Lines Matching +full:tlb +full:- +full:split

6 instruction fetch hits multiple entries in the instruction TLB. This can
13 -------------------
18 - non-Intel processors
20 - Some Atoms (Airmont, Bonnell, Goldmont, GoldmontPlus, Saltwell, Silvermont)
22 - Intel processors that have the PSCHANGE_MC_NO bit set in the
27 ------------
32 CVE-2018-12207 Machine Check Error Avoidance on Page Size Change
37 -------
42 the illusion of a very large memory for processors. This virtual space is split
47 processors include a structure, called TLB, that caches recent translations.
56 cause a machine-check error which can result in a system hang or shutdown.
60 ----------------
67 --------------------------------
77 .. list-table::
79 * - Not affected
80 - The processor is not vulnerable.
81 * - KVM: Mitigation: Split huge pages
82 - Software changes mitigate this issue.
83 * - KVM: Mitigation: VMX unsupported
84 - KVM is not vulnerable because Virtual Machine Extensions (VMX) is not supported.
85 * - KVM: Mitigation: VMX disabled
86 - KVM is not vulnerable because Virtual Machine Extensions (VMX) is disabled.
87 * - KVM: Vulnerable
88 - The processor is vulnerable, but no mitigation enabled
92 --------------------------------
105 -------------------------
108 non-executable pages. This forces all iTLB entries to be 4K, and removes
112 as non-executable. If the guest attempts to execute in one of those pages,
115 If EPT is disabled or not available on the host, KVM is in control of TLB
119 (non-nested) page tables. For simplicity, KVM will make large pages
120 non-executable in all shadow paging modes.
122 Mitigation control on the kernel command line and KVM - module parameter
123 ------------------------------------------------------------------------
126 non-executable can be controlled with a module parameter "nx_huge_pages=".
134 non-executable huge pages in Linux kernel KVM module. All huge
135 pages in the EPT are marked as non-executable.
148 --------------------------