Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    LINUX    |    Torvalds farts & fans know what he ate    |    8,232 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 7,868 of 8,232    |
|    Maurice Kinal to Benny Pedersen    |
|    how many kernels must a penguin compile     |
|    28 Jul 23 21:54:58    |
      REPLY: 2:230/0 64c0d238       MSGID: 1:153/7001.2989 64c43932       CHRS: UTF-8 4       Hey Benny!               BP> why do you ask me ? :=)              You're the one that brought it up. Anyhow here is what I've figured out so       far as zenbleed relates to the local scene.              ----- From https://www.xda-developers.com/zenbleed/       Here's a table that should make it all clear:              ┌─────────────────┬──       ─────────────────────       ───────────┐       │ │Impacted CPUs │       ├─────────────────┼──       ─────────────────────       ───────────┤       │Ryzen 3000 Series│All except APUs (e.g. Ryzen 3 3200G)│       ├─────────────────┼──       ─────────────────────       ───────────┤       │Epyc Rome │All │       ├─────────────────┼──       ─────────────────────       ───────────┤       │Ryzen 4000 Series│All │       ├─────────────────┼──       ─────────────────────       ───────────┤       │Ryzen 5000 Series│Only the 5300U, 5500U, and 5700U │       ├─────────────────┼──       ─────────────────────       ───────────┤       │Ryzen 7000 Series│Only 7020 APUs (e.g. Ryzen 3 7320U) │       └─────────────────┴──       ─────────────────────       ───────────┘       -----              Note that "AMD Ryzen 7 5800U with Radeon Graphics", which is a zen3 appears to       be safe from this particular cpu exploit. Also the "AMD Ryzen Embedded       R1505G", which runs EuroPoint, is a zen1 and thus not affected by this       particular exploit. However according to lscpu these are the exploits that do       exist on that cpu;              Vulnerabilities:        Itlb multihit: Not affected        L1tf: Not affected        Mds: Not affected        Meltdown: Not affected        Mmio stale data: Not affected        Retbleed: Mitigation; untrained return thunk; SMT vulnerable        Spec store bypass: Mitigation; Speculative Store Bypass disabled via       prctl        Spectre v1: Mitigation; usercopy/swapgs barriers and __user       pointer sanitization        Spectre v2: Mitigation; Retpolines, IBPB conditional, STIBP       disabled, RSB filling, PBRSB-eIBRS Not affected        Srbds: Not affected        Tsx async abort: Not affected              Currently it appears that none of the deployed AMDs in this neck of the woods       suffer from this particular exploit (zenbleed) ... :::knocking on wood:::              Life is good,       Maurice              -o o- o- -o -o -o o- -o -o o- o- o- -o -o -o -o        (\ /) /) (\ (\ (\ /) (\ (\ /) /) /) (\ (\ (\ (\        ^^ ^^ ^^ ^^ ^^ ^^ ^^ ^^ ^^ ^^ ^^ ^^ ^^ ^^ ^^ ^^       ... Fidonet 4K - You load sixteen penguins and what do you get?       --- GNU bash, version 5.2.15(1)-release (x86_64-pc-linux-gnu)        * Origin: One of us @ (1:153/7001.2989)       SEEN-BY: 1/123 15/0 90/1 105/81 106/201 114/709 123/131 129/305 134/100       SEEN-BY: 153/135 141 143 757 802 6809 7001 7715 154/10 218/700 840       SEEN-BY: 221/1 6 226/30 227/114 229/110 112 113 206 307 317 400 426       SEEN-BY: 229/428 452 470 550 616 664 700 266/512 280/464 282/1038       SEEN-BY: 291/111 292/854 301/1 317/3 320/219 322/757 335/364 341/66       SEEN-BY: 341/234 342/200 396/45 460/58 256 1124 5858 633/280 712/848       SEEN-BY: 5054/30 5058/104 5075/35       PATH: 153/7001 757 221/6 460/58 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca