Cat /sys/devices/system/cpu/vulnerabilities/*

cat /sys/devices/system/cpu/vulnerabilities/*
post 'em.

Attached: Screenshot from 2019-09-07 11-44-53.png (618x135, 63K)

Other urls found in this thread:

github.com/speed47/spectre-meltdown-checker
twitter.com/SFWRedditVideos

>data mining on Jow Forums

Please post 'em or I get fired.

Attached: justanotheranon.png (867x462, 34K)

OP is a retard, use grep instead
grep . /sys/devices/system/cpu/vulnerabilities/*

#swag
#yolo
#gold

Attached: Screenshot from 2019-09-08 03-12-36.png (700x472, 62K)

you need to cd to it first or you get the full path


l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
meltdown:Mitigation: PTI
spec_store_bypass:Vulnerable
spectrum_v1:Mitigation: __user pointer sanitization
spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling


uname -a
Linux [hostname] 5.2.5-arch1-1-ARCH #1 SMP PREEMPT Wed Jul 31 08:30:34 UTC 2019 x86_64 GNU/Linux

are you on clear? how is it?

github.com/speed47/spectre-meltdown-checker

Attached: CopyQ.wOJKRx.png (623x213, 22K)

Attached: vuln.png (491x81, 32K)

How did you figure?

Attached: posing.jpg (1673x2160, 328K)