From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 0A3D21382C5 for ; Tue, 13 Feb 2018 03:40:09 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 73EB3E0C32; Tue, 13 Feb 2018 03:40:01 +0000 (UTC) Received: from very.loosely.org (very.loosely.org [173.255.215.69]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 05F24E09AD for ; Tue, 13 Feb 2018 03:40:00 +0000 (UTC) Received: from [10.8.78.6] (port=52896 helo=matica.foolinux.mooo.com) by ahiker.mooo.com with esmtp (Exim 4.89) (envelope-from ) id 1elRRo-0005zB-3I for gentoo-user@lists.gentoo.org; Mon, 12 Feb 2018 19:40:00 -0800 Received: from itz by matica.foolinux.mooo.com with local (Exim 4.89) (envelope-from ) id 1elRRh-0008Dx-BI for gentoo-user@lists.gentoo.org; Mon, 12 Feb 2018 19:39:53 -0800 Date: Mon, 12 Feb 2018 19:39:53 -0800 From: Ian Zimmerman To: gentoo-user@lists.gentoo.org Subject: [gentoo-user] Re: Vulnerability info in /sys Message-ID: <20180213033953.3e3xvylqztf7wear@matica.foolinux.mooo.com> Mail-Followup-To: gentoo-user@lists.gentoo.org References: <0f3b0c4c-1f72-072a-cb80-5f146d5157a8@gmail.com> Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <0f3b0c4c-1f72-072a-cb80-5f146d5157a8@gmail.com> X-Loosely-Listed: yes User-Agent: NeoMutt/20170707-dirty (1.8.3) X-Archives-Salt: 87e4128a-ec85-4686-860c-fde53ccbff45 X-Archives-Hash: ad8011b3554c727dfb5d40c490615bc6 On 2018-02-12 19:24, Daniel Frey wrote: > I've read online that there should be vulnerability info (Meltdown, > Spectre) in /sys under /sys/devices/system/cpu/vulnerabilities but this > doesn't exist on my PC. > I've updated to gentoo-sources-4.9.76-r1, shouldn't this info be present? > > $ uname -a > Linux zatpc 4.9.76-gentoo-r1 #1 SMP Mon Feb 12 09:20:32 PST 2018 x86_64 > Intel(R) Core(TM)2 Extreme CPU X9650 @ 3.00GHz GenuineIntel GNU/Linux See the other threads: you need at least 4.9.79 for the /sys bits. If you've enabled PTI at build time it's enabled, no need to do anything else. Later 4.9 kernels also contain patches for spectre (PTI is not relevant there). -- Please don't Cc: me privately on mailing lists and Usenet, if you also post the followup to the list or newsgroup. To reply privately _only_ on Usenet, fetch the TXT record for the domain.