNBL_INTEL_STEPPINGS(KABYLAKE_L, X86_STEPPING_ANY, SRBDS | MMIO | RETBLEED),
[all …]
/kernel/linux/linux-5.10/Documentation/admin-guide/
Dkernel-parameters.txt5209 (SRBDS) mitigation.