1 |
Adam Carter wrote: |
2 |
> On Wed, May 15, 2019 at 3:26 PM Adam Carter <adamcarter3@×××××.com |
3 |
> <mailto:adamcarter3@×××××.com>> wrote: |
4 |
> |
5 |
> Here we go again; |
6 |
> https://mdsattacks.com/ |
7 |
> |
8 |
> <snip? |
9 |
> |
10 |
> Sounds like AMD not affected. |
11 |
> |
12 |
> |
13 |
> AMD looks good; |
14 |
> $ uname -a |
15 |
> Linux proxy 5.1.2-gentoo #2 SMP Wed May 15 16:39:53 AEST 2019 x86_64 |
16 |
> AMD Phenom(tm) II X4 965 Processor AuthenticAMD GNU/Linux |
17 |
> $ cat /sys/devices/system/cpu/vulnerabilities/mds |
18 |
> Not affected |
19 |
> |
20 |
> $ uname -a |
21 |
> Linux phat 5.1.2-gentoo #1 SMP Wed May 15 16:31:06 AEST 2019 x86_64 |
22 |
> AMD FX(tm)-8350 Eight-Core Processor AuthenticAMD GNU/Linux |
23 |
> $ cat /sys/devices/system/cpu/vulnerabilities/mds |
24 |
> Not affected |
25 |
> |
26 |
> But the skylake; |
27 |
> $ uname -a |
28 |
> Linux nuc 5.1.2-gentoo #2 SMP Wed May 15 16:35:17 AEST 2019 x86_64 |
29 |
> Intel(R) Core(TM) i3-6100U CPU @ 2.30GHz GenuineIntel GNU/Linux |
30 |
> $ cat /sys/devices/system/cpu/vulnerabilities/mds |
31 |
> Mitigation: Clear CPU buffers; SMT vulnerable |
32 |
> |
33 |
|
34 |
|
35 |
This appears to be OK on my CPU but want to ask to be sure. Here's |
36 |
some info, sort of taking cues from what you posted above. |
37 |
|
38 |
|
39 |
root@fireball / # uname -a |
40 |
Linux fireball 4.18.12-gentoo #1 SMP PREEMPT Sun Oct 14 23:45:12 CDT |
41 |
2018 x86_64 AMD FX(tm)-8350 Eight-Core Processor AuthenticAMD GNU/Linux |
42 |
root@fireball / # cat /sys/devices/system/cpu/vulnerabilities/ |
43 |
l1tf meltdown spec_store_bypass |
44 |
spectre_v1 spectre_v2 |
45 |
root@fireball / # cat /sys/devices/system/cpu/vulnerabilities/meltdown |
46 |
Not affected |
47 |
root@fireball / # cat /sys/devices/system/cpu/vulnerabilities/l1tf |
48 |
Not affected |
49 |
root@fireball / # cat |
50 |
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass |
51 |
Mitigation: Speculative Store Bypass disabled via prctl and seccomp |
52 |
root@fireball / # cat /sys/devices/system/cpu/vulnerabilities/spectre_v1 |
53 |
Mitigation: __user pointer sanitization |
54 |
root@fireball / # cat /sys/devices/system/cpu/vulnerabilities/spectre_v2 |
55 |
Mitigation: Full AMD retpoline |
56 |
root@fireball / # |
57 |
|
58 |
|
59 |
|
60 |
Am I correct to think that "Mitigation" is good enough or does that mean |
61 |
it could be affected in some other way or is risky? Also, since the |
62 |
problem that this thread is about isn't listed, mine isn't affected |
63 |
correct? I'm guessing "Not affected" means all is good. ;-) |
64 |
|
65 |
Thanks much. Just want to be sure my system is safe. |
66 |
|
67 |
Dale |
68 |
|
69 |
:-) :-) |