Lines Matching +full:non +full:- +full:linear

13 -------------------
18 - non-Intel processors
20 - Some Atoms (Airmont, Bonnell, Goldmont, GoldmontPlus, Saltwell, Silvermont)
22 - Intel processors that have the PSCHANGE_MC_NO bit set in the
27 ------------
32 CVE-2018-12207 Machine Check Error Avoidance on Page Size Change
37 -------
50 Under this errata, instructions are fetched from a linear address translated
52 paging structure so that the same linear address using large page size (2 MB, 4
55 the linear address, a code fetch that happens on the same linear address may
56 cause a machine-check error which can result in a system hang or shutdown.
60 ----------------
67 --------------------------------
77 .. list-table::
79 * - Not affected
80 - The processor is not vulnerable.
81 * - KVM: Mitigation: Split huge pages
82 - Software changes mitigate this issue.
83 * - KVM: Mitigation: VMX unsupported
84 - KVM is not vulnerable because Virtual Machine Extensions (VMX) is not supported.
85 * - KVM: Mitigation: VMX disabled
86 - KVM is not vulnerable because Virtual Machine Extensions (VMX) is disabled.
87 * - KVM: Vulnerable
88 - The processor is vulnerable, but no mitigation enabled
92 --------------------------------
105 -------------------------
108 non-executable pages. This forces all iTLB entries to be 4K, and removes
112 as non-executable. If the guest attempts to execute in one of those pages,
119 (non-nested) page tables. For simplicity, KVM will make large pages
120 non-executable in all shadow paging modes.
122 Mitigation control on the kernel command line and KVM - module parameter
123 ------------------------------------------------------------------------
126 non-executable can be controlled with a module parameter "nx_huge_pages=".
134 non-executable huge pages in Linux kernel KVM module. All huge
135 pages in the EPT are marked as non-executable.
148 --------------------------