Searched refs:GDS (Results 1 – 4 of 4) sorted by relevance
| /linux/Documentation/admin-guide/hw-vuln/ |
| A D | gather_data_sampling.rst | 3 GDS - Gather Data Sampling 17 attacks. GDS is a purely sampling-based attack. 29 Without mitigation, GDS can infer stale data across virtually all 42 that guests are not allowed to disable the GDS mitigation. If a host erred and 43 allowed this, a guest could theoretically disable GDS mitigation, mount an 52 IA32_ARCH_CAPABILITIES[GDS_CTRL] R/O Enumerates GDS vulnerability 62 GDS can also be mitigated on systems that don't have updated microcode by 79 GDS System Information 82 GDS this can be accessed by the following sysfs file: 106 GDS Default mitigation
|
| /linux/arch/x86/kernel/cpu/ |
| A D | common.c | 1228 #define GDS BIT(6) macro 1242 VULNBL_INTEL_STEPPINGS(INTEL_SKYLAKE_X, X86_STEPPING_ANY, MMIO | RETBLEED | GDS), 1243 VULNBL_INTEL_STEPPINGS(INTEL_SKYLAKE_L, X86_STEPPING_ANY, MMIO | RETBLEED | GDS | SRBDS), 1244 VULNBL_INTEL_STEPPINGS(INTEL_SKYLAKE, X86_STEPPING_ANY, MMIO | RETBLEED | GDS | SRBDS), 1246 VULNBL_INTEL_STEPPINGS(INTEL_KABYLAKE, X86_STEPPING_ANY, MMIO | RETBLEED | GDS | SRBDS), 1249 VULNBL_INTEL_STEPPINGS(INTEL_ICELAKE_D, X86_STEPPING_ANY, MMIO | GDS), 1250 VULNBL_INTEL_STEPPINGS(INTEL_ICELAKE_X, X86_STEPPING_ANY, MMIO | GDS), 1254 VULNBL_INTEL_STEPPINGS(INTEL_TIGERLAKE_L, X86_STEPPING_ANY, GDS), 1255 VULNBL_INTEL_STEPPINGS(INTEL_TIGERLAKE, X86_STEPPING_ANY, GDS), 1257 VULNBL_INTEL_STEPPINGS(INTEL_ROCKETLAKE, X86_STEPPING_ANY, MMIO | RETBLEED | GDS), [all …]
|
| /linux/arch/x86/ |
| A D | Kconfig | 2619 Enable mitigation for Gather Data Sampling (GDS). GDS is a hardware
|
| /linux/Documentation/admin-guide/ |
| A D | kernel-parameters.txt | 1702 [X86,INTEL,EARLY] Control the Gather Data Sampling (GDS) 1719 off: Disable GDS mitigation.
|
Completed in 19 milliseconds