Comment # 7 on bug 1163120 from
(In reply to Suse User from comment #6)
> (1) After the above clarification, I suppose you can have a second look to
> my previous question.

Hardly a clarification because I still have no clue what exactly you're
asking. If you want an answer to something, please formulate it as an
exact question.

> (2) My other question is:
> 
> https://lkml.org/lkml/2019/12/8/205
> 
> *I understand (2) and the answer to it may be considered off-topic to this
> bug report but I still hope you could shed some light on it too (in direct
> email is fine too, if you think it would be more appropriate).

AFAIU, you're asking whether you can do something additional as a user
in case Spectre and Meltdown are not mitigated on your CPU. But they
*are* mitigated, on *your* machine:

/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs
barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic
retpoline, STIBP: disabled, RSB filling


You are receiving this mail because: