1 |
On 18/01/18 10:28, Adam Carter wrote: |
2 |
> Nice; |
3 |
> |
4 |
> $ ls /sys/devices/system/cpu/vulnerabilities/ |
5 |
> meltdown spectre_v1 spectre_v2 |
6 |
> $ cat /sys/devices/system/cpu/vulnerabilities/meltdown |
7 |
> Mitigation: PTI |
8 |
> $ cat /sys/devices/system/cpu/vulnerabilities/spectre_v1 |
9 |
> Vulnerable |
10 |
> $ cat /sys/devices/system/cpu/vulnerabilities/spectre_v2 |
11 |
> Vulnerable: Minimal generic ASM retpoline |
12 |
|
13 |
Good to know! Thanks. |
14 |
|
15 |
For Spectre, GCC 7.3 is needed, which isn't released yet, but AFAIK is |
16 |
being fast-tracked for release by upstream. There's plans to backport to |
17 |
GCC 6 as well. |
18 |
|
19 |
Not sure about the CPU microcode situation. |