Re: 4.14.18-rt15 Intel Spectre v2 broken microcode detected

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sat, 10 Feb 2018 16:00:14 +0100
Ralf Mardorf <ralf.mardorf@xxxxxxxxxxxxx> wrote:

> cat /sys/devices/system/cpu/vulnerabilities/* Mitigation: PTI
> Mitigation: __user pointer sanitization
> Mitigation: Full generic retpoline
> 
> ...means that they are enabled?

Yes, how well they protect the system is of course another question,
and I'm not 100% sure where the Intel ucode fits in all this.  But it
seems fairly clear that Intel dropped the ball on all of this including
firmware updates...

-- 

   Joakim



[Index of Archives]     [LM Sensors]     [Linux Sound]     [ALSA Users]     [ALSA Devel]     [Linux Audio Users]     [Linux Media]     [Kernel]     [Gimp]     [Yosemite News]     [Linux Media]

  Powered by Linux