Page 1 of 1

CPU vulnerabilities

Posted: Thu Nov 22, 2018 10:34 pm
by xeno74
FYI:

X1000, CPU: PWRficient PA6T-1682M, kernel 4.20-rc3: grep . /sys/devices/system/cpu/vulnerabilities/*

Code: Select all

/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Software count cache flush
X5000/020, CPU: P5020 (e5500), kernel 4.20-rc3: grep . /sys/devices/system/cpu/vulnerabilities/*

Code: Select all

/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Software count cache flush

Re: CPU vulnerabilities

Posted: Mon Nov 26, 2018 8:06 am
by xeno74
Hi,

I reported the PA6T vulnerabilities to the Linux PPC developers today.

Link: https://lists.ozlabs.org/pipermail/linuxppc-dev/2018-November/181780.html

The P5020 CPU doesn’t have any problems with vulnerabilities with the latest Linux kernels! :-)

Have a nice week!

Cheers,
Christian

Re: CPU vulnerabilities

Posted: Fri Dec 28, 2018 6:05 pm
by xeno74
FYI:

X1000, CPU: PWRficient PA6T-1682M, kernel 4.21-alpha3: grep . /sys/devices/system/cpu/vulnerabilities/*

Code: Select all

/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable

Re: CPU vulnerabilities

Posted: Wed Dec 29, 2021 4:00 am
by xeno74
CPU information (cpuinfo) with the kernel 5.16 on an AmigaOne X1000:

cat /proc/cpuinfo

Code: Select all

processor	: 0
cpu		: PA6T, altivec supported
clock		: 1800.000000MHz
revision	: 1.2 (pvr 0090 0102)

processor	: 1
cpu		: PA6T, altivec supported
clock		: 1800.000000MHz
revision	: 1.2 (pvr 0090 0102)

timebase	: 66666666
platform	: A-EON Amigaone X1000
model		: pasemi,nemo
lscpu

Code: Select all

Architecture:                    ppc64
CPU op-mode(s):                  32-bit, 64-bit
Byte Order:                      Big Endian
CPU(s):                          2
On-line CPU(s) list:             0,1
Thread(s) per core:              1
Core(s) per socket:              2
Socket(s):                       1
Model:                           1.2 (pvr 0090 0102)
Model name:                      PA6T, altivec supported
L1d cache:                       128 KiB
L1i cache:                       128 KiB
Vulnerability Itlb multihit:     Not affected
Vulnerability L1tf:              Vulnerable
Vulnerability Mds:               Not affected
Vulnerability Meltdown:          Vulnerable
Vulnerability Spec store bypass: Vulnerable
Vulnerability Spectre v1:        Mitigation; __user pointer sanitization
Vulnerability Spectre v2:        Vulnerable
Vulnerability Srbds:             Not affected
Vulnerability Tsx async abort:   Not affected

Re: CPU vulnerabilities

Posted: Wed Dec 29, 2021 5:16 pm
by xeno74
Hi,

I reported the PA6T vulnerabilities to the Linux PPC developers today.

Link: The PA6T is still vulnerable

Cheers,
Christian

Re: CPU vulnerabilities

Posted: Fri Dec 31, 2021 5:18 pm
by Hypex
No change in three years? :o