Lines Matching full:mitigation
10 provided to untrusted guests may need mitigation. These vulnerabilities are
13 by an unmitigated transient execution attack. Mitigation for these
110 section, mitigation largely remains the same for all the variants, i.e. to
117 specific variants of Processor MMIO Stale Data vulnerabilities and mitigation
150 Mitigation chapter
153 same mitigation strategy to force the CPU to clear the affected buffers before
164 additional mitigation is needed on such CPUs.
166 For CPUs not affected by MDS or TAA, mitigation is needed only for the attacker
171 Mitigation points
175 Same mitigation as MDS when affected by MDS/TAA, otherwise no mitigation
186 Same mitigation as MDS when processor is also affected by MDS/TAA, otherwise
191 Mitigation control on the kernel command line
198 full If the CPU is vulnerable, enable mitigation; CPU buffer clearing
202 complete mitigation.
203 off Disables mitigation completely.
207 command line, then the kernel selects the appropriate mitigation.
209 Mitigation status information
224 - The processor is vulnerable, but no mitigation enabled
227 mitigation is enabled on a best effort basis.
230 based mitigation mechanism is not advertised via CPUID, the kernel
231 selects a best effort mitigation mode. This mode invokes the mitigation
239 * - 'Mitigation: Clear CPU buffers'
240 - The processor is vulnerable and the CPU buffer clearing mitigation is
244 out of Servicing period. Mitigation is not attempted.