Lines Matching full:mitigation
3 * Handle detection, reporting and mitigation of Spectre v1, v2 and v4, as
35 * We try to ensure that the mitigation state can never change as the result of
63 return sprintf(buf, "Mitigation: __user pointer sanitization\n"); in cpu_show_spectre_v1()
96 pr_info_once("spectre-v2 mitigation disabled by command line option\n"); in spectre_v2_mitigations_off()
145 return sprintf(buf, "Mitigation: %s%s\n", v2_str, bhb_str); in cpu_show_spectre_v2()
341 * still rely on firmware for the mitigation at EL2. in spectre_v2_enable_fw_mitigation()
373 * A major source of headaches is that the software mitigation is enabled both
380 * all of the currently onlined CPUs are safelisted, as the mitigation tends to
383 * The only good part is that if the firmware mitigation is present, then it is
385 * vulnerable CPU if one of the boot CPUs is using the firmware mitigation.
434 * Wrap these up in some helpers, which prefer disabling the mitigation if faced
435 * with contradictory parameters. The mitigation is always either "off",
444 pr_info_once("spectre-v4 mitigation disabled by command-line option\n"); in spectre_v4_mitigations_off()
449 /* Do we need to toggle the mitigation state on entry to/exit from the kernel? */
469 return sprintf(buf, "Mitigation: Speculative Store Bypass disabled via prctl\n"); in cpu_show_spec_store_bypass()
581 * Patch a branch over the Spectre-v4 mitigation code with a NOP so that
601 * Patch a NOP in the Spectre-v4 mitigation code with an SMC/HVC instruction
602 * to call into firmware to adjust the mitigation state.
684 * The Spectre-v4 mitigation can be controlled via a prctl() from userspace.
708 /* Enable speculation: disable mitigation */ in ssbd_prctl_set()
717 * If the mitigation is forced on, then speculation is forced in ssbd_prctl_set()
726 /* Force disable speculation: force enable mitigation */ in ssbd_prctl_set()
728 * If the mitigation is forced off, then speculation is forced in ssbd_prctl_set()
737 /* Disable speculation: enable mitigation */ in ssbd_prctl_set()
745 /* Disable speculation until execve(): enable mitigation */ in ssbd_prctl_set()
747 * If the mitigation state is forced one way or the other, then in ssbd_prctl_set()
798 /* Check the mitigation state for this task */ in ssbd_prctl_get()
828 * - Has the ClearBHB instruction to perform the mitigation.
830 * software mitigation in the vectors is needed.
1056 pr_info_once("spectre-bhb mitigation disabled by compile time option\n"); in spectre_bhb_enable_mitigation()
1058 pr_info_once("spectre-bhb mitigation disabled by command line option\n"); in spectre_bhb_enable_mitigation()