On Thu, Jan 25, 2018 at 1:39 AM, Adam Carter wrote:
>
> Seems to me like point versions of 4.9 and 4.14 are often released on the
> same date, but fixes that have gone into 4.14 don't make it into 4.9 until
> the subsequent release. Could be my imagination.
One of the issues with Meltdown/Spectre
>
> > $ cat /sys/devices/system/cpu/vulnerabilities/meltdown
> > Not affected
>
> Aha.
>
> matica!1 ~$ cat /sys/devices/system/cpu/vulnerabilities/meltdown
> Not affected
> matica!2 ~$ uname -r
> 4.9.78
>
> I guess these patches will be trickling down for a long time yet.
>
Good to see.
Seems to
On 2018-01-19 10:50, Adam Carter wrote:
> > Looking at the kernel source (for 4.9.77), the flag is initially set no
> > matter what in arch/x86/kernel/cpu/common.c @cpu_show_meltdown(), and
> > nothing afterwards clears it ...
>
>
> With 4.14.14, pretty much same CPU;
> model : 4
> mod
On Sun, Jan 21, 2018 at 8:41 PM, Corbin Bird wrote:
> On 01/18/2018 02:43 PM, Rich Freeman wrote:
>> cat /sys/devices/system/cpu/vulnerabilities/meltdown
>
> Strange, get this response from kernel 4.9.76-r1
In the 4.9 series it was added in 4.9.77 upstream, unless Gentoo backported it.
>
> Did y
On 01/18/2018 02:43 PM, Rich Freeman wrote:
> cat /sys/devices/system/cpu/vulnerabilities/meltdown
Strange, get this response from kernel 4.9.76-r1
> Darkstar ~ # cat /sys/devices/system/cpu/vulnerabilities/meltdown
> cat: /sys/devices/system/cpu/vulnerabilities/meltdown: No such file or
> directo
On Fri, Jan 19, 2018 at 9:17 AM, Ian Zimmerman wrote:
>
> matica!13 linux$ dmesg | fgrep -i phenom
> [0.603608] smpboot: CPU0: AMD Phenom(tm) II X4 955 Processor
> (family: 0x10, model: 0x4, stepping: 0x3)
>
> Looking at the kernel source (for 4.9.77), the flag is initially set no
> matter w
On 2018-01-19 08:22, Adam Carter wrote:
> > On my fam10/barcelona;
> > cat /sys/devices/system/cpu/vulnerabilities/meltdown
> > Not affected
> Ian. which CPU do you have?
matica!13 linux$ dmesg | fgrep -i phenom
[0.603608] smpboot: CPU0: AMD Phenom(tm) II X4 955 Processor
(family: 0x10, mod
>
> On my fam10/barcelona;
> cat /sys/devices/system/cpu/vulnerabilities/meltdown
> Not affected
>
> Ian. which CPU do you have?
> So has 4.9.77, but it's dumb:
> >
> > matica!3 ~$ cat /sys/devices/system/cpu/vulnerabilities/meltdown
> > Vulnerable
> > matica!4 ~$ cat /sys/devices/system/cpu/vulnerabilities/spectre_v1
> > Vulnerable
> > matica!5 ~$ cat /sys/devices/system/cpu/vulnerabilities/spectre_v2
> > Vulnerable: Min
On Thu, Jan 18, 2018 at 2:31 PM, Ian Zimmerman wrote:
> On 2018-01-18 19:28, Adam Carter wrote:
>
>> Nice;
>>
>> $ ls /sys/devices/system/cpu/vulnerabilities/
>> meltdown spectre_v1 spectre_v2
>> $ cat /sys/devices/system/cpu/vulnerabilities/meltdown
>> Mitigation: PTI
>> $ cat /sys/devices/syst
On 2018-01-18 19:28, Adam Carter wrote:
> Nice;
>
> $ ls /sys/devices/system/cpu/vulnerabilities/
> meltdown spectre_v1 spectre_v2
> $ cat /sys/devices/system/cpu/vulnerabilities/meltdown
> Mitigation: PTI
> $ cat /sys/devices/system/cpu/vulnerabilities/spectre_v1
> Vulnerable
> $ cat /sys/devi
On 18/01/18 10:28, Adam Carter wrote:
Nice;
$ ls /sys/devices/system/cpu/vulnerabilities/
meltdown spectre_v1 spectre_v2
$ cat /sys/devices/system/cpu/vulnerabilities/meltdown
Mitigation: PTI
$ cat /sys/devices/system/cpu/vulnerabilities/spectre_v1
Vulnerable
$ cat /sys/devices/system/cpu/vuln
12 matches
Mail list logo