Re: Fwd: Huge Intel CPU Bug Allegedly Causes Kernel Memory Vulnerability With Up To 30% Performance Hit
Il 07/01/2018 17:23, Felipe Salvador ha scritto:
> On Sun, Jan 07, 2018 at 04:33:13PM +0100, Portobello wrote:
>> Il 07/01/2018 13:03, Felipe Salvador ha scritto:
>>> On Sun, Jan 07, 2018 at 11:19:05AM +0100, Portobello wrote:
>>>> C'� qualche comando che si pu� dare per vedere da terminale le
>>>> differenze, tra la versione aggiornata del 4/1/2018 e quella del
>>>> 23/12/2018 ?
>>>
>>> # dmesg | grep isolation
>>> [ 0.000000] Kernel/User page tables isolation: disabled
>>
>> Ora mi dà questo :
>> dmesg | grep isolation
>> [ 0.000000] Kernel/User page tables isolation: disabled
>>>
>>> grep cpu_insecure /proc/cpuinfo
>> Questo non dà nessun risultato.
>>
>>>
>>> Se hai un processore affetto da meltdown dovresti avere:
>>>
>>> Kernel/User page tables isolation: enabled
>>>
>>> e cpu_insecure in /proc/cpuinfo.
>>>
>> Quindi è giusto che non ci sia nessun risultato qui ?
>
> Quale processore hai?
cat /proc/cpuinfo
processor : 0
vendor_id : AuthenticAMD
cpu family : 15
model : 95
model name : AMD Athlon(tm) 64 Processor 3500+
stepping : 2
microcode : 0x62
cpu MHz : 1000.000
cache size : 512 KB
physical id : 0
siblings : 1
core id : 0
cpu cores : 1
apicid : 0
initial apicid : 0
fpu : yes
fpu_exception : yes
cpuid level : 1
wp : yes
flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov
pat pse36 clflush mmx fxsr sse sse2 syscall nx mmxext fxsr_opt rdtscp lm
3dnowext 3dnow rep_good nopl extd_apicid eagerfpu pni cx16 lahf_lm svm
extapic cr8_legacy 3dnowprefetch vmmcall
bugs : fxsave_leak sysret_ss_attrs null_seg swapgs_fence amd_e400
bogomips : 2000.22
TLB size : 1024 4K pages
clflush size : 64
cache_alignment : 64
address sizes : 40 bits physical, 48 bits virtual
power management: ts fid vid ttp tm stc
Credo che sia : AMD Athlon(tm) 64 Processor 3500+
Ciao
Reply to: