Those articles are all well and good, but the direction that upstream
took for enabling/disabling ibpb and ibrs are available in
Documentation/admin-guide/kernel-parameters.txt. The RHEL sysfs
mechanisms do not exist in the mainline kernels.
Here's the relevant portion of the admin guide.
"
On 10/03/18 01:23, David Ranch wrote:
Thanks for the news!
Now the next big question, taking a kernel compile as the use case: does
anyone have any benchmarks on the built time pre and post BIOS, CPU
Instruction, and Compiler fixes say for a non-cutting edge CPU from Intel?
--David
> STA
Thanks for the news!
Now the next big question, taking a kernel compile as the use case: does
anyone have any benchmarks on the built time pre and post BIOS, CPU
Instruction, and Compiler fixes say for a non-cutting edge CPU from Intel?
--David
> STATUS: NOT VULNERABLE (Mitigation: Full ge
On 06/03/18 22:48, Phil Perry wrote:
On 18/01/18 20:57, Phil Perry wrote:
Putting it here so we don't need to keep repeating ourselves:
The latest elrepo kernels are now compiled with retpoline options
enabled.
At present, RHEL does NOT contain a retpoline-aware compiler so
mitigation 2 ab
There are different levels of Long-term
https://www.kernel.org/category/releases.html
4.4 is supported till 2022, 4.14. EOLs in 2020.
Dave.
On Wed, Mar 7, 2018 at 7:46 AM Robin P. Blanchard
wrote:
> On Tue, Mar 6, 2018 at 4:48 PM, Phil Perry wrote:
> > On 18/01/18 20:57, Phil Perry wrote:
> >
On Tue, Mar 6, 2018 at 4:48 PM, Phil Perry wrote:
> On 18/01/18 20:57, Phil Perry wrote:
>>
>> On 10/01/18 20:36, Phil Perry wrote:
>>>
>>> On 10/01/18 20:06, Phil Perry wrote:
A vulnerability checker script:
https://raw.githubusercontent.com/speed47/spectre-melt
On 18/01/18 20:57, Phil Perry wrote:
On 10/01/18 20:36, Phil Perry wrote:
On 10/01/18 20:06, Phil Perry wrote:
A vulnerability checker script:
https://raw.githubusercontent.com/speed47/spectre-meltdown-checker/master/spectre-meltdown-checker.sh
CVE-2017-5715 [branch target injectio
On 10/01/18 20:36, Phil Perry wrote:
On 10/01/18 20:06, Phil Perry wrote:
A vulnerability checker script:
https://raw.githubusercontent.com/speed47/spectre-meltdown-checker/master/spectre-meltdown-checker.sh
CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
* Mitigatio
> Am 10.01.2018 um 20:59 schrieb Phil Perry :
>
> On 10/01/18 19:55, Phil Perry wrote:
>> I'm starting this thread as somewhere to collect latest information on
>> Meltdown and Spectre as relating to the elrepo kernel-lt and kernel-ml
>> kernels.
>> Please feel free to post to this thread, ask
Thanks Phil,
Oh the irony,
Intel's dismissive stance of "Contact your OS vendor" which has been more than
a little frustrating given it was their massive mess-up, then seeing this
pushed back to "Contact your hardware vendor".
Can't help but laugh (and cry) a little on the inside.
--
Sam McLe
On 10/01/18 20:21, Phil Perry wrote:
On 10/01/18 19:55, Phil Perry wrote:
I'm starting this thread as somewhere to collect latest information on
Meltdown and Spectre as relating to the elrepo kernel-lt and kernel-ml
kernels.
Please feel free to post to this thread, ask questions and share
in
Linus Torvalds has just released linux-4.15-rc8 and I reproduce his
announcement --
[quote]
Ok, another week has gone by, and here's the promised rc8.
I'm still hoping that this will be the last rc, despite all the
Meltdown and Spectre hoopla. But we will just have to see, it
obviously requires t
For those who do not follow the Linux Kernel Mailing List I quote a
post from Thomas Gleixner, dated Friday 12th January --
[quote]
Folks!
After 10 days of frenzy following the disclosure of the mess, I'm at a
point where I think that the current set which we have in Linus tree and
the pending pa
On 10/01/18 22:10, Sam McLeod wrote:
On #Elrepo IRC at the moment, interesting to see my CPU + latest intel
microcode download + latest elrepo kernel-ml is significantly more
at-risk still:
Yes, it would appear so. I'll do my best to try to explain below.
~ [0] # uname -a
Linux nas 4.14.1
On #Elrepo IRC at the moment, interesting to see my CPU + latest intel
microcode download + latest elrepo kernel-ml is significantly more at-risk
still:
~ [0] # uname -a
Linux nas 4.14.12-1.el7.elrepo.x86_64 #1 SMP Fri Jan 5 13:28:56 EST 2018 x86_64
x86_64 x86_64 GNU/Linux
~ [0] # dmesg | gr
On 10/01/18 20:06, Phil Perry wrote:
A vulnerability checker script:
https://raw.githubusercontent.com/speed47/spectre-meltdown-checker/master/spectre-meltdown-checker.sh
On a fully updated RHEL7 system (kernel-3.10.0-693.11.6.el7.x86_64), and
after applying the latest microcode update
On 10/01/18 20:21, Phil Perry wrote:
On 10/01/18 19:55, Phil Perry wrote:
I'm starting this thread as somewhere to collect latest information on
Meltdown and Spectre as relating to the elrepo kernel-lt and kernel-ml
kernels.
Please feel free to post to this thread, ask questions and share
in
On 10/01/18 19:55, Phil Perry wrote:
I'm starting this thread as somewhere to collect latest information on
Meltdown and Spectre as relating to the elrepo kernel-lt and kernel-ml
kernels.
Please feel free to post to this thread, ask questions and share
information. This is the place to do it.
On 10/01/18 19:55, Phil Perry wrote:
I'm starting this thread as somewhere to collect latest information on
Meltdown and Spectre as relating to the elrepo kernel-lt and kernel-ml
kernels.
Please feel free to post to this thread, ask questions and share
information. This is the place to do it.
On 10/01/18 19:55, Phil Perry wrote:
I'm starting this thread as somewhere to collect latest information on
Meltdown and Spectre as relating to the elrepo kernel-lt and kernel-ml
kernels.
Please feel free to post to this thread, ask questions and share
information. This is the place to do it.
20 matches
Mail list logo