Searched refs:GDS (Results 1 – 4 of 4) sorted by relevance
/linux/Documentation/admin-guide/hw-vuln/ |
H A D | gather_data_sampling.rst | 3 GDS - Gather Data Sampling 17 attacks. GDS is a purely sampling-based attack. 29 Without mitigation, GDS can infer stale data across virtually all 42 that guests are not allowed to disable the GDS mitigation. If a host erred and 43 allowed this, a guest could theoretically disable GDS mitigation, mount an 52 IA32_ARCH_CAPABILITIES[GDS_CTRL] R/O Enumerates GDS vulnerability 62 GDS can also be mitigated on systems that don't have updated microcode by 79 GDS System Information 82 GDS this can be accessed by the following sysfs file: 106 GDS Default mitigation
|
/linux/arch/x86/kernel/cpu/ |
H A D | common.c | 1225 #define GDS BIT(6) macro 1239 VULNBL_INTEL_STEPPINGS(INTEL_SKYLAKE_X, X86_STEPPING_ANY, MMIO | RETBLEED | GDS), 1240 VULNBL_INTEL_STEPPINGS(INTEL_SKYLAKE_L, X86_STEPPING_ANY, MMIO | RETBLEED | GDS | SRBDS), 1241 VULNBL_INTEL_STEPPINGS(INTEL_SKYLAKE, X86_STEPPING_ANY, MMIO | RETBLEED | GDS | SRBDS), 1242 VULNBL_INTEL_STEPPINGS(INTEL_KABYLAKE_L, X86_STEPPING_ANY, MMIO | RETBLEED | GDS | SRBDS), 1243 VULNBL_INTEL_STEPPINGS(INTEL_KABYLAKE, X86_STEPPING_ANY, MMIO | RETBLEED | GDS | SRBDS), 1245 VULNBL_INTEL_STEPPINGS(INTEL_ICELAKE_L, X86_STEPPING_ANY, MMIO | MMIO_SBDS | RETBLEED | GDS), 1246 VULNBL_INTEL_STEPPINGS(INTEL_ICELAKE_D, X86_STEPPING_ANY, MMIO | GDS), 1247 VULNBL_INTEL_STEPPINGS(INTEL_ICELAKE_X, X86_STEPPING_ANY, MMIO | GDS), 1248 VULNBL_INTEL_STEPPINGS(INTEL_COMETLAKE, X86_STEPPING_ANY, MMIO | MMIO_SBDS | RETBLEED | GDS), [all …]
|
/linux/arch/x86/ |
H A D | Kconfig | 2630 Enable mitigation for Gather Data Sampling (GDS). GDS is a hardware
|
/linux/Documentation/admin-guide/ |
H A D | kernel-parameters.txt | 1710 [X86,INTEL,EARLY] Control the Gather Data Sampling (GDS) 1727 off: Disable GDS mitigation.
|