On Mon, 26 Feb 2018, Curt wrote: > What does that mean 'bugs : cpu_meltdown spectre_v1 spectre_v2 > exactly?
It it is supposed to mean your processor has those defects. It does not say anything about the mitigation strategy being employed to avoid those defects. Obviously, that thing is buggy, since it is listing cpu_meltdown on an AMD box... meh. Hopefully to be corrected by the next round of kernel updates, along with an updated Intel microcode blacklist, required to use the microcode updates Intel "un-recalled" :p > curty@einstein:~$ grep . /sys/devices/system/cpu/vulnerabilities/* > /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected At least this one is correct... > /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user > pointer sanitization > /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD > retpoline And so are those. > The directly above seems more comforting in its verbose clarity somehow. Indeed. -- Henrique Holschuh