Gentoo Archives: gentoo-user

From: Ian Zimmerman <itz@××××××××××××.org>
To: gentoo-user@l.g.o
Subject: [gentoo-user] Re: Kernel 4.14.14 has meltdown / spectre info in /sys
Date: Thu, 18 Jan 2018 19:31:53
Message-Id: 20180118193136.zyvp2aebdeqlafuw@matica.foolinux.mooo.com
In Reply to: [gentoo-user] Kernel 4.14.14 has meltdown / spectre info in /sys by Adam Carter
1 On 2018-01-18 19:28, Adam Carter wrote:
2
3 > Nice;
4 >
5 > $ ls /sys/devices/system/cpu/vulnerabilities/
6 > meltdown spectre_v1 spectre_v2
7 > $ cat /sys/devices/system/cpu/vulnerabilities/meltdown
8 > Mitigation: PTI
9 > $ cat /sys/devices/system/cpu/vulnerabilities/spectre_v1
10 > Vulnerable
11 > $ cat /sys/devices/system/cpu/vulnerabilities/spectre_v2
12 > Vulnerable: Minimal generic ASM retpoline
13
14 So has 4.9.77, but it's dumb:
15
16 matica!3 ~$ cat /sys/devices/system/cpu/vulnerabilities/meltdown
17 Vulnerable
18 matica!4 ~$ cat /sys/devices/system/cpu/vulnerabilities/spectre_v1
19 Vulnerable
20 matica!5 ~$ cat /sys/devices/system/cpu/vulnerabilities/spectre_v2
21 Vulnerable: Minimal AMD ASM retpoline
22
23 (AMD is not affected by Meltdown)
24
25 --
26 Please don't Cc: me privately on mailing lists and Usenet,
27 if you also post the followup to the list or newsgroup.
28 To reply privately _only_ on Usenet, fetch the TXT record for the domain.

Replies