On 2018-02-23, Reco <recovery...@gmail.com> wrote: > So it seems. New kernel came today with the usual 'apt update && apt > upgrade' routine: > > $ uname -r > 4.9.0-6-amd64 > > $ grep bug /proc/cpuinfo > bugs : cpu_meltdown spectre_v1 spectre_v2 > ...
What does that mean 'bugs : cpu_meltdown spectre_v1 spectre_v2 exactly? curty@einstein:~$ grep . /sys/devices/system/cpu/vulnerabilities/* /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline The directly above seems more comforting in its verbose clarity somehow. > Reco > > -- “Be yourself; everyone else is already taken.” -Oscar Wilde