Lines Matching full:mitigation
49 update for mitigation.
55 Mitigation chapter
59 the mitigation is to not allow indirect branches in the lower half.
89 reason, when retpoline is enabled, ITS mitigation only relocates the RETs to
90 safe thunks. Unless user requested the RSB-stuffing mitigation.
94 RSB-stuffing via Call Depth Tracking is a mitigation for Retbleed RSB-underflow
97 Mitigation in guests
99 All guests deploy ITS mitigation by default, irrespective of eIBRS enumeration
104 To prevent guests from unnecessarily deploying the mitigation on unaffected
110 Mitigation options
112 The ITS mitigation can be controlled using the "indirect_target_selection"
116 on (default) Deploy the "Aligned branch/return thunks" mitigation.
117 If spectre_v2 mitigation enables retpoline, aligned-thunks are only
121 off Disable ITS mitigation.
124 part of ITS. Otherwise, mitigation is not deployed. This option is
128 stuff Deploy RSB-fill mitigation when retpoline is also deployed.
129 Otherwise, deploy the default mitigation. When retpoline mitigation
133 force Force the ITS bug and deploy the default mitigation.
139 The sysfs file showing ITS mitigation status is:
143 Note, microcode mitigation status is not reported in this file.
152 - System is vulnerable and no mitigation has been applied.
156 * - Mitigation: Aligned branch/return thunks
157 - The mitigation is enabled, affected indirect branches and RETs are
159 * - Mitigation: Retpolines, Stuffing RSB
160 - The mitigation is enabled using retpoline and RSB stuffing.