On Thursday, 26 April 2018 11:43:23 BST Adam Carter wrote: > On Thu, Apr 26, 2018 at 8:28 PM, Peter Humphrey <pe...@prh.myzen.co.uk> > > wrote: > > On Thursday, 26 April 2018 11:13:12 BST Adam Carter wrote: > > > Does grep . /sys/devices/system/cpu/vulnerabilities/* find anything? > > > > # grep . /sys/devices/system/cpu/vulnerabilities/* > > /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI > > /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user > > pointer sanitization > > /sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable: Minimal > > generic ASM retpoline, IBPB, IBRS_FW > > FWIW on my Intel box @4.16.3 > > /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI > /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user > pointer sanitization > /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic > retpoline, IBPB, IBRS_FW
Hmm ... why is my Intel system missing 'IBPB' & 'IBRS_FW' ? $ grep . /sys/devices/system/cpu/vulnerabilities/* /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline Are there some kernel options I should have selected manually? -- Regards, Mick
signature.asc
Description: This is a digitally signed message part.