On 2018-01-18 19:28, Adam Carter wrote: > Nice; > > $ ls /sys/devices/system/cpu/vulnerabilities/ > meltdown spectre_v1 spectre_v2 > $ cat /sys/devices/system/cpu/vulnerabilities/meltdown > Mitigation: PTI > $ cat /sys/devices/system/cpu/vulnerabilities/spectre_v1 > Vulnerable > $ cat /sys/devices/system/cpu/vulnerabilities/spectre_v2 > Vulnerable: Minimal generic ASM retpoline
So has 4.9.77, but it's dumb: matica!3 ~$ cat /sys/devices/system/cpu/vulnerabilities/meltdown Vulnerable matica!4 ~$ cat /sys/devices/system/cpu/vulnerabilities/spectre_v1 Vulnerable matica!5 ~$ cat /sys/devices/system/cpu/vulnerabilities/spectre_v2 Vulnerable: Minimal AMD ASM retpoline (AMD is not affected by Meltdown) -- Please don't Cc: me privately on mailing lists and Usenet, if you also post the followup to the list or newsgroup. To reply privately _only_ on Usenet, fetch the TXT record for the domain.