From mboxrd@z Thu Jan  1 00:00:00 1970
Return-Path: <gentoo-user+bounces-181789-garchives=archives.gentoo.org@lists.gentoo.org>
Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by finch.gentoo.org (Postfix) with ESMTPS id A5C391382C5
	for <garchives@archives.gentoo.org>; Thu,  4 Jan 2018 17:20:59 +0000 (UTC)
Received: from pigeon.gentoo.org (localhost [127.0.0.1])
	by pigeon.gentoo.org (Postfix) with SMTP id 13051E097B;
	Thu,  4 Jan 2018 17:20:52 +0000 (UTC)
Received: from mail-wr0-x243.google.com (mail-wr0-x243.google.com [IPv6:2a00:1450:400c:c0c::243])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested)
	by pigeon.gentoo.org (Postfix) with ESMTPS id 91F3CE0975
	for <gentoo-user@lists.gentoo.org>; Thu,  4 Jan 2018 17:20:51 +0000 (UTC)
Received: by mail-wr0-x243.google.com with SMTP id y9so2146539wrb.5
        for <gentoo-user@lists.gentoo.org>; Thu, 04 Jan 2018 09:20:51 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20161025;
        h=mime-version:in-reply-to:references:from:date:message-id:subject:to;
        bh=fxwfF3/rxMr2evXDHxlbptg3JNO8o9Ipzn/fMv74pjY=;
        b=I8D/pAGnoXK6BX2XCJ3Dcq4fZDnYTvD4JDFfcDdHLR5qNB7e4FFMm2cS45I9AALQtn
         TlY8xjEg49reY3U2urFJmn0/CZl6lenlH9JSnFu8cXds6q75QeqYE0pVG01V/vtArZKW
         mfzm/XdqshV8u/0y198ubazis0Mix19Gk0+5cc2KizTgB+FYvBC5nfmdQhbUX/i4AegU
         JGGKlCHlcXVBupyIZO2h/lGC27yoQt2dJEudSjMhFqNn4b7cDzFDWl3jtTM2xX/Fz/Ac
         210LmbSyb7a0unT8cSW2tH4WOzp0k2mUf00brdzEbxZhbxvR03k3hbP8NF774URKnJX8
         BC7Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20161025;
        h=x-gm-message-state:mime-version:in-reply-to:references:from:date
         :message-id:subject:to;
        bh=fxwfF3/rxMr2evXDHxlbptg3JNO8o9Ipzn/fMv74pjY=;
        b=FPcsFfvlFH6jyKv6k3DBFfHd8sMfZyPb60iH39Vt6UgBv4BmlIUVAMal+CruOEb6s5
         q92/KC2ETijhffsyQXf+JRum9ZurbpsdXLw6k4zXT7pYshDM3sFcgWRuE9VRVo+Ilicm
         XgFnY6Lv2K+RRS8gqCXDnQNlytJLe3GPprAl25aXJzZEtRvJK0BSVmN3TnUMBkgdYpkW
         kqaT9/AOeshP9Lpx/bY1wBaJ/XvGsUoaRbxdZwcSXRUtUjnj1KnC3ZUiaG1fvV3GqJkt
         5aa25kGgYSM6MOB4ON6FvA3gogPuzsYIzrpbpfxUSIpocUKxBEQBbAfwnyS8rNeqg4ZU
         h81Q==
X-Gm-Message-State: AKGB3mK3Mb5/AMM4ODOS+FXF/wG8HKLOOJXy01IoI7e78sh1vw+fMS/Q
	AjxecB6/MJ8ZQHsluN2B4IvEi1a0xddg5Nln63FNqA==
X-Google-Smtp-Source: ACJfBovB2c3QUFC2IYPnY47lRHmEIeCzNx9mA7RgCvhYA6XoVyQXsbmLNUKJd6iT8rzOuREvp2/DjuRxs4GkvHiJYgs=
X-Received: by 10.223.177.207 with SMTP id r15mr261765wra.259.1515086450104;
 Thu, 04 Jan 2018 09:20:50 -0800 (PST)
Precedence: bulk
List-Post: <mailto:gentoo-user@lists.gentoo.org>
List-Help: <mailto:gentoo-user+help@lists.gentoo.org>
List-Unsubscribe: <mailto:gentoo-user+unsubscribe@lists.gentoo.org>
List-Subscribe: <mailto:gentoo-user+subscribe@lists.gentoo.org>
List-Id: Gentoo Linux mail <gentoo-user.gentoo.org>
X-BeenThere: gentoo-user@lists.gentoo.org
Reply-to: gentoo-user@lists.gentoo.org
MIME-Version: 1.0
Received: by 10.223.164.194 with HTTP; Thu, 4 Jan 2018 09:20:49 -0800 (PST)
Received: by 10.223.164.194 with HTTP; Thu, 4 Jan 2018 09:20:49 -0800 (PST)
In-Reply-To: <43292108.BetqGqQJeV@dell_xps>
References: <23cfc7da-cdda-67ab-1e4d-b069b84ec746@sys-concept.com> <43292108.BetqGqQJeV@dell_xps>
From: "Andrey F." <ma3oxuct@gmail.com>
Date: Thu, 4 Jan 2018 09:20:49 -0800
Message-ID: <CAD7sfFwZ3g6OeSafrJx1bS3L-W6vznXyGK+cGLapQDqrTPUVwQ@mail.gmail.com>
Subject: Re: [gentoo-user] Spectre CPU flaws
To: gentoo-user@lists.gentoo.org
Content-Type: multipart/alternative; boundary="f403045e7de4a99e700561f68d84"
X-Archives-Salt: d9323923-14f7-4224-b355-bafa6df52f00
X-Archives-Hash: b3f3ef80bfc3a39b2476e9801082d666

--f403045e7de4a99e700561f68d84
Content-Type: text/plain; charset="UTF-8"

ALL CPUs are vulnerable to Spectre. The vuln described in your link is
Meltdown and only Intel is vulnerable to that.

https://meltdownattack.com

I don't believe there is a fix for Spectre, but it is also much tougher to
mount and attack. Meltdown on the other-hand has a fix that will likely
reduce performace, but only needs to be applied for Intel CPUs.

On Jan 4, 2018 01:46, "Mick" <michaelkintzios@gmail.com> wrote:

> On Thursday, 4 January 2018 05:50:59 GMT thelma@sys-concept.com wrote:
> > New bug resurface.
> > What is the command to test AMD CUP's if flag: X86_BUG_CPU_INSECURE is
> > enabled?
> >
> > From:
> > https://lkml.org/lkml/2017/12/27/2
>
> grep bugs /proc/cpuinfo
>
> --
> Regards,
> Mick

--f403045e7de4a99e700561f68d84
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto">ALL CPUs are vulnerable to Spectre. The vuln described in=
 your link is Meltdown and only Intel is vulnerable to that.=C2=A0<div dir=
=3D"auto"><br></div><div dir=3D"auto"><a href=3D"https://meltdownattack.com=
">https://meltdownattack.com</a><br></div><div dir=3D"auto"><br></div><div =
dir=3D"auto">I don&#39;t believe there is a fix for Spectre, but it is also=
 much tougher to mount and attack. Meltdown on the other-hand has a fix tha=
t will likely reduce performace, but only needs to be applied for Intel CPU=
s.</div></div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On =
Jan 4, 2018 01:46, &quot;Mick&quot; &lt;<a href=3D"mailto:michaelkintzios@g=
mail.com">michaelkintzios@gmail.com</a>&gt; wrote:<br type=3D"attribution">=
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">On Thursday, 4 January 2018 05:50:59 GMT <a =
href=3D"mailto:thelma@sys-concept.com">thelma@sys-concept.com</a> wrote:<br=
>
&gt; New bug resurface.<br>
&gt; What is the command to test AMD CUP&#39;s if flag: X86_BUG_CPU_INSECUR=
E is<br>
&gt; enabled?<br>
&gt;<br>
&gt; From:<br>
&gt; <a href=3D"https://lkml.org/lkml/2017/12/27/2" rel=3D"noreferrer" targ=
et=3D"_blank">https://lkml.org/lkml/2017/12/<wbr>27/2</a><br>
<br>
grep bugs /proc/cpuinfo<br>
<br>
--<br>
Regards,<br>
Mick</blockquote></div></div>

--f403045e7de4a99e700561f68d84--