1 |
On Thu, Jan 18, 2018 at 2:31 PM, Ian Zimmerman <itz@××××××××××××.org> wrote: |
2 |
> On 2018-01-18 19:28, Adam Carter wrote: |
3 |
> |
4 |
>> Nice; |
5 |
>> |
6 |
>> $ ls /sys/devices/system/cpu/vulnerabilities/ |
7 |
>> meltdown spectre_v1 spectre_v2 |
8 |
>> $ cat /sys/devices/system/cpu/vulnerabilities/meltdown |
9 |
>> Mitigation: PTI |
10 |
>> $ cat /sys/devices/system/cpu/vulnerabilities/spectre_v1 |
11 |
>> Vulnerable |
12 |
>> $ cat /sys/devices/system/cpu/vulnerabilities/spectre_v2 |
13 |
>> Vulnerable: Minimal generic ASM retpoline |
14 |
> |
15 |
> So has 4.9.77, but it's dumb: |
16 |
> |
17 |
> matica!3 ~$ cat /sys/devices/system/cpu/vulnerabilities/meltdown |
18 |
> Vulnerable |
19 |
> matica!4 ~$ cat /sys/devices/system/cpu/vulnerabilities/spectre_v1 |
20 |
> Vulnerable |
21 |
> matica!5 ~$ cat /sys/devices/system/cpu/vulnerabilities/spectre_v2 |
22 |
> Vulnerable: Minimal AMD ASM retpoline |
23 |
> |
24 |
> (AMD is not affected by Meltdown) |
25 |
> |
26 |
|
27 |
On my Ryzen 5-1600 I get: |
28 |
cat /sys/devices/system/cpu/vulnerabilities/meltdown |
29 |
Not affected |
30 |
|
31 |
I'm not sure why you're getting a vulnerable message. |
32 |
|
33 |
-- |
34 |
Rich |