1 |
On 2018-01-18 19:28, Adam Carter wrote: |
2 |
|
3 |
> Nice; |
4 |
> |
5 |
> $ ls /sys/devices/system/cpu/vulnerabilities/ |
6 |
> meltdown spectre_v1 spectre_v2 |
7 |
> $ cat /sys/devices/system/cpu/vulnerabilities/meltdown |
8 |
> Mitigation: PTI |
9 |
> $ cat /sys/devices/system/cpu/vulnerabilities/spectre_v1 |
10 |
> Vulnerable |
11 |
> $ cat /sys/devices/system/cpu/vulnerabilities/spectre_v2 |
12 |
> Vulnerable: Minimal generic ASM retpoline |
13 |
|
14 |
So has 4.9.77, but it's dumb: |
15 |
|
16 |
matica!3 ~$ cat /sys/devices/system/cpu/vulnerabilities/meltdown |
17 |
Vulnerable |
18 |
matica!4 ~$ cat /sys/devices/system/cpu/vulnerabilities/spectre_v1 |
19 |
Vulnerable |
20 |
matica!5 ~$ cat /sys/devices/system/cpu/vulnerabilities/spectre_v2 |
21 |
Vulnerable: Minimal AMD ASM retpoline |
22 |
|
23 |
(AMD is not affected by Meltdown) |
24 |
|
25 |
-- |
26 |
Please don't Cc: me privately on mailing lists and Usenet, |
27 |
if you also post the followup to the list or newsgroup. |
28 |
To reply privately _only_ on Usenet, fetch the TXT record for the domain. |