On 2018-01-18 19:28, Adam Carter wrote:

> Nice;
> 
> $ ls /sys/devices/system/cpu/vulnerabilities/
> meltdown  spectre_v1  spectre_v2
> $ cat /sys/devices/system/cpu/vulnerabilities/meltdown
> Mitigation: PTI
> $ cat /sys/devices/system/cpu/vulnerabilities/spectre_v1
> Vulnerable
> $ cat /sys/devices/system/cpu/vulnerabilities/spectre_v2
> Vulnerable: Minimal generic ASM retpoline

So has 4.9.77, but it's dumb:

 matica!3 ~$ cat /sys/devices/system/cpu/vulnerabilities/meltdown 
Vulnerable
 matica!4 ~$ cat /sys/devices/system/cpu/vulnerabilities/spectre_v1
Vulnerable
 matica!5 ~$ cat /sys/devices/system/cpu/vulnerabilities/spectre_v2
Vulnerable: Minimal AMD ASM retpoline

(AMD is not affected by Meltdown)

-- 
Please don't Cc: me privately on mailing lists and Usenet,
if you also post the followup to the list or newsgroup.
To reply privately _only_ on Usenet, fetch the TXT record for the domain.

Reply via email to