Lines Matching refs:mitigation

1188 			[X86] Controls mitigation for Register File Data
1195 on: Turns ON the mitigation.
1196 off: Turns OFF the mitigation.
1201 are enabled. In order to disable RFDS mitigation all
1703 mitigation.
1710 The mitigation may have a performance impact but can be
1711 disabled. On systems without the microcode mitigation
1712 disabling AVX serves as a mitigation.
1715 microcode mitigation. No effect if the microcode
1716 mitigation is present. Known to cause crashes in
1719 off: Disable GDS mitigation.
2642 Default: enabled on cores which need mitigation.
2833 never: Disables the mitigation
2843 Control mitigation for L1D based snooping vulnerability.
2854 This parameter controls the mitigation. The
2857 on - enable the interface for the mitigation
2859 l1tf= [X86,EARLY] Control mitigation of the L1TF vulnerability on
2886 hypervisor mitigation, i.e. conditional
2899 hypervisor mitigation.
3266 Control mitigation for the Micro-architectural Data
3278 This parameter controls the MDS mitigation. The
3281 full - Enable MDS mitigation on vulnerable CPUs
3282 full,nosmt - Enable MDS mitigation and disable
3284 off - Unconditionally disable MDS mitigation
3287 an active TAA mitigation as both vulnerabilities are
3289 this mitigation, you need to specify tsx_async_abort=off
3564 [X86,INTEL,EARLY] Control mitigation for the Processor
3571 Therefore, similar to MDS and TAA, the mitigation
3574 This parameter controls the mitigation. The
3577 full - Enable mitigation on vulnerable CPUs
3579 full,nosmt - Enable mitigation and disable SMT on
3582 off - Unconditionally disable mitigation
3586 MDS or TAA mitigation as these vulnerabilities are
3588 disable this mitigation, you need to specify
5817 retbleed= [X86] Control mitigation of RETBleed (Arbitrary
5827 off - no mitigation
5829 auto,nosmt - automatically select a mitigation,
5831 the full mitigation (only on Zen1
5849 Selecting 'auto' will choose a mitigation method at run
6209 spectre_bhi= [X86] Control mitigation of Branch History Injection
6214 on - (default) Enable the HW or SW mitigation as
6217 vmexit - On systems which don't have the HW mitigation
6218 available, enable the SW mitigation on vmexit
6222 off - Disable the mitigation.
6224 spectre_v2= [X86,EARLY] Control mitigation of Spectre variant 2
6237 mitigation method at run time according to the
6242 Selecting 'on' will also enable the mitigation
6263 [X86] Control mitigation of Spectre variant 2
6274 but mitigation can be enabled via prctl
6275 per thread. The mitigation control state
6286 threads will enable the mitigation unless
6295 auto - Kernel selects the mitigation depending on
6298 Default mitigation: "prctl"
6304 [X86,EARLY] Control RAS overflow mitigation on AMD Zen CPUs
6306 off - Disable mitigation
6307 microcode - Enable microcode mitigation only
6308 safe-ret - Enable sw-only safe RET mitigation (default)
6309 ibpb - Enable mitigation by issuing IBPB on
6312 (cloud-specific mitigation)
6315 [HW,EARLY] Control Speculative Store Bypass (SSB) Disable mitigation
6341 picks the most appropriate mitigation. If the
6343 CPU is vulnerable the default mitigation is
6408 (SRBDS) mitigation.
6420 The microcode mitigation can be disabled with
6423 off: Disable mitigation and remove
6498 firmware based mitigation, this parameter
6499 indicates how the mitigation should be used:
6501 force-on: Unconditionally enable mitigation for
6503 force-off: Unconditionally disable mitigation for
6505 kernel: Always enable mitigation in the
7038 tsx_async_abort= [X86,INTEL,EARLY] Control mitigation for the TSX Async
7053 This parameter controls the TAA mitigation. The
7056 full - Enable TAA mitigation on vulnerable CPUs
7059 full,nosmt - Enable TAA mitigation and disable SMT on
7063 off - Unconditionally disable TAA mitigation
7066 prevented by an active MDS mitigation as both vulnerabilities
7068 this mitigation, you need to specify mds=off too.
7072 and deploy MDS mitigation, TAA mitigation is not
7074 mitigation.