cat /sys/devices/system/cpu/vulnerabilities/*
post 'em.
Cat /sys/devices/system/cpu/vulnerabilities/*
Other urls found in this thread:
github.com
twitter.com
>data mining on Jow Forums
Please post 'em or I get fired.
OP is a retard, use grep instead
grep . /sys/devices/system/cpu/vulnerabilities/*
#swag
#yolo
#gold
you need to cd to it first or you get the full path
l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
meltdown:Mitigation: PTI
spec_store_bypass:Vulnerable
spectrum_v1:Mitigation: __user pointer sanitization
spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
uname -a
Linux [hostname] 5.2.5-arch1-1-ARCH #1 SMP PREEMPT Wed Jul 31 08:30:34 UTC 2019 x86_64 GNU/Linux
are you on clear? how is it?
How did you figure?
good thread
.native kernel version
~$ cat /sys/devices/system/cpu/vulnerabilities/*
Not affected
Not affected
Not affected
Not affected
Not affected
Not affected
Idgi, am I fucked ?
Are you using gentoo?
>4.19.69
eeeewww
On Fedora 30:
Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
Mitigation: Clear CPU buffers; SMT vulnerable
Mitigation: PTI
Mitigation: Speculative Store Bypass disabled via prctl and seccomp
Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
I don't even know what this shit means, is this good or bad?
It means your CPU is affected by every vulnerability, but there's a mitigation in place for each one, so you're fine.
thank you based desu
Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
Mitigation: PTI
Vulnerable
Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
I have some mitigations explicitly turned off
l1tf: Not affected
mds: Not affected
meltdown: Not affected
spec_store_bypass: Vulnerable
spectre_v1: Mitigation: __user pointer sanitization
spectre_v2: Vulnerable, IBPB: disabled, STIBP: disabled
> GCP Debian 10 VPC
Mitigation: PTE Inversion
Mitigation: Clear CPU buffers; SMT Host state unknown
Mitigation: PTI
Mitigation: Speculative Store Bypass disabled via prctl and seccomp
Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
$ cd /sys/devices/system/cpu/vulnerabilities/
-bash: cd: /sys/devices/system/cpu/vulnerabilities/: No such file or directory
No tlp
No imagemagick
Have to compile ffmpeg
Xfce and kde included but broken in jne way or another
Basically missing a lot of randomass packages and tiny little software things in other distro's repos
Nouveau doesn't seem to turn off the nvidia gpu in my optimus laptop, unlike practically any other distro
And that's about all the negatives so far
It's fast, performant, well designed (the stateless architecture); I wouldn't use it on a personal everyday machine, but on a dev machine it's the perfect distro.
Granted, I've only used it for only 3 weeks so far, but it's my favourite one now after opensuse