You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Firmware status: Show if Indirect Branch Restricted Speculation (IBRS) is
376
391
used to protect against Spectre variant 2 attacks when calling firmware (x86 only).
@@ -583,12 +598,13 @@ kernel command line.
583
598
584
599
Specific mitigations can also be selected manually:
585
600
586
-
retpoline
587
-
replace indirect branches
588
-
retpoline,generic
589
-
google's original retpoline
590
-
retpoline,amd
591
-
AMD-specific minimal thunk
601
+
retpoline auto pick between generic,lfence
602
+
retpoline,generic Retpolines
603
+
retpoline,lfence LFENCE; indirect branch
604
+
retpoline,amd alias for retpoline,lfence
605
+
eibrs enhanced IBRS
606
+
eibrs,retpoline enhanced IBRS + Retpolines
607
+
eibrs,lfence enhanced IBRS + LFENCE
592
608
593
609
Not specifying this option is equivalent to
594
610
spectre_v2=auto.
@@ -599,7 +615,7 @@ kernel command line.
599
615
spectre_v2=off. Spectre variant 1 mitigations
600
616
cannot be disabled.
601
617
602
-
For spectre_v2_user see :doc:`/admin-guide/kernel-parameters`.
618
+
For spectre_v2_user see Documentation/admin-guide/kernel-parameters.txt
603
619
604
620
Mitigation selection guide
605
621
--------------------------
@@ -681,7 +697,7 @@ AMD white papers:
681
697
682
698
.. _spec_ref6:
683
699
684
-
[6] `Software techniques for managing speculation on AMD processors <https://developer.amd.com/wp-content/resources/90343-B_SoftwareTechniquesforManagingSpeculation_WP_7-18Update_FNL.pdf>`_.
700
+
[6] `Software techniques for managing speculation on AMD processors <https://developer.amd.com/wp-content/resources/Managing-Speculation-on-AMD-Processors.pdf>`_.
0 commit comments