Gentoo Archives: gentoo-user

From: Dale <rdalek1967@×××××.com>
To: gentoo-user@l.g.o
Subject: Re: [gentoo-user] Re: New Intel CPU flaws discovered
Date: Wed, 15 May 2019 09:08:35
Message-Id: 6a34421d-d1e9-9ea5-c04e-05568f1a7ccb@gmail.com
In Reply to: [gentoo-user] Re: New Intel CPU flaws discovered by Adam Carter
1 Adam Carter wrote:
2 > On Wed, May 15, 2019 at 3:26 PM Adam Carter <adamcarter3@×××××.com
3 > <mailto:adamcarter3@×××××.com>> wrote:
4 >
5 > Here we go again;
6 > https://mdsattacks.com/
7 >
8 > <snip?
9 >
10 > Sounds like AMD not affected.
11 >
12 >
13 > AMD looks good;
14 > $ uname -a
15 > Linux proxy 5.1.2-gentoo #2 SMP Wed May 15 16:39:53 AEST 2019 x86_64
16 > AMD Phenom(tm) II X4 965 Processor AuthenticAMD GNU/Linux
17 > $ cat /sys/devices/system/cpu/vulnerabilities/mds
18 > Not affected
19 >
20 > $ uname -a
21 > Linux phat 5.1.2-gentoo #1 SMP Wed May 15 16:31:06 AEST 2019 x86_64
22 > AMD FX(tm)-8350 Eight-Core Processor AuthenticAMD GNU/Linux
23 > $ cat /sys/devices/system/cpu/vulnerabilities/mds
24 > Not affected
25 >
26 > But the skylake;
27 > $ uname -a
28 > Linux nuc 5.1.2-gentoo #2 SMP Wed May 15 16:35:17 AEST 2019 x86_64
29 > Intel(R) Core(TM) i3-6100U CPU @ 2.30GHz GenuineIntel GNU/Linux
30 > $ cat /sys/devices/system/cpu/vulnerabilities/mds
31 > Mitigation: Clear CPU buffers; SMT vulnerable
32 >
33
34
35 This appears to be OK on my CPU but want to ask to be sure.   Here's
36 some info, sort of taking cues from what you posted above.
37
38
39 root@fireball / # uname -a
40 Linux fireball 4.18.12-gentoo #1 SMP PREEMPT Sun Oct 14 23:45:12 CDT
41 2018 x86_64 AMD FX(tm)-8350 Eight-Core Processor AuthenticAMD GNU/Linux
42 root@fireball / # cat /sys/devices/system/cpu/vulnerabilities/
43 l1tf               meltdown           spec_store_bypass 
44 spectre_v1         spectre_v2        
45 root@fireball / # cat /sys/devices/system/cpu/vulnerabilities/meltdown
46 Not affected
47 root@fireball / # cat /sys/devices/system/cpu/vulnerabilities/l1tf
48 Not affected
49 root@fireball / # cat
50 /sys/devices/system/cpu/vulnerabilities/spec_store_bypass
51 Mitigation: Speculative Store Bypass disabled via prctl and seccomp
52 root@fireball / # cat /sys/devices/system/cpu/vulnerabilities/spectre_v1
53 Mitigation: __user pointer sanitization
54 root@fireball / # cat /sys/devices/system/cpu/vulnerabilities/spectre_v2
55 Mitigation: Full AMD retpoline
56 root@fireball / #
57
58
59
60 Am I correct to think that "Mitigation" is good enough or does that mean
61 it could be affected in some other way or is risky?  Also, since the
62 problem that this thread is about isn't listed, mine isn't affected
63 correct?  I'm guessing "Not affected" means all is good.  ;-) 
64
65 Thanks much.  Just want to be sure my system is safe. 
66
67 Dale
68
69 :-)  :-) 

Replies

Subject Author
Re: [gentoo-user] Re: New Intel CPU flaws discovered Adam Carter <adamcarter3@×××××.com>