home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   LINUX      Torvalds farts & fans know what he ate      8,232 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 7,868 of 8,232   
   Maurice Kinal to Benny Pedersen   
   how many kernels must a penguin compile    
   28 Jul 23 21:54:58   
   
   REPLY: 2:230/0 64c0d238   
   MSGID: 1:153/7001.2989 64c43932   
   CHRS: UTF-8 4   
   Hey Benny!   
      
    BP> why do you ask me ?  :=)   
      
   You're the one that brought it up.  Anyhow here is what I've figured out so   
   far as zenbleed relates to the local scene.   
      
   ----- From https://www.xda-developers.com/zenbleed/   
   Here's a table that should make it all clear:   
      
   ┌─────────────────┬──   
   ─────────────────────   
   ───────────┐   
   │                 │Impacted CPUs                       │   
   ├─────────────────┼──   
   ─────────────────────   
   ───────────┤   
   │Ryzen 3000 Series│All except APUs (e.g. Ryzen 3 3200G)│   
   ├─────────────────┼──   
   ─────────────────────   
   ───────────┤   
   │Epyc Rome        │All                                 │   
   ├─────────────────┼──   
   ─────────────────────   
   ───────────┤   
   │Ryzen 4000 Series│All                                 │   
   ├─────────────────┼──   
   ─────────────────────   
   ───────────┤   
   │Ryzen 5000 Series│Only the 5300U, 5500U, and 5700U    │   
   ├─────────────────┼──   
   ─────────────────────   
   ───────────┤   
   │Ryzen 7000 Series│Only 7020 APUs (e.g. Ryzen 3 7320U) │   
   └─────────────────┴──   
   ─────────────────────   
   ───────────┘   
   -----   
      
   Note that "AMD Ryzen 7 5800U with Radeon Graphics", which is a zen3 appears to   
   be safe from this particular cpu exploit.  Also the "AMD Ryzen Embedded   
   R1505G", which runs EuroPoint, is a zen1 and thus not affected by this   
   particular exploit.  However according to lscpu these are the exploits that do   
   exist on that cpu;   
      
   Vulnerabilities:   
     Itlb multihit:         Not affected   
     L1tf:                  Not affected   
     Mds:                   Not affected   
     Meltdown:              Not affected   
     Mmio stale data:       Not affected   
     Retbleed:              Mitigation; untrained return thunk; SMT vulnerable   
     Spec store bypass:     Mitigation; Speculative Store Bypass disabled via   
   prctl   
     Spectre v1:            Mitigation; usercopy/swapgs barriers and __user   
   pointer sanitization   
     Spectre v2:            Mitigation; Retpolines, IBPB conditional, STIBP   
   disabled, RSB filling, PBRSB-eIBRS Not affected   
     Srbds:                 Not affected   
     Tsx async abort:       Not affected   
      
   Currently it appears that none of the deployed AMDs in this neck of the woods   
   suffer from this particular exploit (zenbleed) ... :::knocking on wood:::   
      
   Life is good,   
   Maurice   
      
   -o    o-   o-  -o   -o   -o    o-  -o   -o    o-   o-   o-  -o   -o   -o   -o   
    (\  /)   /)    (\   (\   (\  /)    (\   (\  /)   /)   /)    (\   (\   (\   (\   
    ^^  ^^   ^^    ^^   ^^   ^^  ^^    ^^   ^^  ^^   ^^   ^^    ^^   ^^   ^^   ^^   
   ... Fidonet 4K - You load sixteen penguins and what do you get?   
   --- GNU bash, version 5.2.15(1)-release (x86_64-pc-linux-gnu)   
    * Origin: One of us @ (1:153/7001.2989)   
   SEEN-BY: 1/123 15/0 90/1 105/81 106/201 114/709 123/131 129/305 134/100   
   SEEN-BY: 153/135 141 143 757 802 6809 7001 7715 154/10 218/700 840   
   SEEN-BY: 221/1 6 226/30 227/114 229/110 112 113 206 307 317 400 426   
   SEEN-BY: 229/428 452 470 550 616 664 700 266/512 280/464 282/1038   
   SEEN-BY: 291/111 292/854 301/1 317/3 320/219 322/757 335/364 341/66   
   SEEN-BY: 341/234 342/200 396/45 460/58 256 1124 5858 633/280 712/848   
   SEEN-BY: 5054/30 5058/104 5075/35   
   PATH: 153/7001 757 221/6 460/58 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca