On Thu, Jan 18, 2018 at 2:31 PM, Ian Zimmerman <[email protected]> wrote: > On 2018-01-18 19:28, Adam Carter wrote: > >> Nice; >> >> $ ls /sys/devices/system/cpu/vulnerabilities/ >> meltdown spectre_v1 spectre_v2 >> $ cat /sys/devices/system/cpu/vulnerabilities/meltdown >> Mitigation: PTI >> $ cat /sys/devices/system/cpu/vulnerabilities/spectre_v1 >> Vulnerable >> $ cat /sys/devices/system/cpu/vulnerabilities/spectre_v2 >> Vulnerable: Minimal generic ASM retpoline > > So has 4.9.77, but it's dumb: > > matica!3 ~$ cat /sys/devices/system/cpu/vulnerabilities/meltdown > Vulnerable > matica!4 ~$ cat /sys/devices/system/cpu/vulnerabilities/spectre_v1 > Vulnerable > matica!5 ~$ cat /sys/devices/system/cpu/vulnerabilities/spectre_v2 > Vulnerable: Minimal AMD ASM retpoline > > (AMD is not affected by Meltdown) >
On my Ryzen 5-1600 I get: cat /sys/devices/system/cpu/vulnerabilities/meltdown Not affected I'm not sure why you're getting a vulnerable message. -- Rich

