Lines Matching full:smt
116 'SMT vulnerable' SMT is enabled
117 'SMT mitigated' SMT is enabled and mitigated
118 'SMT disabled' SMT is disabled
119 'SMT Host state unknown' Kernel runs in a VM, Host SMT state unknown
159 If SMT is enabled it also clears the buffers on idle entry when the CPU
164 transition mitigations are sufficient and SMT is not affected.
226 either disabling SMT is not required for full protection.
230 SMT control
235 disable SMT for full protection. These are most of the affected CPUs; the
238 Disabling SMT can have a significant performance impact, but the impact
257 protected as well if SMT is enabled.
259 It does not automatically disable SMT.
261 full,nosmt The same as mds=full, with SMT disabled on vulnerable
296 If the MDS mitigation is enabled and SMT is disabled, guest to host and
308 The kernel does not by default enforce the disabling of SMT, which leaves
309 SMT systems vulnerable when running untrusted code. The same rationale as