|
From: | Tobias Geerinckx-Rice |
Subject: | Re: Intel i7-1165G7 vulnerable to Spectre v2 |
Date: | Wed, 01 Feb 2023 16:58:30 +0100 |
Christian Gelinek 写道:
Spectre v2: Vulnerable: eIBRS with unprivileged eBPF
[…]
Spectre v2: Mitigation; Enhanced IBRS, IBPB conditional, RSB filling, PBRSB-eIBRS SW sequence
Does $ echo 1 | sudo tee /proc/sys/kernel/unprivileged_bpf_disabled change this? What does Debian's kconfig list for CONFIG_BPF_UNPRIV_DEFAULT_OFF?Guix has it *unset* (which means default *on*) which means that unprivileged_bpf_disabled is 0 (which means *enabled*) because Linux is a hot mess and nobody cares.
Kind regards, T G-R
signature.asc
Description: PGP signature
[Prev in Thread] | Current Thread | [Next in Thread] |