Lines Matching refs:mitigation
144 For a full mitigation against BHB attacks, it's recommended to use
331 mitigation status of the system for Spectre: whether the system is
334 The sysfs file showing Spectre variant 1 mitigation status is:
358 retpoline mitigation or if the CPU has hardware mitigation, and if the
359 CPU has support for additional process-specific mitigation.
372 The sysfs file showing Spectre variant 2 mitigation status is:
382 'Mitigation: None' Vulnerable, no mitigation
385 'Mitigation: Enhanced IBRS' Hardware-focused mitigation
433 Full mitigation might require a microcode update from the CPU
437 Turning on mitigation for Spectre variant 1 and Spectre variant 2
440 1. Kernel mitigation
464 For Spectre variant 2 mitigation, the compiler turns indirect calls or
471 To turn on retpoline mitigation on a vulnerable CPU, the kernel
479 On Intel Skylake-era systems the mitigation covers most, but not all,
482 On CPUs with hardware mitigation for Spectre variant 2 (e.g. Enhanced
485 The retpoline mitigation is turned on by default on vulnerable
498 2. User program mitigation
504 For Spectre variant 2 mitigation, individual user programs
527 3. VM mitigation
553 The kernel also allows guests to use any microcode based mitigation
561 Spectre variant 2 mitigation can be disabled or force enabled at the
580 [X86] Control mitigation of Spectre variant 2
596 mitigation method at run time according to the
601 Selecting 'on' will also enable the mitigation
694 …t injection mitigation <https://software.intel.com/security-software-guidance/insights/deep-dive-r…