Home
last modified time | relevance | path

Searched refs:l1tf (Results 1 – 6 of 6) sorted by relevance

/Linux-v4.19/Documentation/admin-guide/
Dindex.rst27 l1tf
Dl1tf.rst126 /sys/devices/system/cpu/vulnerabilities/l1tf
344 SMT control is also possible at boot time via the l1tf kernel command
368 time with the option "l1tf=". The valid arguments for this option are:
441 The default is 'cond'. If 'l1tf=full,force' is given on the kernel command
534 parameters 'nosmt', 'l1tf', 'kvm-intel.vmentry_l1d_flush' and at run
Dkernel-parameters.txt2015 l1tf= [X86] Control mitigation of the L1TF vulnerability on
2075 For details see: Documentation/admin-guide/l1tf.rst
/Linux-v4.19/Documentation/ABI/testing/
Dsysfs-devices-system-cpu479 /sys/devices/system/cpu/vulnerabilities/l1tf
492 Details about the l1tf file can be found in
493 Documentation/admin-guide/l1tf.rst
/Linux-v4.19/drivers/base/
Dcpu.c553 static DEVICE_ATTR(l1tf, 0444, cpu_show_l1tf, NULL);
/Linux-v4.19/arch/x86/kvm/
Dvmx.c213 static int vmx_setup_l1d_flush(enum vmx_l1d_flush_state l1tf) in vmx_setup_l1d_flush() argument
234 if (l1tf == VMENTER_L1D_FLUSH_AUTO) { in vmx_setup_l1d_flush()
237 l1tf = VMENTER_L1D_FLUSH_NEVER; in vmx_setup_l1d_flush()
242 l1tf = VMENTER_L1D_FLUSH_COND; in vmx_setup_l1d_flush()
246 l1tf = VMENTER_L1D_FLUSH_ALWAYS; in vmx_setup_l1d_flush()
250 l1tf = VMENTER_L1D_FLUSH_ALWAYS; in vmx_setup_l1d_flush()
253 if (l1tf != VMENTER_L1D_FLUSH_NEVER && !vmx_l1d_flush_pages && in vmx_setup_l1d_flush()
271 l1tf_vmx_mitigation = l1tf; in vmx_setup_l1d_flush()
273 if (l1tf != VMENTER_L1D_FLUSH_NEVER) in vmx_setup_l1d_flush()
278 if (l1tf == VMENTER_L1D_FLUSH_COND) in vmx_setup_l1d_flush()
[all …]