Home
last modified time | relevance | path

Searched refs:l1tf (Results 1 – 8 of 8) sorted by relevance

/openbmc/linux/Documentation/admin-guide/hw-vuln/
H A Dindex.rst13 l1tf
H A Dl1d_flush.rst64 document: :ref:`Documentation/admin-guide/hw-vuln/l1tf.rst <smt_control>`.
H A Dmds.rst184 :ref:`Documentation/admin-guide/hw-vuln//l1tf.rst <mitigation_control_kvm>`.
242 :ref:`Documentation/admin-guide/hw-vuln/l1tf.rst <smt_control>`.
311 See :ref:`Documentation/admin-guide/hw-vuln//l1tf.rst <default_mitigations>`.
H A Dl1tf.rst126 /sys/devices/system/cpu/vulnerabilities/l1tf
344 SMT control is also possible at boot time via the l1tf kernel command
368 time with the option "l1tf=". The valid arguments for this option are:
444 The default is 'cond'. If 'l1tf=full,force' is given on the kernel command
538 parameters 'nosmt', 'l1tf', 'kvm-intel.vmentry_l1d_flush' and at run
/openbmc/linux/drivers/base/
H A Dcpu.c559 CPU_SHOW_VULN_FALLBACK(l1tf);
574 static DEVICE_ATTR(l1tf, 0444, cpu_show_l1tf, NULL);
/openbmc/linux/arch/x86/kvm/vmx/
H A Dvmx.c263 l1tf = VMENTER_L1D_FLUSH_NEVER; in vmx_setup_l1d_flush()
268 l1tf = VMENTER_L1D_FLUSH_COND; in vmx_setup_l1d_flush()
272 l1tf = VMENTER_L1D_FLUSH_ALWAYS; in vmx_setup_l1d_flush()
276 l1tf = VMENTER_L1D_FLUSH_ALWAYS; in vmx_setup_l1d_flush()
301 l1tf_vmx_mitigation = l1tf; in vmx_setup_l1d_flush()
331 int l1tf, ret; in vmentry_l1d_flush_set() local
333 l1tf = vmentry_l1d_flush_parse(s); in vmentry_l1d_flush_set()
334 if (l1tf < 0) in vmentry_l1d_flush_set()
335 return l1tf; in vmentry_l1d_flush_set()
347 vmentry_l1d_flush_param = l1tf; in vmentry_l1d_flush_set()
[all …]
/openbmc/linux/Documentation/ABI/testing/
H A Dsysfs-devices-system-cpu518 /sys/devices/system/cpu/vulnerabilities/l1tf
/openbmc/linux/Documentation/admin-guide/
H A Dkernel-parameters.txt2726 l1tf= [X86] Control mitigation of the L1TF vulnerability on
2789 For details see: Documentation/admin-guide/hw-vuln/l1tf.rst
3339 l1tf=off [X86]
3375 Equivalent to: l1tf=flush,nosmt [X86]