
--query, -q
Query the configuration of the Variant #2/Spectre and Variant #3/
Meltdown tunables for system reboots, as well as on the running
system.
--set, -s enabled
--set, -s disabled
--set, -s [ v2=<v2-mode> ] [ v3=<v3-mode> ]
Enables and disables Variant #2/Spectre ("v2") and/or Variant #3/
Meltdown ("v3") patches.
This immediately reboots the server. Applications on the server are
not managed by this script. Ensure that any applications are
disabled, as required, prior to changing kernel settings with this
script.
If "enabled" is specified, then both v2 and v3 are enabled,
with v2 set to kernel default behavior. If "disabled" is specified,
then both v2 and v3 are disabled. Otherwise, kernel patches
are enabled or disbled as per the specified "v2" and/or "v3"
arguments. If a "v2" or "v3" argument is not specified, the current
system value for that item is retained.
v2-mode:
disabled
Variant #2/Spectre is disabled.
default
The kernel decides how to set tunables for Variant #2/
Spectre, based on the processor architecture. Note that for
architectures prior to Skylake, the kernel selects
retpoline ("return trampoline") over ibrs.
kernel
Use "ibrs" (i.e., kernel space only).
user
Use "ibrs_user" (i.e., userland only).
both
Use "ibrs_always" (i.e., kernel space and userland).
user+retp
Use "retpoline,ibrs_user".
v3-mode:
disabled
Variant #3/Meltdown is disabled.
enabled
Variant #3/Meltdown is enabled.
The following two commands are equivalent:
sys smcvemgt enabled
sys smcvemgt v2=default v3=enabled
The following two commands are equivalent:
sys smcvemgt disabled
sys smcvemgt v2=disabled v3=disabled
--history
Planning and preinstallation
October 2018
Deploying the Avaya Aura
®
Web Gateway
36