Welcome!

The kernel problem with recent updates has been solved. Find the solution here

Important information
-- Required MX 15/16 Repository Changes
-- Information on torrent hosting changes
-- Information on MX15/16 GPG Keys
-- Spectre and Meltdown vulnerabilities

News
-- Introducing our new Website
-- MX Linux on social media: here

Current releases
-- MX-18.3 Point Release release info here
-- Migration Information to MX-18 here
-- antiX-17.4.1 release info here

New users
-- Please read this first, and don't forget to add system and hardware information to posts!
-- Here are the Forum Rules

Zombieload

Feel free to talk about anything and everything in this board. Just don't post offensive topics that are meant to cause trouble with other members or are derogatory towards people of different genders, race, color, minors (this includes nudity and sex), politics or religion. Let's try to keep peace among the community and for visitors.

No spam on this or any other forums please! If you post advertisements on these forums, your account may be deleted.

Do not copy and paste entire or even up to half of someone else's words or articles into posts. Post only a few sentences or a paragraph and make sure to include a link back to original words or article. Otherwise it's copyright infringement.

You can talk about other distros here, but no MX bashing. You can email the developers of MX if you just want to say you dislike or hate MX.
User avatar
KBD
Forum Guide
Forum Guide
Posts: 1757
Joined: Sun Jul 03, 2011 7:52 pm

Re: Zombieload

#11

Post by KBD » Wed May 15, 2019 9:30 pm

JayM wrote:
Wed May 15, 2019 8:53 pm
Likewise. I plan to continue buying used or surplus computers rather than brand-new ones, should I buy another, and look for AMD CPUs in them. Not only are old surplus machines less expensive, buying those is also the green thing to do, reusing them instead of throwing them in a landfill, plus any issues with their CPUs and firmware has been fixed for a long time already. I don't play games as I find them boring after an hour or so, so I have no need of the latest, greatest, fastest, bestest computer. Old is fine, just as long as it doesn't break down on me and stop working.
If this keeps up, we are all going to have to buy or dig out single core CPU machines for online use when we are buying, banking, pretty much anything online. And those machines will be as fast as dual-core intel CPU's by the time we get to the end of all these migrations.

mx-2018
Forum Novice
Forum  Novice
Posts: 34
Joined: Wed Oct 31, 2018 11:42 am

Re: Zombieload

#12

Post by mx-2018 » Thu May 16, 2019 10:37 am

I think sellers of used laptops at Amazon are well aware of this, because the 2010 hp laptops suddenly are more expensive than the 2012 hp laptops.
MX-18_x64 Continuum March 14 2018
Intel Core2 Quad Q9400
Intel 4 Series Integrated Graphics

sunrat
Forum Regular
Forum Regular
Posts: 495
Joined: Mon Mar 28, 2016 9:54 pm

Re: Zombieload

#13

Post by sunrat » Thu May 16, 2019 1:04 pm

JayM wrote:
Wed May 15, 2019 8:53 pm
Not only are old surplus machines less expensive, buying those is also the green thing to do, reusing them instead of throwing them in a landfill,...
True you're saving them from landfill but old computers use vastly greater amounts of electricity than new ones to do the same work.
Says sunrat typing on his 11 year old Core2Duo system. ;)

User avatar
timkb4cq
Forum Veteran
Forum Veteran
Posts: 5120
Joined: Wed Jul 12, 2006 4:05 pm

Re: Zombieload

#14

Post by timkb4cq » Thu May 16, 2019 1:16 pm

Stevo wrote:
Wed May 15, 2019 7:15 pm
The new spectre-meltdown-checker 0.41 I just packaged and sent up scans for these and reported my system OK after rebooting with the new microcode.
They still need to tweak the spectre-meltdown-checker.
It shows my AMD FX6300 system to be vulnerable to Zombieload, Fallout and the two RIDL vulnerablilities.
AMD announced that their processors are not vulnerable to any of those.
https://www.guru3d.com/news-story/amd-s ... ttack.html
MSI 970A-G43 MB, AMD FX-6300 (six core), 16GB RAM, GeForce 730, Samsung 850 EVO 250GB SSD, Seagate Barracuda XT 3TB

User avatar
Head_on_a_Stick
Forum Regular
Forum Regular
Posts: 488
Joined: Sun Mar 17, 2019 3:37 pm

Re: Zombieload

#15

Post by Head_on_a_Stick » Thu May 16, 2019 5:29 pm

timkb4cq wrote:
Thu May 16, 2019 1:16 pm
They still need to tweak the spectre-meltdown-checker.
It shows my AMD FX6300 system to be vulnerable to Zombieload, Fallout and the two RIDL vulnerablilities.
The upstream script was corrected 12 hours ago:

https://github.com/speed47/spectre-melt ... 360e3e54fa

I've just ran that version on my new Ryzen laptop and it reports "not vulnerable" for the new holes.

You can also use this to check:

Code: Select all

grep -R . /sys/devices/system/cpu/vulnerabilities/
No scripts needed :happy:
"The state, therefore, is the most flagrant, the most cynical, and the most complete negation of humanity." — Mikhail Bakunin

User avatar
beardedragon
Forum Regular
Forum Regular
Posts: 138
Joined: Wed Mar 27, 2019 11:26 pm

Re: Zombieload

#16

Post by beardedragon » Thu May 16, 2019 5:49 pm

Bump:
bob@MX:~
$ grep -R . /sys/devices/system/cpu/vulnerabilities/
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
Rule #1 Backup Everything
Rule #2 Read Rule #1

User avatar
Head_on_a_Stick
Forum Regular
Forum Regular
Posts: 488
Joined: Sun Mar 17, 2019 3:37 pm

Re: Zombieload

#17

Post by Head_on_a_Stick » Thu May 16, 2019 6:08 pm

To clarify:
beardedragon wrote:
Thu May 16, 2019 5:49 pm

Code: Select all

/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
^ The MDS line refers to the new vulnerabilities.
"The state, therefore, is the most flagrant, the most cynical, and the most complete negation of humanity." — Mikhail Bakunin

User avatar
beardedragon
Forum Regular
Forum Regular
Posts: 138
Joined: Wed Mar 27, 2019 11:26 pm

Re: Zombieload

#18

Post by beardedragon » Thu May 16, 2019 6:15 pm

Head_on_a_Stick wrote:
Thu May 16, 2019 6:08 pm
To clarify:
beardedragon wrote:
Thu May 16, 2019 5:49 pm

Code: Select all

/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
^ The MDS line refers to the new vulnerabilities.
Some how I thought most of these problems went with AMD, not so?

Code: Select all

$ inxi -Fxzc0
System:    Host: MX Kernel: 5.0.0-16.1-liquorix-amd64 x86_64 bits: 64 compiler: gcc v: 6.3.0 
           Desktop: Xfce 4.12.3 Distro: MX-18.2_x64 Continuum Apr 7  2019 
           base: Debian GNU/Linux 9 (stretch) 
Machine:   Type: Desktop System: LENOVO product: 10181 v: Lenovo K450e serial: <filter> 
           Mobo: LENOVO model: N/A v: 31900058 STD serial: <filter> BIOS: LENOVO v: I1KT38AUS 
           date: 06/10/2014 
Battery:   Device-1: hidpp_battery_0 model: Logitech M570 charge: 90% status: Discharging 
CPU:       Topology: Quad Core model: Intel Core i5-4460 bits: 64 type: MCP arch: Haswell rev: 3 
           L2 cache: 6144 KiB 
           flags: lm nx pae sse sse2 sse3 sse4_1 sse4_2 ssse3 vmx bogomips: 25540 
           Speed: 798 MHz min/max: 800/3400 MHz Core speeds (MHz): 1: 798 2: 798 3: 798 4: 798 
Graphics:  Device-1: NVIDIA GK208 [GeForce GT 720] vendor: Micro-Star MSI driver: nvidia 
           v: 430.14 bus ID: 01:00.0 
           Display: x11 server: X.Org 1.19.2 driver: nvidia resolution: 1920x1080~60Hz 
           OpenGL: renderer: GeForce GT 720/PCIe/SSE2 v: 4.6.0 NVIDIA 430.14 direct render: Yes 
Audio:     Device-1: Intel 8 Series/C220 Series High Definition Audio vendor: Lenovo 
           driver: snd_hda_intel v: kernel bus ID: 00:1b.0 
           Device-2: NVIDIA GK208 HDMI/DP Audio vendor: Micro-Star MSI driver: snd_hda_intel 
           v: kernel bus ID: 01:00.1 
           Sound Server: ALSA v: k5.0.0-16.1-liquorix-amd64 
Network:   Device-1: Realtek RTL8111/8168/8411 PCI Express Gigabit Ethernet vendor: Lenovo 
           driver: r8169 v: kernel port: d000 bus ID: 03:00.0 
           IF: eth0 state: up speed: 1000 Mbps duplex: full mac: <filter> 
Drives:    Local Storage: total: 1.82 TiB used: 26.61 GiB (1.4%) 
           ID-1: /dev/sda vendor: Western Digital model: WD10EZEX-08M2NA0 size: 931.51 GiB 
           ID-2: /dev/sdd type: USB vendor: Western Digital model: WD Elements 25A2 
           size: 931.48 GiB 
Partition: ID-1: / size: 913.89 GiB used: 26.61 GiB (2.9%) fs: ext4 dev: /dev/sda1 
           ID-2: swap-1 size: 2.00 GiB used: 0 KiB (0.0%) fs: swap dev: /dev/sda2 
Sensors:   System Temperatures: cpu: 44.0 C mobo: N/A gpu: nvidia temp: 51 C 
           Fan Speeds (RPM): N/A gpu: nvidia fan: 28% 
Info:      Processes: 236 Uptime: 2h 19m Memory: 7.72 GiB used: 780.7 MiB (9.9%) Init: SysVinit 
           runlevel: 5 Compilers: gcc: 6.3.0 Shell: bash v: 4.4.12 inxi: 3.0.33 
Rule #1 Backup Everything
Rule #2 Read Rule #1

User avatar
Stevo
Forum Veteran
Forum Veteran
Posts: 19837
Joined: Fri Dec 15, 2006 8:07 pm

Re: Zombieload

#19

Post by Stevo » Thu May 16, 2019 6:34 pm

beardedragon wrote:
Thu May 16, 2019 5:49 pm
Bump:
bob@MX:~
$ grep -R . /sys/devices/system/cpu/vulnerabilities/
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
The older kernels don't know anything about the new possible exploits, so can't report that they are mitigated. :frown: So your kernel version is critical.

I have new packages of the checker, though: https://drive.google.com/open?id=1LWm3S ... JxftAR--YK_

User avatar
richb
Administrator
Posts: 19248
Joined: Wed Jul 12, 2006 2:17 pm

Re: Zombieload

#20

Post by richb » Thu May 16, 2019 6:36 pm

I have new packages of the checker, though: https://drive.google.com/open?id=1LWm3S ... JxftAR--YK_
Gives a 404 error. URL not found. It is a truncated url.
Forum Rules
Guide - How to Ask for Help

Rich
SSD Production: MX 18.1
AMD A8 7600 FM2+ CPU R7 Graphics, 16 GIG Mem. Three Samsung EVO SSD's 250 GB, 350 GB HD

Post Reply

Return to “General”