For readability I put each Vulnerability type on its own line.
Just update pinxi with -U, or install pinxi to test:
Code: Select all
cd /usr/local/bin; wget -Nc smxi.org/pinxi; chmod +x pinxi
Code: Select all
pinxi -Cxxx --admin
CPU: Topology: 6-Core model: AMD Ryzen 5 2600 bits: 64 type: MT MCP arch: Zen family: 17 (23) model-id: 8
stepping: 2 microcode: 8008204 L2 cache: 3072 KiB
flags: lm nx pae sse sse2 sse3 sse4_1 sse4_2 sse4a ssse3 svm bogomips: 81588
Speed: 1419 MHz min/max: 1550/3400 MHz boost: enabled Core speeds (MHz): 1: 1434 2: 1440 3: 1523
4: 1526 5: 1821 6: 2019 7: 1446 8: 1442 9: 1434 10: 1425 11: 1530 12: 1523
Vulnerabilities: Type: l1tf status: Not affected
Type: meltdown status: Not affected
Type: spec_store_bypass mitigation: Speculative Store Bypass disabled via prctl and seccomp
Type: spectre_v1 mitigation: __user pointer sanitization
Type: spectre_v2 mitigation: Full AMD retpoline, IBPB
Code: Select all
pinxi -Cxxx --admin
CPU: Topology: 2x 6-Core model: Intel Xeon E5-2630 v2 bits: 64 type: MT MCP SMP arch: Ivy Bridge
family: 6 model-id: 3E (62) stepping: 4 microcode: 42D L2 cache: 30.0 MiB
flags: lm nx pae sse sse2 sse3 sse4_1 sse4_2 ssse3 vmx bogomips: 124818
Speed: 1344 MHz min/max: 1200/3100 MHz Core speeds (MHz): 1: 1344 2: 1299 3: 1500 4: 2407 5: 1267
6: 1268 7: 2493 8: 1340 9: 2554 10: 2047 11: 1634 12: 1275 13: 1261 14: 1583 15: 2206 16: 1571
17: 1246 18: 2599 19: 1447 20: 1493 21: 1400 22: 1750 23: 1810 24: 1500
Vulnerabilities: Type: l1tf
mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
Type: meltdown mitigation: PTI
Type: spec_store_bypass mitigation: Speculative Store Bypass disabled via prctl and seccomp
Type: spectre_v1 mitigation: __user pointer sanitization
Type: spectre_v2 mitigation: Full generic retpoline, IBPB (Intel v4)