Home
last modified time | relevance | path

Searched refs:GDS (Results 1 – 4 of 4) sorted by relevance

/linux/Documentation/admin-guide/hw-vuln/
H A Dgather_data_sampling.rst3 GDS - Gather Data Sampling
17 attacks. GDS is a purely sampling-based attack.
29 Without mitigation, GDS can infer stale data across virtually all
42 that guests are not allowed to disable the GDS mitigation. If a host erred and
43 allowed this, a guest could theoretically disable GDS mitigation, mount an
52 IA32_ARCH_CAPABILITIES[GDS_CTRL] R/O Enumerates GDS vulnerability
62 GDS can also be mitigated on systems that don't have updated microcode by
79 GDS System Information
82 GDS this can be accessed by the following sysfs file:
106 GDS Default mitigation
/linux/arch/x86/kernel/cpu/
H A Dcommon.c1225 #define GDS BIT(6) macro
1239 VULNBL_INTEL_STEPPINGS(INTEL_SKYLAKE_X, X86_STEPPING_ANY, MMIO | RETBLEED | GDS),
1240 VULNBL_INTEL_STEPPINGS(INTEL_SKYLAKE_L, X86_STEPPING_ANY, MMIO | RETBLEED | GDS | SRBDS),
1241 VULNBL_INTEL_STEPPINGS(INTEL_SKYLAKE, X86_STEPPING_ANY, MMIO | RETBLEED | GDS | SRBDS),
1242 VULNBL_INTEL_STEPPINGS(INTEL_KABYLAKE_L, X86_STEPPING_ANY, MMIO | RETBLEED | GDS | SRBDS),
1243 VULNBL_INTEL_STEPPINGS(INTEL_KABYLAKE, X86_STEPPING_ANY, MMIO | RETBLEED | GDS | SRBDS),
1245 VULNBL_INTEL_STEPPINGS(INTEL_ICELAKE_L, X86_STEPPING_ANY, MMIO | MMIO_SBDS | RETBLEED | GDS),
1246 VULNBL_INTEL_STEPPINGS(INTEL_ICELAKE_D, X86_STEPPING_ANY, MMIO | GDS),
1247 VULNBL_INTEL_STEPPINGS(INTEL_ICELAKE_X, X86_STEPPING_ANY, MMIO | GDS),
1248 VULNBL_INTEL_STEPPINGS(INTEL_COMETLAKE, X86_STEPPING_ANY, MMIO | MMIO_SBDS | RETBLEED | GDS),
[all …]
/linux/arch/x86/
H A DKconfig2630 Enable mitigation for Gather Data Sampling (GDS). GDS is a hardware
/linux/Documentation/admin-guide/
H A Dkernel-parameters.txt1710 [X86,INTEL,EARLY] Control the Gather Data Sampling (GDS)
1727 off: Disable GDS mitigation.