On 10/8/23 06:34, Neil Bothwick wrote:
On Sat, 7 Oct 2023 12:13:58 -0400, Valmor F. de Almeida wrote:

2) make oldconfig in the new kernel directory for linux-6.1.53-gentoo-r1

• Mitigations for speculative execution vulnerabilities
*
Mitigations for speculative execution vulnerabilities
(SPECULATION_MITIGATIONS) [Y/n/?] y
    Remove the kernel mapping in user mode (PAGE_TABLE_ISOLATION)
[Y/n/?] y Avoid speculative indirect branches in kernel (RETPOLINE)
[Y/n/?] y Enable return-thunks (RETHUNK) [Y/n/?] y
        Enable UNRET on kernel entry (CPU_UNRET_ENTRY) [Y/n/?] y
    Enable IBPB on kernel entry (CPU_IBPB_ENTRY) [Y/n/?] y
    Enable IBRS on kernel entry (CPU_IBRS_ENTRY) [Y/n/?] y

Up to here default is picked automatically; I don't have a choice.

Those are settings you already have in your existing confid, shown to
give context to the following NEW settings.

You can change them, but with make config, not oldconfig.



After some distractions...
For the record. This problem solved itself with the 6.1.57-gentoo kernel. Just used the config from 6.1.41-gentoo in make oldconfig.
Thanks for the help.
--
Valmor

Reply via email to