| /OK3568_Linux_fs/kernel/Documentation/admin-guide/hw-vuln/ |
| H A D | mds.rst | 1 MDS - Microarchitectural Data Sampling 23 Whether a processor is affected or not can be read out from the MDS 26 Not all processors are affected by all variants of MDS, but the mitigation 33 The following CVE entries are related to the MDS vulnerability: 60 Deeper technical information is available in the MDS specific x86 67 Attacks against the MDS vulnerabilities can be mounted from malicious non 71 Contrary to other speculation based vulnerabilities the MDS vulnerability 87 MDS system information 90 The Linux kernel provides a sysfs interface to enumerate the current MDS 156 The mitigation for MDS clears the affected CPU buffers on return to user [all …]
|
| H A D | processor_mmio_stale_data.rst | 16 are similar to those used to mitigate Microarchitectural Data Sampling (MDS) or 131 enumerate MDS_NO (meaning they are affected by MDS) but that do 152 Like MDS, all variants of Processor MMIO Stale Data vulnerabilities have the 160 Kernel reuses the MDS function to invoke the buffer clearing: 164 On MDS affected CPUs, the kernel already invokes CPU buffer clear on 168 For CPUs not affected by MDS or TAA, mitigation is needed only for the attacker 177 Same mitigation as MDS when affected by MDS/TAA, otherwise no mitigation 188 Same mitigation as MDS when processor is also affected by MDS/TAA, otherwise 190 MDS/TAA, guest without MMIO access cannot extract secrets using Processor MMIO
|
| H A D | tsx_async_abort.rst | 16 (bit 5) is 0 in the IA32_ARCH_CAPABILITIES MSR, the existing MDS mitigations 75 As for MDS, the attacker has no control over the memory addresses that can 165 systems which are MDS-affected and deploy MDS mitigation, 176 processors that are affected by both TAA and MDS, specifying just 191 not vulnerable to MDS, i.e., have MSR_IA32_ARCH_CAPABILITIES.MDS_NO=1 239 0 1 0 MDS and TAA mitigated via VERW 240 1 1 0 MDS fixed, TAA vulnerable if TSX enabled 243 1 X 1 MDS fixed, TAA can be mitigated by
|
| H A D | special-register-buffer-data-sampling.rst | 6 SRBDS is a hardware vulnerability that allows MDS :doc:`mds` techniques to 14 to MDS attacks. 58 executed on another core or sibling thread using MDS techniques.
|
| /OK3568_Linux_fs/kernel/arch/powerpc/platforms/83xx/ |
| H A D | Kconfig | 29 bool "Freescale MPC832x MDS" 33 This option enables support for the MPC832x MDS evaluation board. 43 bool "Freescale MPC834x MDS" 47 This option enables support for the MPC 834x MDS evaluation board. 49 Be aware that PCI buses can only function when MDS board is plugged 65 bool "Freescale MPC836x MDS" 68 This option enables support for the MPC836x MDS Processor Board. 80 bool "Freescale MPC837x MDS" 84 This option enables support for the MPC837x MDS Processor Board.
|
| /OK3568_Linux_fs/kernel/Documentation/x86/ |
| H A D | tsx_async_abort.rst | 12 Intel processors similar to Microachitectural Data Sampling (MDS). In this 17 the same uarch data structures as in MDS, with same scope of exposure i.e. 29 b) Clear CPU buffers - similar to MDS, clearing the CPU buffers mitigates this 69 …0 0 0 HW default Yes Same as MDS Same as MDS 84 … 0 0 0 HW default Yes Same as MDS Same as MDS 87 … 0 1 1 Enabled Yes None Same as MDS 99 …0 0 0 HW default Yes Same as MDS Same as MDS
|
| H A D | mds.rst | 1 Microarchitectural Data Sampling (MDS) mitigation 9 Microarchitectural Data Sampling (MDS) is a family of side channel attacks 52 needed for exploiting MDS requires: 166 and not by any other MDS variant. The other MDS variants cannot be
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/nfs/ |
| H A D | pnfs-scsi-server.rst | 7 With pNFS SCSI layouts, the NFS server acts as Metadata Server (MDS) for pNFS, 15 addition to the MDS. As of now the file system needs to sit directly on the 16 exported LUN, striping or concatenation of LUNs on the MDS and clients
|
| H A D | pnfs-block-server.rst | 6 case the NFS server acts as Metadata Server (MDS) for pNFS, which in addition 14 to the clients in addition to the MDS. As of now the file system needs to 16 volumes on the MDS and clients is not supported yet.
|
| /OK3568_Linux_fs/kernel/arch/powerpc/platforms/85xx/ |
| H A D | Kconfig | 74 bool "Freescale MPC85xx MDS" 80 This option enables support for the MPC85xx MDS board
|
| /OK3568_Linux_fs/kernel/arch/powerpc/boot/dts/fsl/ |
| H A D | p1021mds.dts | 3 * P1021 MDS Device Tree Source
|
| H A D | mpc8568mds.dts | 3 * MPC8568E MDS Device Tree Source
|
| H A D | mpc8569mds.dts | 3 * MPC8569E MDS Device Tree Source
|
| /OK3568_Linux_fs/kernel/Documentation/filesystems/ |
| H A D | ceph.rst | 175 After reconnect, file locks become stale because the MDS loses track
|
| /OK3568_Linux_fs/kernel/arch/powerpc/boot/dts/ |
| H A D | mpc8378_mds.dts | 3 * MPC8378E MDS Device Tree Source
|
| H A D | mpc832x_mds.dts | 8 * To enable external serial I/O on a Freescale MPC 8323 SYS/MDS board, do
|
| H A D | mpc8377_mds.dts | 3 * MPC8377E MDS Device Tree Source
|
| H A D | mpc834x_mds.dts | 3 * MPC8349E MDS Device Tree Source
|
| H A D | mpc8379_mds.dts | 3 * MPC8379E MDS Device Tree Source
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-daemons/opensaf/opensaf/ |
| H A D | 0001-Fix-build-with-fno-common.patch | 66 /* EDA Default MDS timeout value */
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/ |
| H A D | kernel-parameters.txt | 2715 Sampling (MDS) vulnerability. 2726 This parameter controls the MDS mitigation. The 2729 full - Enable MDS mitigation on vulnerable CPUs 2730 full,nosmt - Enable MDS mitigation and disable 2732 off - Unconditionally disable MDS mitigation 2976 the same CPU buffers as affected by MDS and TAA. 2977 Therefore, similar to MDS and TAA, the mitigation 2990 On MDS or TAA affected machines, 2992 MDS or TAA mitigation as these vulnerabilities are 5277 Certain CPUs are vulnerable to an MDS-like [all …]
|
| /OK3568_Linux_fs/kernel/arch/powerpc/xmon/ |
| H A D | ppc-opc.c | 2487 #define MDS(op, xop, rc) (OP (op) | ((((unsigned long)(xop)) & 0xf) << 1) | ((rc) & 1)) macro 2488 #define MDS_MASK MDS (0x3f, 0xf, 1) 4648 {"rotld", MDS(30,8,0), MDSMB_MASK, PPC64, PPCVLE, {RA, RS, RB}}, 4649 {"rldcl", MDS(30,8,0), MDS_MASK, PPC64, PPCVLE, {RA, RS, RB, MB6}}, 4650 {"rotld.", MDS(30,8,1), MDSMB_MASK, PPC64, PPCVLE, {RA, RS, RB}}, 4651 {"rldcl.", MDS(30,8,1), MDS_MASK, PPC64, PPCVLE, {RA, RS, RB, MB6}}, 4653 {"rldcr", MDS(30,9,0), MDS_MASK, PPC64, PPCVLE, {RA, RS, RB, ME6}}, 4654 {"rldcr.", MDS(30,9,1), MDS_MASK, PPC64, PPCVLE, {RA, RS, RB, ME6}},
|
| /OK3568_Linux_fs/recovery/ |
| HD | rootfs.cpio.gz | 107070100A8AEB0000041ED0000000000000000000000116841B48100000000000000FD0000000200000000000000000000000200000000.07070100A8B07C000081A40000000000000000000000016841263500000000000000FD0000000200000000000000000000000900000000.gitkeep07070100A8B07D000081A40000000000000000000000016841263500000000000000FD0000000200000000000000000000000B00000000.skip_fsck07070100A8AEB10000A1FF0000000000000000000000016841B0B600000007000000FD0000000200000000000000000000000400000000binusr/bin07070100A8B07E000081A400000000000000000000000168412635000001CC000000FD0000000200000000000000000000001100000000busybox. ... |