You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Firmware status: Show if Indirect Branch Restricted Speculation (IBRS) is
376
391
used to protect against Spectre variant 2 attacks when calling firmware (x86 only).
@@ -584,12 +599,13 @@ kernel command line.
584
599
585
600
Specific mitigations can also be selected manually:
586
601
587
-
retpoline
588
-
replace indirect branches
589
-
retpoline,generic
590
-
google's original retpoline
591
-
retpoline,amd
592
-
AMD-specific minimal thunk
602
+
retpoline auto pick between generic,lfence
603
+
retpoline,generic Retpolines
604
+
retpoline,lfence LFENCE; indirect branch
605
+
retpoline,amd alias for retpoline,lfence
606
+
eibrs enhanced IBRS
607
+
eibrs,retpoline enhanced IBRS + Retpolines
608
+
eibrs,lfence enhanced IBRS + LFENCE
593
609
594
610
Not specifying this option is equivalent to
595
611
spectre_v2=auto.
@@ -730,7 +746,7 @@ AMD white papers:
730
746
731
747
.. _spec_ref6:
732
748
733
-
[6] `Software techniques for managing speculation on AMD processors <https://developer.amd.com/wp-content/resources/90343-B_SoftwareTechniquesforManagingSpeculation_WP_7-18Update_FNL.pdf>`_.
749
+
[6] `Software techniques for managing speculation on AMD processors <https://developer.amd.com/wp-content/resources/Managing-Speculation-on-AMD-Processors.pdf>`_.
0 commit comments