On Thu, Jan 18, 2018 at 2:31 PM, Ian Zimmerman <[email protected]> wrote:
> On 2018-01-18 19:28, Adam Carter wrote:
>
>> Nice;
>>
>> $ ls /sys/devices/system/cpu/vulnerabilities/
>> meltdown  spectre_v1  spectre_v2
>> $ cat /sys/devices/system/cpu/vulnerabilities/meltdown
>> Mitigation: PTI
>> $ cat /sys/devices/system/cpu/vulnerabilities/spectre_v1
>> Vulnerable
>> $ cat /sys/devices/system/cpu/vulnerabilities/spectre_v2
>> Vulnerable: Minimal generic ASM retpoline
>
> So has 4.9.77, but it's dumb:
>
>  matica!3 ~$ cat /sys/devices/system/cpu/vulnerabilities/meltdown
> Vulnerable
>  matica!4 ~$ cat /sys/devices/system/cpu/vulnerabilities/spectre_v1
> Vulnerable
>  matica!5 ~$ cat /sys/devices/system/cpu/vulnerabilities/spectre_v2
> Vulnerable: Minimal AMD ASM retpoline
>
> (AMD is not affected by Meltdown)
>

On my Ryzen 5-1600 I get:
cat /sys/devices/system/cpu/vulnerabilities/meltdown
Not affected

I'm not sure why you're getting a vulnerable message.

-- 
Rich

Reply via email to