cat /sys/devices/system/cpu/vulnerabilities/*
post 'em.
Cat /sys/devices/system/cpu/vulnerabilities/*
Other urls found in this thread:
github.com
twitter.com
>data mining on Jow Forums
Please post 'em or I get fired.
OP is a retard, use grep instead
grep . /sys/devices/system/cpu/vulnerabilities/*
#swag
#yolo
#gold
you need to cd to it first or you get the full path
l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
meltdown:Mitigation: PTI
spec_store_bypass:Vulnerable
spectrum_v1:Mitigation: __user pointer sanitization
spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
uname -a
Linux [hostname] 5.2.5-arch1-1-ARCH #1 SMP PREEMPT Wed Jul 31 08:30:34 UTC 2019 x86_64 GNU/Linux
are you on clear? how is it?
How did you figure?