Gentoo Archives: gentoo-user

From: Adam Carter <adamcarter3@×××××.com>
To: gentoo-user@l.g.o
Subject: [gentoo-user] new spectre v4 info in /sys/devices/system/cpu/vulnerabilities/ in 4.16.11
Date: Wed, 23 May 2018 09:15:03
Message-Id: CAC=wYCFnbyFxLODVY_PpyxPN+Hozf6FCDd44Nw2iOOxZZnPxzw@mail.gmail.com
1 AMD fam10/barcelona;
2 /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
3 /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
4 /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user
5 pointer sanitization
6 /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD
7 retpoline
8
9 AMD fam15/bulldozer:
10 /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
11 /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation:
12 Speculative Store Bypass disabled via prctl and seccomp
13 /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user
14 pointer sanitization
15 /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD
16 retpoline, IBPB
17
18 Intel Skylake:
19 /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
20 /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
21 /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user
22 pointer sanitization
23 /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic
24 retpoline, IBPB, IBRS_FW