If this keeps up, we are all going to have to buy or dig out single core CPU machines for online use when we are buying, banking, pretty much anything online. And those machines will be as fast as dual-core intel CPU's by the time we get to the end of all these migrations.JayM wrote: ↑Wed May 15, 2019 8:53 pm Likewise. I plan to continue buying used or surplus computers rather than brand-new ones, should I buy another, and look for AMD CPUs in them. Not only are old surplus machines less expensive, buying those is also the green thing to do, reusing them instead of throwing them in a landfill, plus any issues with their CPUs and firmware has been fixed for a long time already. I don't play games as I find them boring after an hour or so, so I have no need of the latest, greatest, fastest, bestest computer. Old is fine, just as long as it doesn't break down on me and stop working.
Zombieload
Re: Zombieload
Re: Zombieload
I think sellers of used laptops at Amazon are well aware of this, because the 2010 hp laptops suddenly are more expensive than the 2012 hp laptops.
MX-18_x64 Continuum March 14 2018
Intel Core2 Quad Q9400
Intel 4 Series Integrated Graphics
Intel Core2 Quad Q9400
Intel 4 Series Integrated Graphics
Re: Zombieload
True you're saving them from landfill but old computers use vastly greater amounts of electricity than new ones to do the same work.
Says sunrat typing on his 11 year old Core2Duo system.
Re: Zombieload
They still need to tweak the spectre-meltdown-checker.
It shows my AMD FX6300 system to be vulnerable to Zombieload, Fallout and the two RIDL vulnerablilities.
AMD announced that their processors are not vulnerable to any of those.
https://www.guru3d.com/news-story/amd-s ... ttack.html
HP Pavillion TP01, AMD Ryzen 3 5300G (quad core), Crucial 500GB SSD, Toshiba 6TB 7200rpm
Dell Inspiron 15, AMD Ryzen 7 2700u (quad core). Sabrent 500GB nvme, Seagate 1TB
Dell Inspiron 15, AMD Ryzen 7 2700u (quad core). Sabrent 500GB nvme, Seagate 1TB
- Head_on_a_Stick
- Posts: 919
- Joined: Sun Mar 17, 2019 3:37 pm
Re: Zombieload
The upstream script was corrected 12 hours ago:
https://github.com/speed47/spectre-melt ... 360e3e54fa
I've just ran that version on my new Ryzen laptop and it reports "not vulnerable" for the new holes.
You can also use this to check:
Code: Select all
grep -R . /sys/devices/system/cpu/vulnerabilities/
mod note: Signature removed, please read the forum rules
- beardedragon
- Posts: 114
- Joined: Wed Mar 27, 2019 11:26 pm
Re: Zombieload
Bump:
bob@MX:~
$ grep -R . /sys/devices/system/cpu/vulnerabilities/
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
bob@MX:~
$ grep -R . /sys/devices/system/cpu/vulnerabilities/
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
Rule #1 Backup Everything
Rule #2 Read Rule #1
Rule #2 Read Rule #1
- Head_on_a_Stick
- Posts: 919
- Joined: Sun Mar 17, 2019 3:37 pm
Re: Zombieload
To clarify:
^ The MDS line refers to the new vulnerabilities.beardedragon wrote: ↑Thu May 16, 2019 5:49 pmCode: Select all
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
mod note: Signature removed, please read the forum rules
- beardedragon
- Posts: 114
- Joined: Wed Mar 27, 2019 11:26 pm
Re: Zombieload
Some how I thought most of these problems went with AMD, not so?Head_on_a_Stick wrote: ↑Thu May 16, 2019 6:08 pm To clarify:^ The MDS line refers to the new vulnerabilities.beardedragon wrote: ↑Thu May 16, 2019 5:49 pmCode: Select all
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
Code: Select all
$ inxi -Fxzc0
System: Host: MX Kernel: 5.0.0-16.1-liquorix-amd64 x86_64 bits: 64 compiler: gcc v: 6.3.0
Desktop: Xfce 4.12.3 Distro: MX-18.2_x64 Continuum Apr 7 2019
base: Debian GNU/Linux 9 (stretch)
Machine: Type: Desktop System: LENOVO product: 10181 v: Lenovo K450e serial: <filter>
Mobo: LENOVO model: N/A v: 31900058 STD serial: <filter> BIOS: LENOVO v: I1KT38AUS
date: 06/10/2014
Battery: Device-1: hidpp_battery_0 model: Logitech M570 charge: 90% status: Discharging
CPU: Topology: Quad Core model: Intel Core i5-4460 bits: 64 type: MCP arch: Haswell rev: 3
L2 cache: 6144 KiB
flags: lm nx pae sse sse2 sse3 sse4_1 sse4_2 ssse3 vmx bogomips: 25540
Speed: 798 MHz min/max: 800/3400 MHz Core speeds (MHz): 1: 798 2: 798 3: 798 4: 798
Graphics: Device-1: NVIDIA GK208 [GeForce GT 720] vendor: Micro-Star MSI driver: nvidia
v: 430.14 bus ID: 01:00.0
Display: x11 server: X.Org 1.19.2 driver: nvidia resolution: 1920x1080~60Hz
OpenGL: renderer: GeForce GT 720/PCIe/SSE2 v: 4.6.0 NVIDIA 430.14 direct render: Yes
Audio: Device-1: Intel 8 Series/C220 Series High Definition Audio vendor: Lenovo
driver: snd_hda_intel v: kernel bus ID: 00:1b.0
Device-2: NVIDIA GK208 HDMI/DP Audio vendor: Micro-Star MSI driver: snd_hda_intel
v: kernel bus ID: 01:00.1
Sound Server: ALSA v: k5.0.0-16.1-liquorix-amd64
Network: Device-1: Realtek RTL8111/8168/8411 PCI Express Gigabit Ethernet vendor: Lenovo
driver: r8169 v: kernel port: d000 bus ID: 03:00.0
IF: eth0 state: up speed: 1000 Mbps duplex: full mac: <filter>
Drives: Local Storage: total: 1.82 TiB used: 26.61 GiB (1.4%)
ID-1: /dev/sda vendor: Western Digital model: WD10EZEX-08M2NA0 size: 931.51 GiB
ID-2: /dev/sdd type: USB vendor: Western Digital model: WD Elements 25A2
size: 931.48 GiB
Partition: ID-1: / size: 913.89 GiB used: 26.61 GiB (2.9%) fs: ext4 dev: /dev/sda1
ID-2: swap-1 size: 2.00 GiB used: 0 KiB (0.0%) fs: swap dev: /dev/sda2
Sensors: System Temperatures: cpu: 44.0 C mobo: N/A gpu: nvidia temp: 51 C
Fan Speeds (RPM): N/A gpu: nvidia fan: 28%
Info: Processes: 236 Uptime: 2h 19m Memory: 7.72 GiB used: 780.7 MiB (9.9%) Init: SysVinit
runlevel: 5 Compilers: gcc: 6.3.0 Shell: bash v: 4.4.12 inxi: 3.0.33
Rule #1 Backup Everything
Rule #2 Read Rule #1
Rule #2 Read Rule #1
Re: Zombieload
The older kernels don't know anything about the new possible exploits, so can't report that they are mitigated. So your kernel version is critical.beardedragon wrote: ↑Thu May 16, 2019 5:49 pm Bump:
bob@MX:~
$ grep -R . /sys/devices/system/cpu/vulnerabilities/
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
I have new packages of the checker, though: https://drive.google.com/open?id=1LWm3S ... JxftAR--YK_
Re: Zombieload
Gives a 404 error. URL not found. It is a truncated url.I have new packages of the checker, though: https://drive.google.com/open?id=1LWm3S ... JxftAR--YK_
Forum Rules
Guide - How to Ask for Help
richb Administrator
System: MX 23 KDE
AMD A8 7600 FM2+ CPU R7 Graphics, 16 GIG Mem. Three Samsung EVO SSD's 250 GB
Guide - How to Ask for Help
richb Administrator
System: MX 23 KDE
AMD A8 7600 FM2+ CPU R7 Graphics, 16 GIG Mem. Three Samsung EVO SSD's 250 GB