On Mon, 12 Feb 2018 11:13:57 +0000
isdtor <isd...@gmail.com> wrote:

> Does anyone know if Red Hat are working on backporting improved
> mitigation techniques and features from newer, 4.14.14+ kernels?
> $ grep . /sys/devices/system/cpu/vulnerabilities/*
> /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
> /sys/devices/system/cpu/vulnerabilities/spectre_v1:Vulnerable
> /sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable:
> Minimal generic ASM retpoline $ 

As it is Redhat has a more comprehensive set of fixes than your 4.14
example above.

For everyone (regardless of microcode etc.) you get PTI and some
additional LFENCE.

For CPUs with microcode support you also get IBRS (restrict speculation)
and IBPB (branch predict barrier).

My understanding is that today for CPUs without microcode support
(most/all since it was revoked) that means slightly less protection (no
retpoline). But for CPUs with support and for Skylake (limited
retpoline usefullness) IBRS+IBPB gives better coverage.

You can view this status in /sys/kernel/debug/x86 (with mounted

The above goes for C6/C7 while Fedora has upstream vanilla stuff.

CentOS mailing list

Reply via email to