Lines Matching refs:mitigation

1354 			[X86] Controls mitigation for Register File Data
1361 on: Turns ON the mitigation.
1362 off: Turns OFF the mitigation.
1367 are enabled. In order to disable RFDS mitigation all
1874 mitigation.
1881 The mitigation may have a performance impact but can be
1882 disabled. On systems without the microcode mitigation
1883 disabling AVX serves as a mitigation.
1886 microcode mitigation. No effect if the microcode
1887 mitigation is present. Known to cause crashes in
1890 off: Disable GDS mitigation.
2411 on: Enable mitigation (default).
2412 off: Disable mitigation.
2414 mitigation.
2415 vmexit: Only deploy mitigation if CPU is affected by
2417 stuff: Deploy RSB-fill mitigation when retpoline is
2419 mitigation.
3044 Default: enabled on cores which need mitigation.
3260 never: Disables the mitigation
3270 Control mitigation for L1D based snooping vulnerability.
3281 This parameter controls the mitigation. The
3284 on - enable the interface for the mitigation
3286 l1tf= [X86,EARLY] Control mitigation of the L1TF vulnerability on
3313 hypervisor mitigation, i.e. conditional
3326 hypervisor mitigation.
3763 Control mitigation for the Micro-architectural Data
3775 This parameter controls the MDS mitigation. The
3778 full - Enable MDS mitigation on vulnerable CPUs
3779 full,nosmt - Enable MDS mitigation and disable
3781 off - Unconditionally disable MDS mitigation
3784 an active TAA mitigation as both vulnerabilities are
3786 this mitigation, you need to specify tsx_async_abort=off
4075 [X86,INTEL,EARLY] Control mitigation for the Processor
4082 Therefore, similar to MDS and TAA, the mitigation
4085 This parameter controls the mitigation. The
4088 full - Enable mitigation on vulnerable CPUs
4090 full,nosmt - Enable mitigation and disable SMT on
4093 off - Unconditionally disable mitigation
4097 MDS or TAA mitigation as these vulnerabilities are
4099 disable this mitigation, you need to specify
6549 retbleed= [X86] Control mitigation of RETBleed (Arbitrary
6559 off - no mitigation
6560 auto - automatically select a mitigation
6561 auto,nosmt - automatically select a mitigation,
6563 the full mitigation (only on Zen1
6581 Selecting 'auto' will choose a mitigation method at run
6988 spectre_bhi= [X86] Control mitigation of Branch History Injection
6993 on - (default) Enable the HW or SW mitigation as
6996 vmexit - On systems which don't have the HW mitigation
6997 available, enable the SW mitigation on vmexit
7001 off - Disable the mitigation.
7003 spectre_v2= [X86,EARLY] Control mitigation of Spectre variant 2
7016 mitigation method at run time according to the
7021 Selecting 'on' will also enable the mitigation
7023 Selecting specific mitigation does not force enable
7044 [X86] Control mitigation of Spectre variant 2
7055 but mitigation can be enabled via prctl
7056 per thread. The mitigation control state
7067 threads will enable the mitigation unless
7076 auto - Kernel selects the mitigation depending on
7079 Default mitigation: "prctl"
7085 [X86,EARLY] Control RAS overflow mitigation on AMD Zen CPUs
7087 off - Disable mitigation
7088 microcode - Enable microcode mitigation only
7089 safe-ret - Enable sw-only safe RET mitigation (default)
7090 ibpb - Enable mitigation by issuing IBPB on
7093 (cloud-specific mitigation)
7096 [HW,EARLY] Control Speculative Store Bypass (SSB) Disable mitigation
7122 picks the most appropriate mitigation. If the
7124 CPU is vulnerable the default mitigation is
7189 (SRBDS) mitigation.
7201 The microcode mitigation can be disabled with
7204 off: Disable mitigation and remove
7279 firmware based mitigation, this parameter
7280 indicates how the mitigation should be used:
7282 force-on: Unconditionally enable mitigation for
7284 force-off: Unconditionally disable mitigation for
7286 kernel: Always enable mitigation in the
7820 tsa= [X86] Control mitigation for Transient Scheduler
7827 off - disable the mitigation
7828 on - enable the mitigation (default)
7897 tsx_async_abort= [X86,INTEL,EARLY] Control mitigation for the TSX Async
7912 This parameter controls the TAA mitigation. The
7915 full - Enable TAA mitigation on vulnerable CPUs
7918 full,nosmt - Enable TAA mitigation and disable SMT on
7922 off - Unconditionally disable TAA mitigation
7925 prevented by an active MDS mitigation as both vulnerabilities
7927 this mitigation, you need to specify mds=off too.
7931 and deploy MDS mitigation, TAA mitigation is not
7933 mitigation.
8261 vmscape= [X86] Controls mitigation for VMscape attacks.
8265 off - disable the mitigation
8267 (IBPB) mitigation (default)