Spectre+Meltdown

Christian Zigotzky chzigotzky at xenosoft.de
Sat Nov 24 20:14:14 AEDT 2018


On 23. Nov 2018, at 19:59, Michal Suchánek <msuchanek at suse.de> wrote:

With this summary paper https://arxiv.org/abs/1811.05441 it should be
possible to take the manual for your favourite CPU and see which
exploitable optimizations it does have, and how are these exploits
mitigated.

Thanks

Michal


Hi Michal,

Thanks for the hint. Here is the status of our machines:

FYI:

X1000, CPU: PWRficient PA6T-1682M, kernel 4.20-rc3: grep . /sys/devices/system/cpu/vulnerabilities/*

/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Software count cache flush

--------

X5000/020, CPU: P5020 (e5500), kernel 4.20-rc3: grep . /sys/devices/system/cpu/vulnerabilities/*

/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Software count cache flush

The PA6T is still vulnerable.

Cheers,
Christian


More information about the Linuxppc-dev mailing list