Home
last modified time | relevance | path

Searched refs:VMSCAPE (Results 1 – 4 of 4) sorted by relevance

/linux/arch/x86/kernel/cpu/
H A Dcommon.c1285 #define VMSCAPE BIT(11) macro
1288 VULNBL_INTEL_STEPS(INTEL_SANDYBRIDGE_X, X86_STEP_MAX, VMSCAPE),
1289 VULNBL_INTEL_STEPS(INTEL_SANDYBRIDGE, X86_STEP_MAX, VMSCAPE),
1290 VULNBL_INTEL_STEPS(INTEL_IVYBRIDGE_X, X86_STEP_MAX, VMSCAPE),
1291 VULNBL_INTEL_STEPS(INTEL_IVYBRIDGE, X86_STEP_MAX, SRBDS | VMSCAPE),
1292 VULNBL_INTEL_STEPS(INTEL_HASWELL, X86_STEP_MAX, SRBDS | VMSCAPE),
1293 VULNBL_INTEL_STEPS(INTEL_HASWELL_L, X86_STEP_MAX, SRBDS | VMSCAPE),
1294 VULNBL_INTEL_STEPS(INTEL_HASWELL_G, X86_STEP_MAX, SRBDS | VMSCAPE),
1295 VULNBL_INTEL_STEPS(INTEL_HASWELL_X, X86_STEP_MAX, MMIO | VMSCAPE),
1296 VULNBL_INTEL_STEPS(INTEL_BROADWELL_D, X86_STEP_MAX, MMIO | VMSCAPE),
[all …]
/linux/Documentation/admin-guide/hw-vuln/
H A Dvmscape.rst3 VMSCAPE title
6 VMSCAPE is a vulnerability that may allow a guest to influence the branch
16 The following CPU families are affected by VMSCAPE:
24 Icelake are not vulnerable to VMSCAPE.
56 vulnerable to cross-thread attacks. For complete protection against VMSCAPE
69 The sysfs file showing VMSCAPE mitigation status is:
77 The processor is not vulnerable to VMSCAPE attacks.
101 Disable the VMSCAPE mitigation.
H A Dattack_vector_controls.rst221 VMSCAPE X
/linux/arch/x86/
H A DKconfig2718 bool "Mitigate VMSCAPE"
2722 Enable mitigation for VMSCAPE attacks. VMSCAPE is a hardware security