Home
last modified time | relevance | path

Searched refs:VMSCAPE (Results 1 – 3 of 3) sorted by relevance

/linux/arch/x86/kernel/cpu/
H A Dcommon.c1269 #define VMSCAPE BIT(11) macro
1272 VULNBL_INTEL_STEPS(INTEL_SANDYBRIDGE_X, X86_STEP_MAX, VMSCAPE),
1273 VULNBL_INTEL_STEPS(INTEL_SANDYBRIDGE, X86_STEP_MAX, VMSCAPE),
1274 VULNBL_INTEL_STEPS(INTEL_IVYBRIDGE_X, X86_STEP_MAX, VMSCAPE),
1275 VULNBL_INTEL_STEPS(INTEL_IVYBRIDGE, X86_STEP_MAX, SRBDS | VMSCAPE),
1276 VULNBL_INTEL_STEPS(INTEL_HASWELL, X86_STEP_MAX, SRBDS | VMSCAPE),
1277 VULNBL_INTEL_STEPS(INTEL_HASWELL_L, X86_STEP_MAX, SRBDS | VMSCAPE),
1278 VULNBL_INTEL_STEPS(INTEL_HASWELL_G, X86_STEP_MAX, SRBDS | VMSCAPE),
1279 VULNBL_INTEL_STEPS(INTEL_HASWELL_X, X86_STEP_MAX, MMIO | VMSCAPE),
1280 VULNBL_INTEL_STEPS(INTEL_BROADWELL_D, X86_STEP_MAX, MMIO | VMSCAPE),
[all …]
/linux/Documentation/admin-guide/hw-vuln/
H A Dvmscape.rst3 VMSCAPE title
6 VMSCAPE is a vulnerability that may allow a guest to influence the branch
16 The following CPU families are affected by VMSCAPE:
24 Icelake are not vulnerable to VMSCAPE.
56 vulnerable to cross-thread attacks. For complete protection against VMSCAPE
69 The sysfs file showing VMSCAPE mitigation status is:
77 The processor is not vulnerable to VMSCAPE attacks.
101 Disable the VMSCAPE mitigation.
H A Dattack_vector_controls.rst221 VMSCAPE X