Just a sample of the Echomail archive
[ << oldest | < older | list | newer > | newest >> ]
|  Message 7868  |
|  Maurice Kinal to Benny Pedersen  |
|  how many kernels must a penguin compile   |
|  28 Jul 23 21:54:58  |
 REPLY: 2:230/0 64c0d238 MSGID: 1:153/7001.2989 64c43932 CHRS: UTF-8 4 Hey Benny! BP> why do you ask me ? :=) You're the one that brought it up. Anyhow here is what I've figured out so far as zenbleed relates to the local scene. ----- From https://www.xda-developers.com/zenbleed/ Here's a table that should make it all clear: ┌─────────────────┬── ───────────────────── ───────────┐ │ │Impacted CPUs │ ├─────────────────┼── ───────────────────── ───────────┤ │Ryzen 3000 Series│All except APUs (e.g. Ryzen 3 3200G)│ ├─────────────────┼── ───────────────────── ───────────┤ │Epyc Rome │All │ ├─────────────────┼── ───────────────────── ───────────┤ │Ryzen 4000 Series│All │ ├─────────────────┼── ───────────────────── ───────────┤ │Ryzen 5000 Series│Only the 5300U, 5500U, and 5700U │ ├─────────────────┼── ───────────────────── ───────────┤ │Ryzen 7000 Series│Only 7020 APUs (e.g. Ryzen 3 7320U) │ └─────────────────┴── ───────────────────── ───────────┘ ----- Note that "AMD Ryzen 7 5800U with Radeon Graphics", which is a zen3 appears to be safe from this particular cpu exploit. Also the "AMD Ryzen Embedded R1505G", which runs EuroPoint, is a zen1 and thus not affected by this particular exploit. However according to lscpu these are the exploits that do exist on that cpu; Vulnerabilities: Itlb multihit: Not affected L1tf: Not affected Mds: Not affected Meltdown: Not affected Mmio stale data: Not affected Retbleed: Mitigation; untrained return thunk; SMT vulnerable Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization Spectre v2: Mitigation; Retpolines, IBPB conditional, STIBP disabled, RSB filling, PBRSB-eIBRS Not affected Srbds: Not affected Tsx async abort: Not affected Currently it appears that none of the deployed AMDs in this neck of the woods suffer from this particular exploit (zenbleed) ... :::knocking on wood::: Life is good, Maurice -o o- o- -o -o -o o- -o -o o- o- o- -o -o -o -o (\ /) /) (\ (\ (\ /) (\ (\ /) /) /) (\ (\ (\ (\ ^^ ^^ ^^ ^^ ^^ ^^ ^^ ^^ ^^ ^^ ^^ ^^ ^^ ^^ ^^ ^^ ... Fidonet 4K - You load sixteen penguins and what do you get? --- GNU bash, version 5.2.15(1)-release (x86_64-pc-linux-gnu) * Origin: One of us @ (1:153/7001.2989) SEEN-BY: 1/123 15/0 90/1 105/81 106/201 114/709 123/131 129/305 134/100 SEEN-BY: 153/135 141 143 757 802 6809 7001 7715 154/10 218/700 840 SEEN-BY: 221/1 6 226/30 227/114 229/110 112 113 206 307 317 400 426 SEEN-BY: 229/428 452 470 550 616 664 700 266/512 280/464 282/1038 SEEN-BY: 291/111 292/854 301/1 317/3 320/219 322/757 335/364 341/66 SEEN-BY: 341/234 342/200 396/45 460/58 256 1124 5858 633/280 712/848 SEEN-BY: 5054/30 5058/104 5075/35 PATH: 153/7001 757 221/6 460/58 229/426 |
[ << oldest | < older | list | newer > | newest >> ]