Home
last modified time | relevance | path

Searched refs:GDS (Results 1 – 4 of 4) sorted by relevance

/linux/Documentation/admin-guide/hw-vuln/
A Dgather_data_sampling.rst3 GDS - Gather Data Sampling
17 attacks. GDS is a purely sampling-based attack.
29 Without mitigation, GDS can infer stale data across virtually all
42 that guests are not allowed to disable the GDS mitigation. If a host erred and
43 allowed this, a guest could theoretically disable GDS mitigation, mount an
52 IA32_ARCH_CAPABILITIES[GDS_CTRL] R/O Enumerates GDS vulnerability
62 GDS can also be mitigated on systems that don't have updated microcode by
79 GDS System Information
82 GDS this can be accessed by the following sysfs file:
106 GDS Default mitigation
/linux/arch/x86/kernel/cpu/
A Dcommon.c1228 #define GDS BIT(6) macro
1242 VULNBL_INTEL_STEPPINGS(INTEL_SKYLAKE_X, X86_STEPPING_ANY, MMIO | RETBLEED | GDS),
1243 VULNBL_INTEL_STEPPINGS(INTEL_SKYLAKE_L, X86_STEPPING_ANY, MMIO | RETBLEED | GDS | SRBDS),
1244 VULNBL_INTEL_STEPPINGS(INTEL_SKYLAKE, X86_STEPPING_ANY, MMIO | RETBLEED | GDS | SRBDS),
1246 VULNBL_INTEL_STEPPINGS(INTEL_KABYLAKE, X86_STEPPING_ANY, MMIO | RETBLEED | GDS | SRBDS),
1249 VULNBL_INTEL_STEPPINGS(INTEL_ICELAKE_D, X86_STEPPING_ANY, MMIO | GDS),
1250 VULNBL_INTEL_STEPPINGS(INTEL_ICELAKE_X, X86_STEPPING_ANY, MMIO | GDS),
1254 VULNBL_INTEL_STEPPINGS(INTEL_TIGERLAKE_L, X86_STEPPING_ANY, GDS),
1255 VULNBL_INTEL_STEPPINGS(INTEL_TIGERLAKE, X86_STEPPING_ANY, GDS),
1257 VULNBL_INTEL_STEPPINGS(INTEL_ROCKETLAKE, X86_STEPPING_ANY, MMIO | RETBLEED | GDS),
[all …]
/linux/arch/x86/
A DKconfig2619 Enable mitigation for Gather Data Sampling (GDS). GDS is a hardware
/linux/Documentation/admin-guide/
A Dkernel-parameters.txt1702 [X86,INTEL,EARLY] Control the Gather Data Sampling (GDS)
1719 off: Disable GDS mitigation.

Completed in 19 milliseconds