Searched refs:l1tf (Results 1 – 10 of 10) sorted by relevance
14 l1tf
176 :ref:`Documentation/admin-guide/hw-vuln//l1tf.rst <mitigation_control_kvm>`.234 :ref:`Documentation/admin-guide/hw-vuln/l1tf.rst <smt_control>`.303 See :ref:`Documentation/admin-guide/hw-vuln//l1tf.rst <default_mitigations>`.
64 document: :ref:`Documentation/admin-guide/hw-vuln/l1tf.rst <smt_control>`.
126 /sys/devices/system/cpu/vulnerabilities/l1tf344 SMT control is also possible at boot time via the l1tf kernel command368 time with the option "l1tf=". The valid arguments for this option are:444 The default is 'cond'. If 'l1tf=full,force' is given on the kernel command538 parameters 'nosmt', 'l1tf', 'kvm-intel.vmentry_l1d_flush' and at run
610 CPU_SHOW_VULN_FALLBACK(l1tf);630 static DEVICE_ATTR(l1tf, 0444, cpu_show_l1tf, NULL);
231 static int __vmx_setup_l1d_flush(enum vmx_l1d_flush_state l1tf) in __vmx_setup_l1d_flush() argument252 if (l1tf == VMENTER_L1D_FLUSH_AUTO) { in __vmx_setup_l1d_flush()255 l1tf = VMENTER_L1D_FLUSH_NEVER; in __vmx_setup_l1d_flush()261 l1tf = VMENTER_L1D_FLUSH_COND; in __vmx_setup_l1d_flush()265 l1tf = VMENTER_L1D_FLUSH_ALWAYS; in __vmx_setup_l1d_flush()269 l1tf = VMENTER_L1D_FLUSH_ALWAYS; in __vmx_setup_l1d_flush()272 if (l1tf != VMENTER_L1D_FLUSH_NEVER && !vmx_l1d_flush_pages && in __vmx_setup_l1d_flush()294 l1tf_vmx_mitigation = l1tf; in __vmx_setup_l1d_flush()296 if (l1tf != VMENTER_L1D_FLUSH_NEVER) in __vmx_setup_l1d_flush()301 if (l1tf == VMENTER_L1D_FLUSH_COND) in __vmx_setup_l1d_flush()[all …]
576 /sys/devices/system/cpu/vulnerabilities/l1tf
13 admin-guide/l1tf admin-guide/hw-vuln/l1tf
3357 l1tf= [X86,EARLY] Control mitigation of the L1TF vulnerability on3420 For details see: Documentation/admin-guide/hw-vuln/l1tf.rst4097 l1tf=off [X86]4136 Equivalent to: l1tf=flush,nosmt [X86]
2638 See <file:Documentation/admin-guide/hw-vuln/l1tf.rst