Lines Matching +full:side +full:- +full:effect

1 .. SPDX-License-Identifier: GPL-2.0
3 TAA - TSX Asynchronous Abort
11 -------------------
23 ------------
28 CVE-2019-11135 TAA TSX Asynchronous Abort (TAA) condition on some
31 information disclosure via a side channel with
36 -------
43 hardware transactional memory support to improve performance of multi-threaded
55 operations. This can be then used to infer the value via a cache side channel
58 Because the buffers are potentially shared between Hyper-Threads cross
59 Hyper-Thread attacks are possible.
70 ----------------
87 -----------------------
96 .. list-table::
98 * - 'Vulnerable'
99- The CPU is affected by this vulnerability and the microcode and kernel mitigation are not applie…
100 * - 'Vulnerable: Clear CPU buffers attempted, no microcode'
101 - The processor is vulnerable but microcode is not updated. The
112 protection takes effect; otherwise a few CPU cycles are wasted
114 * - 'Mitigation: Clear CPU buffers'
115 - The microcode has been updated to clear the buffers. TSX is still enabled.
116 * - 'Mitigation: TSX disabled'
117 - TSX is disabled.
118 * - 'Not affected'
119 - The CPU is not affected by this issue.
122 --------------------
146 ---------------------------------------------
158 systems which are MDS-affected and deploy MDS mitigation,
160 systems will have no effect.
165 CPU is not vulnerable to cross-thread TAA attacks.
171 effect as the same mitigation is used for both vulnerabilities.
183 Note that this option takes effect only on newer CPUs which are
193 several previous speculation-related CVEs, and so there may be
207 buffers. Cross-thread attacks are still
209 tsx=on tsx_async_abort=full,nosmt As above, cross-thread attacks on SMT
222 "tsx" command line argument has no effect.
241 --------------------------
266 -------------------
270 - Deploy TSX disable mitigation (tsx_async_abort=full tsx=off).