Lines Matching full:enabled
27 To control the enabled attack vectors, see :ref:`cmdline`.
47 *user-to-kernel mitigations are enabled by default*
67 *user-to-user mitigations are enabled by default*
81 *guest-to-host mitigations are enabled by default if KVM support is present*
100 *guest-to-guest mitigations are enabled by default if KVM support is present*
114 If cross-thread mitigations are fully enabled ('auto,nosmt'), all mitigations
115 for cross-thread attacks will be enabled. SMT may be disabled depending on
118 If cross-thread mitigations are partially enabled ('auto'), mitigations for
119 cross-thread attacks will be enabled but SMT will not be disabled.
122 attacks will be enabled.
127 *cross-thread mitigations default to partially enabled*
148 'auto' All attack vectors enabled, partial cross-thread mitigations.
149 'auto,nosmt' All attack vectors enabled, full cross-thread mitigations.
199 attack vectors are enabled and assuming the CPU is vulnerable.
226 2 -- Disables SMT if cross-thread mitigations are fully enabled and the CPU
229 3 -- Disables SMT if cross-thread mitigations are fully enabled, the CPU is
234 different enabled attack-vector or a mitigation is explicitly selected via a