€•Ø]Œsphinx.addnodes”Œdocument”“”)”}”(Œ rawsource”Œ”Œchildren”]”(Œ translations”Œ LanguagesNode”“”)”}”(hhh]”(hŒ pending_xref”“”)”}”(hhh]”Œdocutils.nodes”ŒText”“”ŒChinese (Simplified)”…””}”Œparent”hsbaŒ attributes”}”(Œids”]”Œclasses”]”Œnames”]”Œdupnames”]”Œbackrefs”]”Œ refdomain”Œstd”Œreftype”Œdoc”Œ reftarget”Œhjh²hubhÞ)”}”(hŒóIf used, these options will disable AVX use by turning off XSAVE YMM support. However, the processor will still enumerate AVX support. Userspace that does not follow proper AVX enumeration to check both AVX *and* XSAVE YMM support will break.”h]”(hŒÐIf used, these options will disable AVX use by turning off XSAVE YMM support. However, the processor will still enumerate AVX support. Userspace that does not follow proper AVX enumeration to check both AVX ”…””}”(hjBh²hh³Nh´NubhŒemphasis”“”)”}”(hŒ*and*”h]”hŒand”…””}”(hjLh²hh³Nh´Nubah}”(h]”h ]”h"]”h$]”h&]”uh1jJhjBubhŒ XSAVE YMM support will break.”…””}”(hjBh²hh³Nh´Nubeh}”(h]”h ]”h"]”h$]”h&]”uh1hÝh³hÇh´KBhjh²hubeh}”(h]”Œmitigation-mechanism”ah ]”h"]”Œmitigation mechanism”ah$]”h&]”uh1hÈhhÊh²hh³hÇh´K/ubhÉ)”}”(hhh]”(hÎ)”}”(hŒ-Mitigation control on the kernel command line”h]”hŒ-Mitigation control on the kernel command line”…””}”(hjoh²hh³Nh´Nubah}”(h]”h ]”h"]”h$]”h&]”uh1hÍhjlh²hh³hÇh´KHubhÞ)”}”(hXxThe mitigation can be disabled by setting "gather_data_sampling=off" or "mitigations=off" on the kernel command line. Not specifying either will default to the mitigation being enabled. Specifying "gather_data_sampling=force" will use the microcode mitigation when available or disable AVX on affected systems where the microcode hasn't been updated to include the mitigation.”h]”hX†The mitigation can be disabled by setting “gather_data_sampling=off†or “mitigations=off†on the kernel command line. Not specifying either will default to the mitigation being enabled. Specifying “gather_data_sampling=force†will use the microcode mitigation when available or disable AVX on affected systems where the microcode hasn’t been updated to include the mitigation.”…””}”(hj}h²hh³Nh´Nubah}”(h]”h ]”h"]”h$]”h&]”uh1hÝh³hÇh´KIhjlh²hubeh}”(h]”Œ-mitigation-control-on-the-kernel-command-line”ah ]”h"]”Œ-mitigation control on the kernel command line”ah$]”h&]”uh1hÈhhÊh²hh³hÇh´KHubhÉ)”}”(hhh]”(hÎ)”}”(hŒGDS System Information”h]”hŒGDS System Information”…””}”(hj–h²hh³Nh´Nubah}”(h]”h ]”h"]”h$]”h&]”uh1hÍhj“h²hh³hÇh´KPubhÞ)”}”(hŒ}The kernel provides vulnerability status information through sysfs. For GDS this can be accessed by the following sysfs file:”h]”hŒ}The kernel provides vulnerability status information through sysfs. For GDS this can be accessed by the following sysfs file:”…””}”(hj¤h²hh³Nh´Nubah}”(h]”h ]”h"]”h$]”h&]”uh1hÝh³hÇh´KQhj“h²hubhÞ)”}”(hŒ