Lines Matching full:smt
126 'SMT vulnerable' SMT is enabled
127 'SMT mitigated' SMT is enabled and mitigated
128 'SMT disabled' SMT is disabled
129 'SMT Host state unknown' Kernel runs in a VM, Host SMT state unknown
151 If SMT is enabled it also clears the buffers on idle entry when the CPU
156 transition mitigations are sufficient and SMT is not affected.
218 either disabling SMT is not required for full protection.
222 SMT control
227 disable SMT for full protection. These are most of the affected CPUs; the
230 Disabling SMT can have a significant performance impact, but the impact
249 protected as well if SMT is enabled.
251 It does not automatically disable SMT.
253 full,nosmt The same as mds=full, with SMT disabled on vulnerable
288 If the MDS mitigation is enabled and SMT is disabled, guest to host and
300 The kernel does not by default enforce the disabling of SMT, which leaves
301 SMT systems vulnerable when running untrusted code. The same rationale as