Home
last modified time | relevance | path

Searched refs:VMSCAPE (Results 1 – 4 of 4) sorted by relevance

/linux/arch/x86/kernel/cpu/
H A Dcommon.c1263 #define VMSCAPE BIT(11) macro
1266 VULNBL_INTEL_STEPS(INTEL_SANDYBRIDGE_X, X86_STEP_MAX, VMSCAPE),
1267 VULNBL_INTEL_STEPS(INTEL_SANDYBRIDGE, X86_STEP_MAX, VMSCAPE),
1268 VULNBL_INTEL_STEPS(INTEL_IVYBRIDGE_X, X86_STEP_MAX, VMSCAPE),
1269 VULNBL_INTEL_STEPS(INTEL_IVYBRIDGE, X86_STEP_MAX, SRBDS | VMSCAPE),
1270 VULNBL_INTEL_STEPS(INTEL_HASWELL, X86_STEP_MAX, SRBDS | VMSCAPE),
1271 VULNBL_INTEL_STEPS(INTEL_HASWELL_L, X86_STEP_MAX, SRBDS | VMSCAPE),
1272 VULNBL_INTEL_STEPS(INTEL_HASWELL_G, X86_STEP_MAX, SRBDS | VMSCAPE),
1273 VULNBL_INTEL_STEPS(INTEL_HASWELL_X, X86_STEP_MAX, MMIO | VMSCAPE),
1274 VULNBL_INTEL_STEPS(INTEL_BROADWELL_D, X86_STEP_MAX, MMIO | VMSCAPE),
[all …]
/linux/Documentation/admin-guide/hw-vuln/
H A Dvmscape.rst3 VMSCAPE title
6 VMSCAPE is a vulnerability that may allow a guest to influence the branch
16 The following CPU families are affected by VMSCAPE:
24 Icelake are not vulnerable to VMSCAPE.
56 vulnerable to cross-thread attacks. For complete protection against VMSCAPE
69 The sysfs file showing VMSCAPE mitigation status is:
77 The processor is not vulnerable to VMSCAPE attacks.
101 Disable the VMSCAPE mitigation.
H A Dattack_vector_controls.rst221 VMSCAPE X
/linux/arch/x86/
H A DKconfig2711 bool "Mitigate VMSCAPE"
2715 Enable mitigation for VMSCAPE attacks. VMSCAPE is a hardware security