/linux-6.12.1/Documentation/admin-guide/hw-vuln/ |
D | reg-file-data-sampling.rst | 11 Affected Processors 13 Below is the list of affected Intel processors [#f1]_: 33 RAPTORLAKE(06_B7H) codenamed Catlow are not affected. They are reported as 34 vulnerable in Linux because they share the same family/model with an affected 35 part. Unlike their affected counterparts, they do not enumerate RFDS_CLEAR or 37 affected and unaffected parts, but it is deemed not worth adding complexity as 44 mitigation strategy to force the CPU to clear the affected buffers before an 47 The microcode clears the affected CPU buffers when the VERW instruction is 53 before VMentry. None of the affected cores support SMT, so VERW is not required 58 Newer processors and microcode update on existing affected processors added new [all …]
|
D | processor_mmio_stale_data.rst | 9 are not affected. System environments using virtualization where MMIO access is 61 processors affected by FBSDP, this may expose stale data from the fill buffers 67 into client core fill buffers, processors affected by MFBDS can leak data from 77 Affected Processors 79 Not all the CPUs are affected by all the variants. For instance, most 83 Below is the list of affected Intel processors [#f1]_: 108 If a CPU is in the affected processor list, but not affected by a variant, it 115 Newer processors and microcode update on existing affected processors added new 122 Bit 13 - SBDR_SSDP_NO - When set, processor is not affected by either the 125 Bit 14 - FBSDP_NO - When set, processor is not affected by the Fill Buffer [all …]
|
D | mds.rst | 8 Affected processors 23 Whether a processor is affected or not can be read out from the MDS 26 Not all processors are affected by all variants of MDS, but the mitigation 100 * - 'Not affected' 135 The kernel detects the affected CPUs and the presence of the microcode 138 If a CPU is affected and the microcode is available, then the kernel 148 The mitigation for MDS clears the affected CPU buffers on return to user 152 is only affected by MSBDS and not any other MDS variant, because the 155 For CPUs which are only affected by MSBDS the user space, guest and idle 156 transition mitigations are sufficient and SMT is not affected. [all …]
|
D | tsx_async_abort.rst | 10 Affected processors 19 Whether a processor is affected or not can be read out from the TAA 99 …- The CPU is affected by this vulnerability and the microcode and kernel mitigation are not applie… 118 * - 'Not affected' 119 - The CPU is not affected by this issue. 124 The kernel detects the affected CPUs and the presence of the microcode which is 125 required. If a CPU is affected and the microcode is available, then the kernel 135 Affected systems where the host has TAA microcode and TAA is mitigated by 152 off This option disables the TAA mitigation on affected platforms. 154 is affected, the system is vulnerable. [all …]
|
D | special-register-buffer-data-sampling.rst | 17 Affected processors 20 be affected. 22 A processor is affected by SRBDS if its Family_Model and stepping is 25 latter class of processors are only affected when Intel TSX is enabled 26 by software using TSX_CTRL_MSR otherwise they are not affected. 118 affected platforms. 130 Not affected Processor not vulnerable 141 affected but with no way to know if host
|
D | cross-thread-rsb.rst | 18 Affected processors 38 Affected SMT-capable processors support 1T and 2T modes of execution when SMT 46 In affected processors, the return address predictor (RAP) is partitioned 61 An attack can be mounted on affected processors by performing a series of CALL
|
D | gather_data_sampling.rst | 76 use the microcode mitigation when available or disable AVX on affected systems 89 Not affected Processor not vulnerable. 102 affected but with no way to know if host
|
/linux-6.12.1/Documentation/arch/x86/ |
D | mds.rst | 74 thread case (SMT off): Force the CPU to clear the affected buffers. 78 the affected CPU buffers when the VERW instruction is executed. 83 VERW can be avoided. If the CPU is not affected by L1TF then VERW needs to 119 off Mitigation is disabled. Either the CPU is not affected or 122 full Mitigation is enabled. CPU is affected and MD_CLEAR is 125 vmwerv Mitigation is enabled. CPU is affected and MD_CLEAR is not 132 If the CPU is affected and mds=off is not supplied on the kernel command 143 on affected CPUs when the mitigation is not disabled on the kernel 174 cleared on affected CPUs when SMT is active. This addresses the 181 The idle clearing is enabled on CPUs which are only affected by MSBDS [all …]
|
D | tsx_async_abort.rst | 37 off Mitigation is disabled. Either the CPU is not affected or 43 verw Mitigation is enabled. CPU is affected and MD_CLEAR is 46 ucode needed Mitigation is enabled. CPU is affected and MD_CLEAR is not 53 If the CPU is affected and the "tsx_async_abort" kernel command line parameter is
|
/linux-6.12.1/arch/x86/kernel/ |
D | smp.c | 69 * 5AP. symmetric IO mode (normal Linux operation) not affected. 71 * 6AP. 'noapic' mode might be affected - fixed in later steppings 94 * 6AP. not affected - worked around in hardware 95 * 7AP. not affected - worked around in hardware 97 * 9AP. only 'noapic' mode affected. Might generate spurious 100 * 10AP. not affected - worked around in hardware 104 * 12AP. not affected - worked around in hardware 105 * 13AP. not affected - worked around in hardware 107 * 15AP. not affected - worked around in hardware 108 * 16AP. not affected - worked around in hardware [all …]
|
/linux-6.12.1/arch/arm64/ |
D | Kconfig | 444 The affected design reports FEAT_HAFDBS as not implemented in 477 the kernel if an affected CPU is detected. 499 the kernel if an affected CPU is detected. 522 only patch the kernel if an affected CPU is detected. 544 the kernel if an affected CPU is detected. 555 Affected Cortex-A57 parts might deadlock when exclusive load/store 562 the kernel if an affected CPU is detected. 573 Affected Cortex-A57 parts might report a Stage 2 translation 582 the kernel if an affected CPU is detected. 594 Affected parts may corrupt the AES state if an interrupt is [all …]
|
/linux-6.12.1/arch/alpha/kernel/ |
D | bugs.c | 26 return sprintf(buf, "Not affected\n"); in cpu_show_meltdown() 35 return sprintf(buf, "Not affected\n"); in cpu_show_spectre_v1() 44 return sprintf(buf, "Not affected\n"); in cpu_show_spectre_v2()
|
/linux-6.12.1/security/integrity/evm/ |
D | evm_main.c | 435 * @dentry: pointer to the affected dentry 452 * @dentry: pointer to the affected dentry 575 * @dentry: pointer to the affected dentry 576 * @xattr_name: pointer to the affected extended attribute name 613 * @dentry: pointer to the affected dentry 614 * @xattr_name: pointer to the affected extended attribute name 663 * @dentry: pointer to the affected dentry 716 * @dentry: pointer to the affected dentry 767 * @xattr_name: pointer to the affected extended attribute name 792 * @dentry: pointer to the affected dentry [all …]
|
/linux-6.12.1/Documentation/process/ |
D | embargoed-hardware-issues.rst | 46 While hardware security issues are often handled by the affected silicon 129 description of the problem and a list of any known affected silicon. If 130 your organization builds or distributes the affected hardware, we encourage 131 you to also consider what other hardware could be affected. The disclosing 132 party is responsible for contacting the affected silicon vendors in a 229 To allow the affected silicon vendors to work with their internal teams and 233 Designated representatives of the affected silicon vendors are 236 response team about the handover. The affected silicon vendor must
|
/linux-6.12.1/include/linux/ |
D | cpu_pm.h | 28 * CPU notifications apply to a single CPU and must be called on the affected 29 * CPU. They are used to save per-cpu context for affected blocks. 32 * are used to save any global context for affected blocks, and must be called
|
/linux-6.12.1/drivers/net/can/rockchip/ |
D | rockchip_canfd-rx.c | 140 * Not affected if: in rkcanfd_rxstx_filter() 148 /* Not affected if: in rkcanfd_rxstx_filter() 156 /* Not affected if: in rkcanfd_rxstx_filter() 162 /* Not affected if: in rkcanfd_rxstx_filter() 169 /* Affected by Erratum 6 */ in rkcanfd_rxstx_filter()
|
/linux-6.12.1/Documentation/PCI/ |
D | pci-error-recovery.rst | 18 pSeries boxes. A typical action taken is to disconnect the affected device, 22 offered, so that the affected PCI device(s) are reset and put back 24 between the affected device drivers and the PCI controller chip. 31 is reported as soon as possible to all affected device drivers, 129 every driver affected by the error. 174 thus, if one device sleeps/schedules, all devices are affected. 191 DMA), and then calls the mmio_enabled() callback on all affected 338 The platform will call the resume() callback on all affected device
|
/linux-6.12.1/tools/arch/x86/include/asm/ |
D | cpufeatures.h | 462 #define X86_FEATURE_SRSO_NO (20*32+29) /* CPU is not affected by SRSO */ 501 #define X86_BUG_AMD_E400 X86_BUG(13) /* "amd_e400" CPU is among the affected by Erratum 400 */ 502 #define X86_BUG_CPU_MELTDOWN X86_BUG(14) /* "cpu_meltdown" CPU is affected by meltdown attack and … 503 #define X86_BUG_SPECTRE_V1 X86_BUG(15) /* "spectre_v1" CPU is affected by Spectre variant 1 attack… 504 #define X86_BUG_SPECTRE_V2 X86_BUG(16) /* "spectre_v2" CPU is affected by Spectre variant 2 attack… 505 #define X86_BUG_SPEC_STORE_BYPASS X86_BUG(17) /* "spec_store_bypass" CPU is affected by speculative… 506 #define X86_BUG_L1TF X86_BUG(18) /* "l1tf" CPU is affected by L1 Terminal Fault */ 507 #define X86_BUG_MDS X86_BUG(19) /* "mds" CPU is affected by Microarchitectural data sampling */ 508 #define X86_BUG_MSBDS_ONLY X86_BUG(20) /* "msbds_only" CPU is only affected by the MSDBS variant … 509 #define X86_BUG_SWAPGS X86_BUG(21) /* "swapgs" CPU is affected by speculation through SWAPGS */ [all …]
|
/linux-6.12.1/arch/x86/include/asm/ |
D | cpufeatures.h | 463 #define X86_FEATURE_SRSO_NO (20*32+29) /* CPU is not affected by SRSO */ 502 #define X86_BUG_AMD_E400 X86_BUG(13) /* "amd_e400" CPU is among the affected by Erratum 400 */ 503 #define X86_BUG_CPU_MELTDOWN X86_BUG(14) /* "cpu_meltdown" CPU is affected by meltdown attack and … 504 #define X86_BUG_SPECTRE_V1 X86_BUG(15) /* "spectre_v1" CPU is affected by Spectre variant 1 attack… 505 #define X86_BUG_SPECTRE_V2 X86_BUG(16) /* "spectre_v2" CPU is affected by Spectre variant 2 attack… 506 #define X86_BUG_SPEC_STORE_BYPASS X86_BUG(17) /* "spec_store_bypass" CPU is affected by speculative… 507 #define X86_BUG_L1TF X86_BUG(18) /* "l1tf" CPU is affected by L1 Terminal Fault */ 508 #define X86_BUG_MDS X86_BUG(19) /* "mds" CPU is affected by Microarchitectural data sampling */ 509 #define X86_BUG_MSBDS_ONLY X86_BUG(20) /* "msbds_only" CPU is only affected by the MSDBS variant … 510 #define X86_BUG_SWAPGS X86_BUG(21) /* "swapgs" CPU is affected by speculation through SWAPGS */ [all …]
|
/linux-6.12.1/drivers/iommu/intel/ |
D | pasid.c | 485 * - Global Device-TLB invalidation to affected functions in intel_pasid_setup_dirty_tracking() 488 * Addr[63:12]=0x7FFFFFFF_FFFFF) to affected functions in intel_pasid_setup_dirty_tracking() 563 * - Global Device-TLB invalidation to affected functions in intel_pasid_setup_page_snoop_control() 566 * Addr[63:12]=0x7FFFFFFF_FFFFF) to affected functions in intel_pasid_setup_page_snoop_control() 787 * flushes for all affected domain IDs and PASIDs used in in device_pasid_table_setup() 902 * - Global Device-TLB invalidation to all affected functions in intel_context_flush_present() 913 * - Domain-selective PASID-cache invalidation to affected domains in intel_context_flush_present() 914 * - Domain-selective IOTLB invalidation to affected domains in intel_context_flush_present() 915 * - Global Device-TLB invalidation to affected functions in intel_context_flush_present()
|
/linux-6.12.1/Documentation/devicetree/bindings/pinctrl/ |
D | actions,s500-pinctrl.yaml | 73 List of gpio pin groups affected by the functions specified in 123 List of gpio pin groups affected by the drive-strength property 141 List of gpio pins affected by the bias-pull-* and
|
/linux-6.12.1/Documentation/filesystems/ |
D | quota.rst | 83 - major number of a device with the affected filesystem 85 - minor number of a device with the affected filesystem
|
/linux-6.12.1/Documentation/devicetree/bindings/reset/ |
D | reset.txt | 23 the DT node of each affected HW block, since if activated, an unrelated block 26 children of the bus are affected by the reset signal, or an individual HW
|
/linux-6.12.1/arch/mips/include/asm/ |
D | sync.h | 16 * 2) Ordering barriers, which only ensure that affected memory operations 135 * at each affected branch target. 156 * optimized memory barrier primitives."). Here we specify that the affected
|
/linux-6.12.1/include/linux/pinctrl/ |
D | pinmux.h | 36 * actual pins affected. The applicable groups will be returned in 46 * affected GPIO range is passed along with an offset(pin number) into that
|