1 |
AMD fam10/barcelona; |
2 |
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected |
3 |
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected |
4 |
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user |
5 |
pointer sanitization |
6 |
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD |
7 |
retpoline |
8 |
|
9 |
AMD fam15/bulldozer: |
10 |
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected |
11 |
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: |
12 |
Speculative Store Bypass disabled via prctl and seccomp |
13 |
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user |
14 |
pointer sanitization |
15 |
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD |
16 |
retpoline, IBPB |
17 |
|
18 |
Intel Skylake: |
19 |
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI |
20 |
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable |
21 |
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user |
22 |
pointer sanitization |
23 |
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic |
24 |
retpoline, IBPB, IBRS_FW |