From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on sa.local.altlinux.org X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00 autolearn=ham autolearn_force=no version=3.4.1 From: Sergey To: ALT Linux Community general discussions Date: Tue, 23 Jan 2018 09:50:40 +0400 User-Agent: KMail/1.9.10 (enterprise35 0.20100827.1168748) References: <29b68dbe-95e6-e0a9-73e2-f79ff05889e0@complife.ru> <201801210118.49820.a_s_y@sama.ru> <201801211407.11294.a_s_y@sama.ru> In-Reply-To: <201801211407.11294.a_s_y@sama.ru> X-KMail-QuotePrefix: > MIME-Version: 1.0 Content-Type: Text/Plain; charset="utf-8" Content-Transfer-Encoding: 8bit Content-Disposition: inline Message-Id: <201801230950.40261.a_s_y@sama.ru> Subject: Re: [Comm] =?utf-8?b?0J7QsdC90L7QstC70LXQvdC40LUg0LzQuNC60YDQvtC60L4=?= =?utf-8?b?0LTQsCBDUFUg0LIgUDg=?= X-BeenThere: community@lists.altlinux.org X-Mailman-Version: 2.1.12 Precedence: list Reply-To: ALT Linux Community general discussions List-Id: ALT Linux Community general discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 23 Jan 2018 05:50:48 -0000 Archived-At: List-Archive: List-Post: On Sunday 21 January 2018, Sergey wrote: > i586: >   > $ grep . /sys/devices/system/cpu/vulnerabilities/* > /sys/devices/system/cpu/vulnerabilities/meltdown:Vulnerable > /sys/devices/system/cpu/vulnerabilities/spectre_v1:Vulnerable > /sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable: Minimal generic ASM retpoline И ещё непонятно. Это x86_64: vendor_id : AuthenticAMD cpu family : 20 model : 2 model name : AMD E-300 APU with Radeon(tm) HD Graphics stepping : 0 microcode : 0x5000119 /sys/devices/system/cpu/vulnerabilities/meltdown:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable: Minimal AMD ASM retpoline Как так meltdown:Vulnerable ? -- С уважением, Сергей.