| /OK3568_Linux_fs/kernel/arch/x86/kernel/cpu/ |
| H A D | tsx.c | 24 u64 tsx; in tsx_disable() local 26 rdmsrl(MSR_IA32_TSX_CTRL, tsx); in tsx_disable() 29 tsx |= TSX_CTRL_RTM_DISABLE; in tsx_disable() 37 tsx |= TSX_CTRL_CPUID_CLEAR; in tsx_disable() 39 wrmsrl(MSR_IA32_TSX_CTRL, tsx); in tsx_disable() 44 u64 tsx; in tsx_enable() local 46 rdmsrl(MSR_IA32_TSX_CTRL, tsx); in tsx_enable() 49 tsx &= ~TSX_CTRL_RTM_DISABLE; in tsx_enable() 56 tsx &= ~TSX_CTRL_CPUID_CLEAR; in tsx_enable() 58 wrmsrl(MSR_IA32_TSX_CTRL, tsx); in tsx_enable()
|
| H A D | Makefile | 36 obj-y += intel.o intel_pconfig.o tsx.o
|
| /OK3568_Linux_fs/kernel/Documentation/x86/ |
| H A D | tsx_async_abort.rst | 40 tsx disabled Mitigation is enabled. TSX feature is disabled by default at 57 Below tables indicate the impact of tsx=on|off|auto cmdline options on state of 61 1. "tsx=off" 64 MSR_IA32_ARCH_CAPABILITIES bits Result with cmdline tsx=off 76 2. "tsx=on" 79 MSR_IA32_ARCH_CAPABILITIES bits Result with cmdline tsx=on 91 3. "tsx=auto" 94 MSR_IA32_ARCH_CAPABILITIES bits Result with cmdline tsx=auto
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/hw-vuln/ |
| H A D | tsx_async_abort.rst | 181 parameter "tsx=" on CPUs which support TSX control. MSR_IA32_TSX_CTRL is used 207 Not specifying this option is equivalent to "tsx=off". 209 The following combinations of the "tsx_async_abort" and "tsx" are possible. For 210 affected platforms tsx=auto is equivalent to tsx=off and the result will be: 213 tsx=on tsx_async_abort=full The system will use VERW to clear CPU 216 tsx=on tsx_async_abort=full,nosmt As above, cross-thread attacks on SMT 218 tsx=on tsx_async_abort=off The system is vulnerable. 219 tsx=off tsx_async_abort=full TSX might be disabled if microcode 222 tsx=off tsx_async_abort=full,nosmt Ditto 223 tsx=off tsx_async_abort=off ditto [all …]
|
| /OK3568_Linux_fs/buildroot/package/pcm-tools/ |
| H A D | pcm-tools.mk | 14 pcm-pcicfg pcm-pcie pcm-power pcm-sensor pcm-tsx pcm
|
| /OK3568_Linux_fs/kernel/arch/x86/events/intel/ |
| H A D | ds.c | 1302 union hsw_tsx_tuning tsx = { .value = tsx_tuning }; in intel_get_tsx_weight() local 1303 return tsx.cycles_last_block; in intel_get_tsx_weight()
|
| /OK3568_Linux_fs/kernel/arch/x86/ |
| H A D | Kconfig | 1903 Therefore TSX is not enabled by default (aka tsx=off). An admin 1904 might override this decision by tsx=on the command line parameter. 1909 This option allows to set the default tsx mode between tsx=on, =off 1914 platforms or on if TSX is in use and the security aspect of tsx is not 1920 TSX is disabled if possible - equals to tsx=off command line parameter. 1925 TSX is always enabled on TSX capable HW - equals the tsx=on command 1932 side channel attacks- equals the tsx=auto command line parameter.
|
| /OK3568_Linux_fs/kernel/Documentation/scsi/ |
| H A D | ncr53c8xx.rst | 126 Useful SCSI tools written by Eric Youngdale are available at tsx-11: 128 - ftp://tsx-11.mit.edu/pub/linux/ALPHA/scsi/scsiinfo-X.Y.tar.gz 129 - ftp://tsx-11.mit.edu/pub/linux/ALPHA/scsi/scsidev-X.Y.tar.gz
|
| /OK3568_Linux_fs/kernel/ |
| H A D | CREDITS | 1789 D: Maintain tsx-11.mit.edu 3728 D: Maintainer of tsx-11.mit.edu ftp archive
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/ |
| H A D | kernel-parameters.txt | 5631 tsx= [X86] Control Transactional Synchronization 5655 Not specifying this option is equivalent to tsx=off.
|
| /OK3568_Linux_fs/device/rockchip/common/images/userdata/userdata_normal/media/ |
| H A D | yuv420_p352x288.yuv | 794 ….11002101122(]��]Rj��������{qgahy������oglw������������������~wx}rl~|odhz|tsx|����~yxupkd[\E094::… 1354 …wvwwwvwuqx{wyxtvyxyyvonruyyxyxvwwvvwwwwwvwwvwwwwwwwvuuvwxxxxwwwvwvwxwvwury|tsx{ww~�~~~~~~~~~~~… 1489 …wvwvvvwtqx{xxxtuyxxyvoprtxyyxwxwvvvvvwwwwwwxwwwwvvwvuuuvwwxwvvvwxwvxwvvusz|tsx{xw}�~~~~~~~~~~~… 1647 …wvwwwvwsrxywyytvyxxyunpstxyyzwvvvvwwwvvwxwwwwvwwvwwvutvwwyxwwwuvwwvwwvvur{{tsx{xv}�~~~~~~~~~~~… 1725 …wwwxwuxtpxyxywtvyxxxuoosuxyyzxvwwwwwwwwvwwwxwwwwwwwwutuxxyywvwwvwvvwvvwusz{tsx{xw}�~~~~~~~~~~~… 2686 …wwwxwwwwqszywwvuxwxyvrnpvyyyyzywvwwwwwwvvxwvwvwwvvwursvwvwxwwxwvwwvwwvvus{{tsx|xwx|}~~~~~~~~… 2737 …vvvwwwxvqtzywwvvxwyzvpnrwyyyyxxxvvwwwwwwwwxwvwwwwvvustvxwxyywwwwwvvwvvvtt|{tsx|yuw|}~~~~~~~~… 3449 …wvwwwwwuqvzxwxuvxxxywqmptyyyxwwvvwvwwvvwwwwwxwvwwwxvttuvwxyxwwwwwvvwwvwusx|tsx{xuz}}~}~… 3557 …wwwvwwwtqxzxwxuvyxyywpnrvyyyyxvwwwwwvvwwwwvvwwwwvvwvttvvvwxxwvwwwwvvwvvts{{tsx{xvy~}}~}~… 4225 …vwwwwvxvqvzxwwtvxwxxuopsuxyyywvwwvwvvvvwwwwwwwwwwvwvtsuvwxxxwwwvwwwvvvvury|tsx{xvy~}}~}~… [all …]
|
| /OK3568_Linux_fs/recovery/ |
| HD | rootfs.cpio.gz | 107070100A8AEB0000041ED0000000000000000000000116841B48100000000000000FD0000000200000000000000000000000200000000.07070100A8B07C000081A40000000000000000000000016841263500000000000000FD0000000200000000000000000000000900000000.gitkeep07070100A8B07D000081A40000000000000000000000016841263500000000000000FD0000000200000000000000000000000B00000000.skip_fsck07070100A8AEB10000A1FF0000000000000000000000016841B0B600000007000000FD0000000200000000000000000000000400000000binusr/bin07070100A8B07E000081A400000000000000000000000168412635000001CC000000FD0000000200000000000000000000001100000000busybox. ... |