From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 852BF1382C5 for ; Fri, 27 Apr 2018 05:43:16 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 91199E0931; Fri, 27 Apr 2018 05:43:08 +0000 (UTC) Received: from blaine.gmane.org (unknown [195.159.176.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 1F82EE08FA for ; Fri, 27 Apr 2018 05:43:08 +0000 (UTC) Received: from list by blaine.gmane.org with local (Exim 4.84_2) (envelope-from ) id 1fBw7q-0000Kv-25 for gentoo-user@lists.gentoo.org; Fri, 27 Apr 2018 07:40:54 +0200 X-Injected-Via-Gmane: http://gmane.org/ To: gentoo-user@lists.gentoo.org From: Nikos Chantziaras Subject: [gentoo-user] Re: Kernel 4.9.95 Date: Fri, 27 Apr 2018 08:42:56 +0300 Message-ID: References: <1599701.glEH7cqri9@peak> <16603435.jcEo4k1alJ@peak> <4386141.QH2dSa52Za@dell_xps> Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-Complaints-To: usenet@blaine.gmane.org User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 In-Reply-To: <4386141.QH2dSa52Za@dell_xps> Content-Language: en-US X-Archives-Salt: 7efc3c1c-1040-4b6e-9896-38b829d20c9e X-Archives-Hash: 7d6be4f23cbdc35765b40155178d85fd On 26/04/18 14:42, Mick wrote: > Hmm ... why is my Intel system missing 'IBPB' & 'IBRS_FW' ? > > $ grep . /sys/devices/system/cpu/vulnerabilities/* > /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI > /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer > sanitization > /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic > retpoline > > Are there some kernel options I should have selected manually? Do you have the latest sys-firmware/intel-microcode installed and configured correctly? You need to enable the "early microcode" kernel option, and you also need to add /boot/intel-uc.img to your list of initrds to load in grub2. Alternatively, a BIOS update for your mainboard (if one exists; most older mainboards won't get updates from the likes of Asus, MSI, Gigabyte, etc, etc, etc, so for older boards, you need the microcode package.)