Cat /sys/devices/system/cpu/vulnerabilities/*

cat /sys/devices/system/cpu/vulnerabilities/*
post 'em.

Attached: Screenshot from 2019-09-07 11-44-53.png (618x135, 63K)

Other urls found in this thread:

github.com/speed47/spectre-meltdown-checker
twitter.com/SFWRedditVideos

>data mining on Jow Forums

Please post 'em or I get fired.

Attached: justanotheranon.png (867x462, 34K)

OP is a retard, use grep instead
grep . /sys/devices/system/cpu/vulnerabilities/*

#swag
#yolo
#gold

Attached: Screenshot from 2019-09-08 03-12-36.png (700x472, 62K)

you need to cd to it first or you get the full path


l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
meltdown:Mitigation: PTI
spec_store_bypass:Vulnerable
spectrum_v1:Mitigation: __user pointer sanitization
spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling


uname -a
Linux [hostname] 5.2.5-arch1-1-ARCH #1 SMP PREEMPT Wed Jul 31 08:30:34 UTC 2019 x86_64 GNU/Linux

are you on clear? how is it?

github.com/speed47/spectre-meltdown-checker

Attached: CopyQ.wOJKRx.png (623x213, 22K)

Attached: vuln.png (491x81, 32K)

How did you figure?

Attached: posing.jpg (1673x2160, 328K)

good thread

.native kernel version

~$ cat /sys/devices/system/cpu/vulnerabilities/*
Not affected
Not affected
Not affected
Not affected
Not affected
Not affected

Attached: slisho2.jpg (2000x1868, 571K)

Idgi, am I fucked ?

Attached: 2019-09-07-160723_754x198_scrot.png (754x198, 36K)

Are you using gentoo?

>4.19.69

eeeewww

On Fedora 30:
Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
Mitigation: Clear CPU buffers; SMT vulnerable
Mitigation: PTI
Mitigation: Speculative Store Bypass disabled via prctl and seccomp
Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling

I don't even know what this shit means, is this good or bad?

It means your CPU is affected by every vulnerability, but there's a mitigation in place for each one, so you're fine.

thank you based desu

Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
Mitigation: PTI
Vulnerable
Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Mitigation: Full generic retpoline, STIBP: disabled, RSB filling

I have some mitigations explicitly turned off

l1tf: Not affected
mds: Not affected
meltdown: Not affected
spec_store_bypass: Vulnerable
spectre_v1: Mitigation: __user pointer sanitization
spectre_v2: Vulnerable, IBPB: disabled, STIBP: disabled

Attached: Screen Shot 2019-09-07 at 4.13.37 PM.png (334x77, 10K)

> GCP Debian 10 VPC
Mitigation: PTE Inversion
Mitigation: Clear CPU buffers; SMT Host state unknown
Mitigation: PTI
Mitigation: Speculative Store Bypass disabled via prctl and seccomp
Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling

$ cd /sys/devices/system/cpu/vulnerabilities/
-bash: cd: /sys/devices/system/cpu/vulnerabilities/: No such file or directory

No tlp
No imagemagick
Have to compile ffmpeg
Xfce and kde included but broken in jne way or another
Basically missing a lot of randomass packages and tiny little software things in other distro's repos
Nouveau doesn't seem to turn off the nvidia gpu in my optimus laptop, unlike practically any other distro
And that's about all the negatives so far
It's fast, performant, well designed (the stateless architecture); I wouldn't use it on a personal everyday machine, but on a dev machine it's the perfect distro.
Granted, I've only used it for only 3 weeks so far, but it's my favourite one now after opensuse

Attached: VAIO sx12.jpg (1820x1213, 212K)