Home
last modified time | relevance | path

Searched full:affected (Results 1 – 25 of 1034) sorted by relevance

12345678910>>...42

/OK3568_Linux_fs/kernel/Documentation/admin-guide/hw-vuln/
H A Dprocessor_mmio_stale_data.rst9 are not affected. System environments using virtualization where MMIO access is
61 processors affected by FBSDP, this may expose stale data from the fill buffers
67 into client core fill buffers, processors affected by MFBDS can leak data from
77 Affected Processors
79 Not all the CPUs are affected by all the variants. For instance, most
83 Below is the list of affected Intel processors [#f1]_:
108 If a CPU is in the affected processor list, but not affected by a variant, it
115 Newer processors and microcode update on existing affected processors added new
122 Bit 13 - SBDR_SSDP_NO - When set, processor is not affected by either the
125 Bit 14 - FBSDP_NO - When set, processor is not affected by the Fill Buffer
[all …]
H A Dmds.rst8 Affected processors
23 Whether a processor is affected or not can be read out from the MDS
26 Not all processors are affected by all variants of MDS, but the mitigation
100 * - 'Not affected'
143 The kernel detects the affected CPUs and the presence of the microcode
146 If a CPU is affected and the microcode is available, then the kernel
156 The mitigation for MDS clears the affected CPU buffers on return to user
160 is only affected by MSBDS and not any other MDS variant, because the
163 For CPUs which are only affected by MSBDS the user space, guest and idle
164 transition mitigations are sufficient and SMT is not affected.
[all …]
H A Dtsx_async_abort.rst10 Affected processors
19 Whether a processor is affected or not can be read out from the TAA
99 …- The CPU is affected by this vulnerability and the microcode and kernel mitigation are not applie…
106 * - 'Not affected'
107 - The CPU is not affected by this issue.
131 The kernel detects the affected CPUs and the presence of the microcode which is
132 required. If a CPU is affected and the microcode is available, then the kernel
142 Affected systems where the host has TAA microcode and TAA is mitigated by
159 off This option disables the TAA mitigation on affected platforms.
161 is affected, the system is vulnerable.
[all …]
H A Dspecial-register-buffer-data-sampling.rst16 Affected processors
19 be affected.
21 A processor is affected by SRBDS if its Family_Model and stepping is
24 latter class of processors are only affected when Intel TSX is enabled
25 by software using TSX_CTRL_MSR otherwise they are not affected.
117 affected platforms.
129 Not affected Processor not vulnerable
140 affected but with no way to know if host
/OK3568_Linux_fs/kernel/arch/x86/kernel/
H A Dsmp.c67 * 5AP. symmetric IO mode (normal Linux operation) not affected.
69 * 6AP. 'noapic' mode might be affected - fixed in later steppings
92 * 6AP. not affected - worked around in hardware
93 * 7AP. not affected - worked around in hardware
95 * 9AP. only 'noapic' mode affected. Might generate spurious
98 * 10AP. not affected - worked around in hardware
102 * 12AP. not affected - worked around in hardware
103 * 13AP. not affected - worked around in hardware
105 * 15AP. not affected - worked around in hardware
106 * 16AP. not affected - worked around in hardware
[all …]
/OK3568_Linux_fs/kernel/Documentation/x86/
H A Dmds.rst74 thread case (SMT off): Force the CPU to clear the affected buffers.
78 the affected CPU buffers when the VERW instruction is executed.
83 VERW can be avoided. If the CPU is not affected by L1TF then VERW needs to
116 off Mitigation is disabled. Either the CPU is not affected or
119 full Mitigation is enabled. CPU is affected and MD_CLEAR is
122 vmwerv Mitigation is enabled. CPU is affected and MD_CLEAR is not
129 If the CPU is affected and mds=off is not supplied on the kernel command
140 on affected CPUs when the mitigation is not disabled on the kernel
158 cleared on affected CPUs when SMT is active. This addresses the
165 The idle clearing is enabled on CPUs which are only affected by MSBDS
[all …]
/OK3568_Linux_fs/kernel/arch/arm64/
H A DKconfig386 the kernel if an affected CPU is detected.
408 the kernel if an affected CPU is detected.
431 only patch the kernel if an affected CPU is detected.
453 the kernel if an affected CPU is detected.
464 Affected Cortex-A57 parts might deadlock when exclusive load/store
471 the kernel if an affected CPU is detected.
483 Affected Cortex-A57 parts might report a Stage 2 translation
492 the kernel if an affected CPU is detected.
504 Affected parts may corrupt the AES state if an interrupt is
520 When running a compat (AArch32) userspace on an affected Cortex-A53
[all …]
/OK3568_Linux_fs/kernel/security/integrity/evm/
H A Devm_main.c294 * @dentry: pointer to the affected dentry
368 * @dentry: pointer to the affected dentry
369 * @xattr_name: pointer to the affected extended attribute name
403 * @dentry: pointer to the affected dentry
404 * @xattr_name: pointer to the affected extended attribute name
431 * @dentry: pointer to the affected dentry
432 * @xattr_name: pointer to the affected extended attribute name
456 * @dentry: pointer to the affected dentry
457 * @xattr_name: pointer to the affected extended attribute name
476 * @dentry: pointer to the affected dentry
[all …]
/OK3568_Linux_fs/kernel/drivers/base/
H A Dcpu.c517 return sysfs_emit(buf, "Not affected\n"); in cpu_show_meltdown()
523 return sysfs_emit(buf, "Not affected\n"); in cpu_show_spectre_v1()
529 return sysfs_emit(buf, "Not affected\n"); in cpu_show_spectre_v2()
535 return sysfs_emit(buf, "Not affected\n"); in cpu_show_spec_store_bypass()
541 return sysfs_emit(buf, "Not affected\n"); in cpu_show_l1tf()
547 return sysfs_emit(buf, "Not affected\n"); in cpu_show_mds()
554 return sysfs_emit(buf, "Not affected\n"); in cpu_show_tsx_async_abort()
560 return sysfs_emit(buf, "Not affected\n"); in cpu_show_itlb_multihit()
566 return sysfs_emit(buf, "Not affected\n"); in cpu_show_srbds()
572 return sysfs_emit(buf, "Not affected\n"); in cpu_show_mmio_stale_data()
[all …]
/OK3568_Linux_fs/external/xserver/xkb/
H A DxkbLEDs.c51 * feedback that might be affected. It also reports whether or not
52 * any extension devices might be affected in check_devs_rtrn.
242 register unsigned i, bit, affected; in XkbUpdateLedAutoState() local
256 affected = maps_to_check; in XkbUpdateLedAutoState()
258 sli->autoState &= ~affected; in XkbUpdateLedAutoState()
259 for (i = 0, bit = 1; (i < XkbNumIndicators) && (affected); i++, bit <<= 1) { in XkbUpdateLedAutoState()
260 if ((affected & bit) == 0) in XkbUpdateLedAutoState()
262 affected &= ~bit; in XkbUpdateLedAutoState()
269 affected = sli->effectiveState ^ oldState; in XkbUpdateLedAutoState()
270 if (affected == 0) in XkbUpdateLedAutoState()
[all …]
/OK3568_Linux_fs/buildroot/package/boost/
H A DConfig.in118 comment "boost-coroutine needs a toolchain not affected by GCC bug 64735"
156 comment "boost-fiber needs a toolchain not affected by GCC bug 64735"
227 comment "boost-locale needs a toolchain not affected by GCC bug 64735"
250 comment "boost-log needs a toolchain not affected by GCC bug 64735"
355 comment "boost-thread needs a toolchain not affected by GCC bug 64735"
374 comment "boost-type_erasure needs a toolchain not affected by GCC bug 64735"
394 comment "boost-wave needs a toolchain not affected by GCC bug 64735"
/OK3568_Linux_fs/kernel/arch/alpha/kernel/
H A Dbugs.c25 return sprintf(buf, "Not affected\n"); in cpu_show_meltdown()
34 return sprintf(buf, "Not affected\n"); in cpu_show_spectre_v1()
43 return sprintf(buf, "Not affected\n"); in cpu_show_spectre_v2()
/OK3568_Linux_fs/buildroot/utils/
H A Dgenrandconfig207 # The ctng toolchain is affected by PR58854
216 # The ctng toolchain is affected by PR58854
220 # The ctng toolchain is affected by PR58854
224 # The ctng toolchain is affected by PR60155
228 # The ctng toolchain is affected by PR60155
289 # The cs nios2 2017.02 toolchain is affected by binutils PR19405
293 # The cs nios2 2017.02 toolchain is affected by binutils PR19405
297 # The cs nios2 2017.02 toolchain is affected by binutils PR19405
/OK3568_Linux_fs/yocto/poky/scripts/contrib/
H A Dlist-packageconfig-flags.py9 # - list available PACKAGECONFIG flags and all affected recipes
74 ''' Collect available PACKAGECONFIG flags and all affected pkgs '''
102 ''' Display available PACKAGECONFIG flags and all affected pkgs '''
140 help = "list available PACKAGECONFIG flags and affected recipes",
/OK3568_Linux_fs/kernel/include/linux/
H A Dcpu_pm.h28 * CPU notifications apply to a single CPU and must be called on the affected
29 * CPU. They are used to save per-cpu context for affected blocks.
32 * are used to save any global context for affected blocks, and must be called
/OK3568_Linux_fs/buildroot/support/scripts/
H A Dcve.py147 cpe information usefull to know if a product is affected by
218 True if the Buildroot Package object passed as argument is affected
254 # not affected by the CVE
266 # not affected by the CVE
270 # We're in the version range affected by this CVE
/OK3568_Linux_fs/kernel/Documentation/PCI/
H A Dpci-error-recovery.rst18 pSeries boxes. A typical action taken is to disconnect the affected device,
22 offered, so that the affected PCI device(s) are reset and put back
24 between the affected device drivers and the PCI controller chip.
31 is reported as soon as possible to all affected device drivers,
128 every driver affected by the error.
173 thus, if one device sleeps/schedules, all devices are affected.
190 DMA), and then calls the mmio_enabled() callback on all affected
337 The platform will call the resume() callback on all affected device
/OK3568_Linux_fs/yocto/poky/meta/files/common-licenses/
H A DAPSL-1.119 1.1 "Affected Original Code" means only those specific portions of
214 for Apple and You to continue using the Affected Original Code; (b)
215 modify the Affected Original Code so that it is no longer infringing;
217 distribute the Affected Original Code until a final determination of
225 modification, sublicensing and distribution of the Affected Original
226 Code, Apple will lift the suspension of rights to the Affected
229 Your rights to Affected Original Code, nothing in this License shall
231 law, from replacing the Affected Original Code with non-infringing
/OK3568_Linux_fs/kernel/arch/x86/include/asm/
H A Dcpufeatures.h420 #define X86_BUG_AMD_E400 X86_BUG(13) /* CPU is among the affected by Erratum 400 */
421 #define X86_BUG_CPU_MELTDOWN X86_BUG(14) /* CPU is affected by meltdown attack and needs kernel pa…
422 #define X86_BUG_SPECTRE_V1 X86_BUG(15) /* CPU is affected by Spectre variant 1 attack with conditi…
423 #define X86_BUG_SPECTRE_V2 X86_BUG(16) /* CPU is affected by Spectre variant 2 attack with indirec…
424 #define X86_BUG_SPEC_STORE_BYPASS X86_BUG(17) /* CPU is affected by speculative store bypass attack…
425 #define X86_BUG_L1TF X86_BUG(18) /* CPU is affected by L1 Terminal Fault */
426 #define X86_BUG_MDS X86_BUG(19) /* CPU is affected by Microarchitectural data sampling */
427 #define X86_BUG_MSBDS_ONLY X86_BUG(20) /* CPU is only affected by the MSDBS variant of BUG_MDS */
428 #define X86_BUG_SWAPGS X86_BUG(21) /* CPU is affected by speculation through SWAPGS */
429 #define X86_BUG_TAA X86_BUG(22) /* CPU is affected by TSX Async Abort(TAA) */
[all …]
/OK3568_Linux_fs/kernel/tools/arch/x86/include/asm/
H A Dcpufeatures.h416 #define X86_BUG_AMD_E400 X86_BUG(13) /* CPU is among the affected by Erratum 400 */
417 #define X86_BUG_CPU_MELTDOWN X86_BUG(14) /* CPU is affected by meltdown attack and needs kernel pa…
418 #define X86_BUG_SPECTRE_V1 X86_BUG(15) /* CPU is affected by Spectre variant 1 attack with conditi…
419 #define X86_BUG_SPECTRE_V2 X86_BUG(16) /* CPU is affected by Spectre variant 2 attack with indirec…
420 #define X86_BUG_SPEC_STORE_BYPASS X86_BUG(17) /* CPU is affected by speculative store bypass attack…
421 #define X86_BUG_L1TF X86_BUG(18) /* CPU is affected by L1 Terminal Fault */
422 #define X86_BUG_MDS X86_BUG(19) /* CPU is affected by Microarchitectural data sampling */
423 #define X86_BUG_MSBDS_ONLY X86_BUG(20) /* CPU is only affected by the MSDBS variant of BUG_MDS */
424 #define X86_BUG_SWAPGS X86_BUG(21) /* CPU is affected by speculation through SWAPGS */
425 #define X86_BUG_TAA X86_BUG(22) /* CPU is affected by TSX Async Abort(TAA) */
[all …]
/OK3568_Linux_fs/u-boot/include/
H A Dreset.h27 * Reset consumers/clients are the HW modules affected by reset signals. This
158 * affected HW module(s). Depending on the reset controller hardware, the reset
172 * bulk struct, thus resetting the affected HW module(s). Depending on the
187 * affected HW modules() from reset, and allowing them to continue normal
201 * bulk struct, thus releasing the affected HW modules() from reset, and
/OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/share/doc/as.html/
H A DGNU-Object-Attributes.html104 <li> 0 for files not affected by the floating-point ABI.
119 <li> 0 for files not affected by the floating-point ABI.
147 <li> 0 for files not affected by the floating-point ABI.
158 <li> 0 for files not affected by the vector ABI.
174 <li> 0 for files not affected by the vector ABI.
/OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/share/doc/as.html/
H A DGNU-Object-Attributes.html104 <li> 0 for files not affected by the floating-point ABI.
119 <li> 0 for files not affected by the floating-point ABI.
147 <li> 0 for files not affected by the floating-point ABI.
158 <li> 0 for files not affected by the vector ABI.
174 <li> 0 for files not affected by the vector ABI.
/OK3568_Linux_fs/external/rockit/tgi/sdk/include/
H A DRTGraphCommon.h32 // Blocks and waits until none of the affected streams
36 // Returns and does not add packet if any affected input
/OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/share/gdb/python/gdb/command/
H A Dunwinders.py115 The number of unwinders affected.
155 in the locus are affected."""
177 in the locus are affected."""

12345678910>>...42