Lines Matching refs:mitigation
2393 Default: enabled on cores which need mitigation.
2534 never: Disables the mitigation
2543 Control mitigation for L1D based snooping vulnerability.
2554 This parameter controls the mitigation. The
2557 on - enable the interface for the mitigation
2559 l1tf= [X86] Control mitigation of the L1TF vulnerability on
2586 hypervisor mitigation, i.e. conditional
2599 hypervisor mitigation.
2915 Control mitigation for the Micro-architectural Data
2927 This parameter controls the MDS mitigation. The
2930 full - Enable MDS mitigation on vulnerable CPUs
2931 full,nosmt - Enable MDS mitigation and disable
2933 off - Unconditionally disable MDS mitigation
2936 an active TAA mitigation as both vulnerabilities are
2938 this mitigation, you need to specify tsx_async_abort=off
3213 [X86,INTEL] Control mitigation for the Processor
3220 Therefore, similar to MDS and TAA, the mitigation
3223 This parameter controls the mitigation. The
3226 full - Enable mitigation on vulnerable CPUs
3228 full,nosmt - Enable mitigation and disable SMT on
3231 off - Unconditionally disable mitigation
3235 MDS or TAA mitigation as these vulnerabilities are
3237 disable this mitigation, you need to specify
5202 retbleed= [X86] Control mitigation of RETBleed (Arbitrary
5212 off - no mitigation
5214 auto,nosmt - automatically select a mitigation,
5216 the full mitigation (only on Zen1
5234 Selecting 'auto' will choose a mitigation method at run
5579 spectre_v2= [X86] Control mitigation of Spectre variant 2
5592 mitigation method at run time according to the
5597 Selecting 'on' will also enable the mitigation
5618 [X86] Control mitigation of Spectre variant 2
5629 but mitigation can be enabled via prctl
5630 per thread. The mitigation control state
5641 threads will enable the mitigation unless
5650 auto - Kernel selects the mitigation depending on
5653 Default mitigation: "prctl"
5659 [HW] Control Speculative Store Bypass (SSB) Disable mitigation
5685 picks the most appropriate mitigation. If the
5687 CPU is vulnerable the default mitigation is
5757 (SRBDS) mitigation.
5769 The microcode mitigation can be disabled with
5772 off: Disable mitigation and remove
5847 firmware based mitigation, this parameter
5848 indicates how the mitigation should be used:
5850 force-on: Unconditionally enable mitigation for
5852 force-off: Unconditionally disable mitigation for
5854 kernel: Always enable mitigation in the
6269 tsx_async_abort= [X86,INTEL] Control mitigation for the TSX Async
6284 This parameter controls the TAA mitigation. The
6287 full - Enable TAA mitigation on vulnerable CPUs
6290 full,nosmt - Enable TAA mitigation and disable SMT on
6294 off - Unconditionally disable TAA mitigation
6297 prevented by an active MDS mitigation as both vulnerabilities
6299 this mitigation, you need to specify mds=off too.
6303 and deploy MDS mitigation, TAA mitigation is not
6305 mitigation.