Christian Gelinek 写道:
Spectre v2: Vulnerable: eIBRS with unprivileged eBPF
[…]
Spectre v2: Mitigation; Enhanced IBRS, IBPB conditional, RSB filling, PBRSB-eIBRS SW sequence
Does $ echo 1 | sudo tee /proc/sys/kernel/unprivileged_bpf_disabled change this? What does Debian's kconfig list for CONFIG_BPF_UNPRIV_DEFAULT_OFF?Guix has it *unset* (which means default *on*) which means that unprivileged_bpf_disabled is 0 (which means *enabled*) because Linux is a hot mess and nobody cares.
Kind regards, T G-R
signature.asc
Description: PGP signature
