Home
last modified time | relevance | path

Searched refs:SRBDS (Results 1 – 6 of 6) sorted by relevance

/linux/Documentation/admin-guide/hw-vuln/
H A Dspecial-register-buffer-data-sampling.rst3 SRBDS - Special Register Buffer Data Sampling
6 SRBDS is a hardware vulnerability that allows MDS
22 A processor is affected by SRBDS if its Family_Model and stepping is
50 The following CVE entry is related to this SRBDS issue:
53 CVE-2020-0543 SRBDS Special Register Buffer Data Sampling
113 The kernel command line allows control over the SRBDS mitigation at boot time
117 off This option disables SRBDS mitigation for RDRAND and RDSEED on
121 SRBDS System Information
124 SRBDS this can be accessed by the following sysfs file:
145 SRBDS Default mitigation
H A Dprocessor_mmio_stale_data.rst17 those used to mitigate Special Register Buffer Data Sampling (SRBDS).
/linux/arch/x86/kernel/cpu/
H A Dcommon.c1213 #define SRBDS BIT(0) macro
1230 VULNBL_INTEL_STEPPINGS(INTEL_IVYBRIDGE, X86_STEPPING_ANY, SRBDS),
1231 VULNBL_INTEL_STEPPINGS(INTEL_HASWELL, X86_STEPPING_ANY, SRBDS),
1232 VULNBL_INTEL_STEPPINGS(INTEL_HASWELL_L, X86_STEPPING_ANY, SRBDS),
1233 VULNBL_INTEL_STEPPINGS(INTEL_HASWELL_G, X86_STEPPING_ANY, SRBDS),
1236 VULNBL_INTEL_STEPPINGS(INTEL_BROADWELL_G, X86_STEPPING_ANY, SRBDS),
1238 VULNBL_INTEL_STEPPINGS(INTEL_BROADWELL, X86_STEPPING_ANY, SRBDS),
1240 VULNBL_INTEL_STEPPINGS(INTEL_SKYLAKE_L, X86_STEPPING_ANY, MMIO | RETBLEED | GDS | SRBDS),
1241 VULNBL_INTEL_STEPPINGS(INTEL_SKYLAKE, X86_STEPPING_ANY, MMIO | RETBLEED | GDS | SRBDS),
1242 VULNBL_INTEL_STEPPINGS(INTEL_KABYLAKE_L, X86_STEPPING_ANY, MMIO | RETBLEED | GDS | SRBDS),
[all …]
/linux/arch/x86/
H A DKconfig2735 bool "Mitigate Special Register Buffer Data Sampling (SRBDS) hardware bug"
2739 Enable mitigation for Special Register Buffer Data Sampling (SRBDS).
2740 SRBDS is a hardware vulnerability that allows Microarchitectural Data
/linux/tools/arch/x86/kcpuid/
H A Dcpuid.csv252 7, 0, edx, 9, srdbs_ctrl , SRBDS mitigation MSR available
/linux/Documentation/admin-guide/
H A Dkernel-parameters.txt6442 (SRBDS) mitigation.