Re: [gentoo-user] Microcode updates for "old" Intel CPU's

2018-01-09 Thread Luigi Mantellini
I have a less-two-old N3700 CPU on a Asrock N3700-ITX board that (was)is
perfect for my NAS, but without pcid instruction that mitigates the last
pti patches slowdown.
Asrock said nothing about the microcode/bios update and I asked for
warranty return because I consider a factory defect but I think that I will
fight with the seller.
BTW, the European Community Law requires at least 2 years of warranty
coverage on factory defects... Proud to be European.

ciao

luigi



On Mon, Jan 8, 2018 at 1:00 AM, Peter Humphrey 
wrote:

> On Sunday, 7 January 2018 20:46:52 GMT taii...@gmx.com wrote:
> > I have several sandy/ivybridge CPU's and I was wondering if anyone knows
> > as to if intel is releasing microcode updates for them.
> >
> > It sure would be funny if intel wanted you to buy a new CPU to fix a
> > problem that was their fault to begin with.
>
> Welcome to unbridled capitalism, USA-style.
>
> --
> Regards,
> Peter.
>
>
>


-- 
Luigi 'Comio' Mantellini
R&D - Software
Industrie Dial Face S.p.A.
Via Canzo, 4
20068 Peschiera Borromeo (MI), Italy

Tel.: +39 02 5167 2813
Fax: +39 02 5167 2459
web: www.idf-hit.com
mail: luigi.mantell...@idf-hit.com


Re: [gentoo-user] microcode applied?

2018-01-09 Thread Neil Bothwick
On Tue, 09 Jan 2018 00:15:03 +, Peter Humphrey wrote:

> > > How do you build the microcode into the kernel? The only
> > > place I can see to do that in menuconfig is under Device Drivers;
> > > there's no such field under Firmware.  
> > 
> > The Device Drivers section is exactly where the microcode is included.
> > CONFIG_EXTRA_FIRMWARE is the relevant symbol.  
> 
> Right. So which of the 95 files under /lib/firmware/intel-ucode do I 
> specify? That's in addition to the 14 files I have for my amdgpu.

I found the simplest way to do it was to emerge intel-microcode with the
initramfs uSE flag. Then copy /lib/firmware/microcode.cpio to /boot and
add it as an initrd - before the existing one if you already use one.

That way it is still loaded at the same time but you don't need to
recompile your kernels (most of us probably have more than one in /boot)
each time there is a microcode update. The USE flag takes care of
selecting the correct file for your CPU.


-- 
Neil Bothwick

Top Oxymorons Number 20: Synthetic natural gas


pgpNQjdJJjvIs.pgp
Description: OpenPGP digital signature


Re: [gentoo-user] How do I customize x11-terms/xterm?

2018-01-09 Thread Neil Bothwick
On Mon, 8 Jan 2018 22:57:30 -0700, Grant Taylor wrote:

> I have been playing with a customized version of Xterm outside of 
> portage and I'd like to migrate my customizations to the copy of Xterm 
> that is emerged as part of the system.
> 
> So far my customizations consist of a modified ./configure command to 
> enable options that I want.

You can usually add extra configure items by creating, in your
case /etc/portage/env/x11-terms/xterm containing

> How do I replicate that via portage?
 
EXTRA_ECONF="--enable-blah..."

> What would I need to do if I wanted to patch a source file?

Putting the patch in /etc/portage/patches/x11-xterms/xterm should do it.

Both of these features are on by default in EAPI6, the xterm ebuild uses
EAPI5 so try it and see.


-- 
Neil Bothwick



Everyone has a photographic memory. Some don't have film.


pgplREVOsSdD0.pgp
Description: OpenPGP digital signature


Re: [gentoo-user] microcode applied?

2018-01-09 Thread Adam Carter
>
> > The Device Drivers section is exactly where the microcode is included.
> > CONFIG_EXTRA_FIRMWARE is the relevant symbol.
>
> Right. So which of the 95 files under /lib/firmware/intel-ucode do I
> specify? That's in addition to the 14 files I have for my amdgpu.
>
>
For intel;

iucode_tool -L /lib/firmware/intel-ucode/* | grep -B 1 `iucode_tool -S 2>&1
| awk '{print $7}'`

As Mick posted, iucode_tool -S will let you know what the CPU signature is,
and running iucode_tool -L against the microcode files dumps out which CPU
sig each file is for, so the above command just searches the files for the
right signature.

Hopefully there's an equivalent for AMD.


Re: [gentoo-user] microcode applied?

2018-01-09 Thread Jorge Almeida
On Tue, Jan 9, 2018 at 12:15 AM, Peter Humphrey  wrote:
> On Monday, 8 January 2018 10:29:41 GMT Max Zettlmeißl wrote:
>> > How do you build the microcode into the kernel? The only
>> > place I can see to do that in menuconfig is under Device Drivers;
>> > there's no such field under Firmware.
>>
>> The Device Drivers section is exactly where the microcode is included.
>> CONFIG_EXTRA_FIRMWARE is the relevant symbol.
>
> Right. So which of the 95 files under /lib/firmware/intel-ucode do I
> specify? That's in addition to the 14 files I have for my amdgpu.
>

In my system (intel):

$ iucode_tool -S
iucode_tool: system has processor(s) with signature 0x000906e9
$ iucode_tool -L /lib/firmware/intel-ucode | grep 0x000906e9 -B 1
microcode bundle 18: /lib/firmware/intel-ucode/06-9e-09
  018/001: sig 0x000906e9, pf_mask 0x2a, 2017-04-06, rev 0x005e, size 97280
  018/002: sig 0x000906e9, pf_mask 0x2a, 2017-04-06, rev 0x005e, size 97280

So in this example "intel-ucode/06-9e-09" is what you'll write in the
kernel form.

There is a amd-ucode dir in /lib/firmware, so I assume it will be the same.

Jorge Almeida



Re: [gentoo-user] microcode applied?

2018-01-09 Thread Wols Lists
On 08/01/18 13:52, Rich Freeman wrote:
> There is also a lot of discussion on lkml about the right fix.  We
> might very well end up seeing both AMD- and Intel-specific fixes with
> conditional logic.  The two vendors don't really seem to be
> coordinating on this.  Intel is pushing patches that apparently don't
> work on AMD, or aren't necessary on AMD.  AMD for its part hasn't been
> pushing much in public at all, but has made a few list posts, and they
> have that mystery microcode update.

Probably not much point co-operating. The *internals* of AMD chips and
Intel chips are very different. I suspect both of them have a RISC core
with an x86 instruction set interpretation layer, but that's where the
similarities end ...

Bit like expecting a turbo-prop engine company to co-ordinate their
designs with a piston engine company. The two engines might look very
similar on the outside, but the internal machinery bears no resemblance
whatsoever one to the other.

Cheers,
Wol



Re: [gentoo-user] microcode applied?

2018-01-09 Thread Peter Humphrey
On Tuesday, 9 January 2018 07:31:35 GMT Mick wrote:
> On Tuesday, 9 January 2018 00:15:03 GMT Peter Humphrey wrote:
> > On Monday, 8 January 2018 10:29:41 GMT Max Zettlmeißl wrote:
> > > > How do you build the microcode into the kernel? The only
> > > > place I can see to do that in menuconfig is under Device Drivers;
> > > > there's no such field under Firmware.
> > > 
> > > The Device Drivers section is exactly where the microcode is included.
> > > CONFIG_EXTRA_FIRMWARE is the relevant symbol.
> > 
> > Right. So which of the 95 files under /lib/firmware/intel-ucode do I
> > specify? That's in addition to the 14 files I have for my amdgpu.
> 
> There may be a cleverer way, but this is how I have been doing it.
> 
> Install sys-apps/iucode_tool.  Run:
> 
> # iucode_tool -S
> 
> It will report the microcode signature for your CPU.  For example, one of
> mine:
> 
> iucode_tool: system has processor(s) with signature 0x000106e5
> 
> 
> (Re)emerge sys-firmware/intel-microcode and capture all its output.  Then
> search for the above signature, again from the same CPU, as an example,
> this matches:
> 
> intel-ucode/06-1e-05
> signature: 0x106e5<==
> flags: 0x13
> revision:  0x07
> date:  2013-08-20
> size:  7168
> 
> 
> Add the first line above in your CONFIG_EXTRA_FIRMWARE and rebuild your
> kernel.

Thanks Mick. After asking that, I discovered this web page, which confirms 
your method: https://wiki.gentoo.org/wiki/Intel_microcode . Then I found 
that I was already loading the right microcode, though I really have no idea 
where I'd got the information from.

Thanks to the others who answered as well.

-- 
Regards,
Peter.




Re: [gentoo-user] microcode applied?

2018-01-09 Thread Adam Carter
>
> Hopefully there's an equivalent for AMD.
>

Here's what I came up with. This is very hacky and unreliable, but get the
CPUID with;

cpuid -r | grep "0x0001 0x00" | awk '{ print $3}' | uniq | cut -d x -f 3

then grab MCE (thanks Max for the suggestion) from
https://github.com/platomav/MCExtractor

unzip MCExtractor-master.zip
cd MCExtractor-master
chmod +x MCE.py
dos2unix MCE.py
./MCE.py /lib/firmware/amd-ucode/*bin
(at this stage it complained about missing dev-python/colorama and
dev-python/prettytable, so i had to emerge them)
Then press enter and it dumps out CPUID and version for each file.

Other than case differences i found the CPUID for my fam10 AMD system. eg
# cpuid -r | grep "0x0001 0x00" | awk '{ print $3}' | uniq | cut -d x
-f 3
00100f43

And in the MCE output;
| 4  | 00100F43 | 01C8 | 2010-03-11 |  Latest  |

Dmesg had
microcode: CPU0: patch_level=0x01c8

So its confirmed its at the latest microcode, from 2010


[gentoo-user] Firefox-57.0.4 won't accept TLS certificate exception

2018-01-09 Thread Mick
I just noticed I am not able to override FF's protestations about the domain 
name of the loaded TLS certificate not matching the visited domain.  When I 
click on Advance/"Confirm Security Exception" to permanently store this 
exception nothing happens.  All I can do thereafter is cancel this pop up 
window.  Of course the page will not load.

How can I overcome this intransigence by the browser, who thinks it knows 
better what I wish to do?
-- 
Regards,
Mick

signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-user] Firefox-57.0.4 won't accept TLS certificate exception

2018-01-09 Thread Peter Humphrey
On Tuesday, 9 January 2018 11:34:24 GMT Mick wrote:
> I just noticed I am not able to override FF's protestations about the
> domain name of the loaded TLS certificate not matching the visited
> domain.  When I click on Advance/"Confirm Security Exception" to
> permanently store this exception nothing happens.  All I can do
> thereafter is cancel this pop up window.  Of course the page will not
> load.

I've noticed something similar, but it varies from one site to another. 
Sometimes, confirming an exception works as before, but at other times I'm 
not even offered the option to make an exception. In that latter case I fire 
up another browser and use that instead.

> How can I overcome this intransigence by the browser, who thinks it knows
> better what I wish to do?

I wish I knew.

-- 
Regards,
Peter.




Re: [gentoo-user] Firefox-57.0.4 won't accept TLS certificate exception

2018-01-09 Thread Mick
On Tuesday, 9 January 2018 11:50:56 GMT Peter Humphrey wrote:
> On Tuesday, 9 January 2018 11:34:24 GMT Mick wrote:
> > I just noticed I am not able to override FF's protestations about the
> > domain name of the loaded TLS certificate not matching the visited
> > domain.  When I click on Advance/"Confirm Security Exception" to
> > permanently store this exception nothing happens.  All I can do
> > thereafter is cancel this pop up window.  Of course the page will not
> > load.
> 
> I've noticed something similar, but it varies from one site to another.
> Sometimes, confirming an exception works as before, but at other times I'm
> not even offered the option to make an exception. In that latter case I fire
> up another browser and use that instead.
> 
> > How can I overcome this intransigence by the browser, who thinks it knows
> > better what I wish to do?
> 
> I wish I knew.

:-)

It seems it won't allow me to accept the certificate *permanently* but it 
accepts it temporarily.  Phew!

I also had to remove a number of security addons which no longer work, but 
this was not related to the certificate problem.

-- 
Regards,
Mick

signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-user] microcode applied?

2018-01-09 Thread Rich Freeman
On Tue, Jan 9, 2018 at 4:26 AM, Wols Lists  wrote:
> On 08/01/18 13:52, Rich Freeman wrote:
>> There is also a lot of discussion on lkml about the right fix.  We
>> might very well end up seeing both AMD- and Intel-specific fixes with
>> conditional logic.  The two vendors don't really seem to be
>> coordinating on this.  Intel is pushing patches that apparently don't
>> work on AMD, or aren't necessary on AMD.  AMD for its part hasn't been
>> pushing much in public at all, but has made a few list posts, and they
>> have that mystery microcode update.
>
> Probably not much point co-operating. The *internals* of AMD chips and
> Intel chips are very different. I suspect both of them have a RISC core
> with an x86 instruction set interpretation layer, but that's where the
> similarities end ...
>

The fact that their internals are very different is EXACTLY why they
need to cooperate.

Spectre cannot be remediated in existing CPUs with a microcode update
only.  It might not even be possible to completely fix it in future
CPUs with only a hardware change.  Spectre remediation (at least at
present) requires software changes as well.

Software is written to the ISA, and both Intel and AMD share a common
ISA for the most part.  It is impossible for a programmer to know how
the internals of the CPU actually work, so they write their code to
the ISA specifications.  If the ISA says to insert an LFENCE
instruction immediately after every bounds check then programmers (or
at least compiler designers) will do just that.  If it says to insert
a CPUID instruction after every bounds check then that is what
programmers/compilers will do.

However, if one of the major vendors tells everybody to do one thing,
and the other tells everybody to do another, and each writes their
microcode fixes to work only their way, then programmers are stuck
trying to reconcile them.  The two vendor CPUs are no longer truly
instruction-set compatible for typical software.  Adding a lot of
conditional branching anytime there is a bounds check to try to detect
the CPU and deal with it isn't a great workaround either, because
branching is what causes the problem in the first place - it would be
better to determine the correct fix at compile-time and not runtime.

Intel and AMD don't need to agree on how to fix the internals of their
CPUs.  What they do need to agree on is the changes that need to be
made in the ISA.

Since AMD has been relatively quiet I suspect they intend to just let
Intel define the fix, and then quietly patch their CPUs to accept the
same fix, or at least to not have any issues when the Intel fix is
used.  However, the fact that they quietly issued a microcode update
doesn't go along with that, especially since they haven't provided any
clarification on what it does, or whether anything needs to be done
with software to take advantage of it.  Intel, while not being all
that cooperative, has at least issued unambiguous statements on what
needs to be done to remediate everything.

-- 
Rich



[gentoo-user] Re: microcode applied?

2018-01-09 Thread Holger Hoffstätte
On Mon, 08 Jan 2018 11:53:58 +, Mick wrote:

> On Monday, 8 January 2018 09:05:02 GMT Max Zettlmeißl wrote:
>> It seems like there are no microcode updates for your specific CPU
>> bundled in linux-firmware.
> 
> Only two out of three Intel boxen here report an early update of microcode in 
> dmesg.  Even when they do, it is not certain the latest firmware has brought 
> new code:
> 
> [0.00] microcode: microcode updated early to revision 0x7, date = 
> 2013-08-20
> 
> This date above puzzles me.  Is it that on this PC's CPU the Intel bugs 
> cannot 
> be ameliorated by the latest intel-ucode release, or is it that Intel have 
> not 
> bothered to release microcode revisions for all their products.

The latter - older CPUs simply don't get updates. My server & workstation
are i5/i7 SandyBridge built in early 2012, and their last microcode updates
are from 2013 as well.

> Therefore if microcode for my CPU was included in intel-ucode releases since 
> 2017-01-01, is this the same unchanged microcode being released since the 
> date 
> reported in dmesg of 2013-08-20?

Seems like it.

-h




[gentoo-user] Re: microcode applied?

2018-01-09 Thread Holger Hoffstätte
On Tue, 09 Jan 2018 14:21:10 +, Holger Hoffstätte wrote:

> On Mon, 08 Jan 2018 11:53:58 +, Mick wrote:
> 
>> On Monday, 8 January 2018 09:05:02 GMT Max Zettlmeißl wrote:
>>> It seems like there are no microcode updates for your specific CPU
>>> bundled in linux-firmware.
>> 
>> Only two out of three Intel boxen here report an early update of microcode 
>> in 
>> dmesg.  Even when they do, it is not certain the latest firmware has brought 
>> new code:
>> 
>> [0.00] microcode: microcode updated early to revision 0x7, date = 
>> 2013-08-20
>> 
>> This date above puzzles me.  Is it that on this PC's CPU the Intel bugs 
>> cannot 
>> be ameliorated by the latest intel-ucode release, or is it that Intel have 
>> not 
>> bothered to release microcode revisions for all their products.
> 
> The latter - older CPUs simply don't get updates. My server & workstation
> are i5/i7 SandyBridge built in early 2012, and their last microcode updates
> are from 2013 as well.
> 
>> Therefore if microcode for my CPU was included in intel-ucode releases since 
>> 2017-01-01, is this the same unchanged microcode being released since the 
>> date 
>> reported in dmesg of 2013-08-20?
> 
> Seems like it.

Just read that Intel plans to ship microcode updates for CPUs built in and
after *2013*, so I guess that means anything after & including Ivy Bridge.

Announcement: https://www.youtube.com/watch?v=RlJ9zB74G_U

All my machines will be running AMD very soon. I need more cores anyway.

-h




Re: [gentoo-user] How do I customize x11-terms/xterm?

2018-01-09 Thread Grant Taylor

On 01/09/2018 01:52 AM, Neil Bothwick wrote:
You can usually add extra configure items by creating, in your case 
/etc/portage/env/x11-terms/xterm containing


EXTRA_ECONF="--enable-blah..."


That seems simple enough.


Putting the patch in /etc/portage/patches/x11-xterms/xterm should do it.


Okay.

I suppose that it will need to be some sort of diff that will 
automatically get applied?


Do you know what directory the diff needs to be based in?

Where can I read more about this?  -  Sorry for the n00b like questions.

I do appreciate the help.  :-)

I assume removing both my customizations and re-emerging xterm will 
revert back to Gentoo default.


Both of these features are on by default in EAPI6, the xterm ebuild uses 
EAPI5 so try it and see.


Fair enough.

I'll give it a try in the next few days and report my findings.

Thank you again Neil.



--
Grant. . . .
unix || die



smime.p7s
Description: S/MIME Cryptographic Signature


Re: [gentoo-user] How do I customize x11-terms/xterm?

2018-01-09 Thread Andrew Barchuk
Hi Grant,

I believe this wiki page is what you're looking for:
https://wiki.gentoo.org/wiki//etc/portage/patches
-- 
Andrew



Re: [gentoo-user] How do I customize x11-terms/xterm?

2018-01-09 Thread Neil Bothwick
On Tue, 9 Jan 2018 10:14:50 -0700, Grant Taylor wrote:

> > Putting the patch in /etc/portage/patches/x11-xterms/xterm should do
> > it.  
> 
> Okay.
> 
> I suppose that it will need to be some sort of diff that will 
> automatically get applied?
> 
> Do you know what directory the diff needs to be based in?

The directory created when the tarball is unpacked AFAIR.
 
> Where can I read more about this?  -  Sorry for the n00b like questions.

devmanual.gentoo.org is the definitive guide, there's also information
spread around the wiki.


-- 
Neil Bothwick

Accept that some days you're the pigeon, and some days you're the statue.


pgp0G830_a2BS.pgp
Description: OpenPGP digital signature


[gentoo-user] WARNING: DO NOT update to sys-apps/attr-2.4.48

2018-01-09 Thread Holger Hoffstätte

Desaster Warning Time!

Unless you enjoy restoring from backups in the most creative ways,
DO NOT casually install today's update of sys-apps/attr-2.4.48, or
your box WILL be hosed.

If you are on ~arch pmask that thing _right now_:

 $echo "=sys-apps/attr-2.4.48" >> /etc/portage/package.mask

See https://bugs.gentoo.org/644048 for more.

-h




Re: [gentoo-user] WARNING: DO NOT update to sys-apps/attr-2.4.48

2018-01-09 Thread Rich Freeman
On Tue, Jan 9, 2018 at 2:47 PM, Holger Hoffstätte
 wrote:
>
> Desaster Warning Time!
>
> Unless you enjoy restoring from backups in the most creative ways,
> DO NOT casually install today's update of sys-apps/attr-2.4.48, or
> your box WILL be hosed.
>
> If you are on ~arch pmask that thing _right now_:
>
>  $echo "=sys-apps/attr-2.4.48" >> /etc/portage/package.mask
>
> See https://bugs.gentoo.org/644048 for more.
>

Thanks for the heads up - this just got everybody's attention.  The
package is masked for now (an emerge --sync will eventually pull that
mask in).  It won't be unmasked until this is sorted out.  Anybody who
recently synced should be careful until the mirrors catch up.

-- 
Rich



[gentoo-user] Re: Profile 17.0, PIE, USE="pic", C(XX)FLAGS "-fpic", "-fPIC"?

2018-01-09 Thread Martin Vaeth
Walter Dnes  wrote:
>   Question: does PIE imply pic/PIC?

The code is somewhat different, but in principle yes.

> I.e does a PIE build also require USE="pic"

Assembler code which breaks pic will also break pie,
so better do not use that code.

> and CFLAGS/CXXFLAGS="-fpic -fPIC"?

These are usually added for libraries anyway.
They do not belong into your "manual" configuration file.

> If so, is there a way to disable PIE in profile 17.0?

If you want to switch it off for a particular binary,
there are -fno-PIE -no-pie.
Ebuilds should add it automatically if needed.
So far, I only needed it for clisp:
https://bugs.gentoo.org/show_bug.cgi?id=618170




Re: [gentoo-user] Microcode updates for "old" Intel CPU's

2018-01-09 Thread Corbin Bird


On 01/09/2018 01:56 AM, Mick wrote:
> On Monday, 8 January 2018 17:47:03 GMT Corbin Bird wrote:
>> On 01/07/2018 02:46 PM, taii...@gmx.com wrote:
>>> I have several sandy/ivybridge CPU's and I was wondering if anyone
>>> knows as to if intel is releasing microcode updates for them.
>>>
>>> It sure would be funny if intel wanted you to buy a new CPU to fix a
>>> problem that was their fault to begin with.
>> Do you remember the x87 bugs discovered in the original i586 Pentiums?
>> Never fixed.
>> Still built into every Intel CPU.
>> Intel does NOT replace "defective-by-design" hardware.
>> Instead, every OS is required to "software emulate" the FPU.
>>
>> Search for "errata-not-bug".
>> Intel's term for their screw-ups in their CPUs.
>>
>> Intel is only releasing patch code for the last five years of products.
>>
>> And ... if you read up on the "e-mails" being posted ...
>> ... It looks as if Intel is NOT going to fix this in future CPUs either.
>> Instead, every OS will be required to "work-around-this".
>>
>> Perhaps the reason "someone" tried to implicate this effects ALL CPU
>> architectures?
>> ( IBM RISC 6000, PowerPC, DEC Alpha, IBM System/390, Sun SPARC64, for
>> example )
>>
>> Intel did try to make their "patch" mandatory for AMD CPUs ( with NO
>> disable switch ).
>> Why?
>> Think about it.
>>
>> Corbin
> So what affordable and available CPUs should one be looking into for a new 
> desktop build?
>
> Also, laptops?
>

At this point, the only sure bet, is a non x86, x86_64, ARM, ARM64 CPU.

Don't know enough to make a recommendation on a particular CPU arch at
this point.

Try asking taii...@gmx.com  or Ian Zimmerman ( both on gentoo-users
mailing list ) about PPC/PPC64.

Re-post of saved e-mail :
> On 12/25/2017 06:33 PM, Ian Zimmerman wrote:
>
>> On 2017-12-24 14:44, taii...@gmx.com wrote:
>>
>>> POWER 9: TALOS 2 (server/workstation, brand new and very high
>>> performance - the only brand new hardware that is legitimately libre)
>> This is interesting, but can it run gentoo?  There's a handbook edition
>> for PPC64, but that's not quite the same, is it?
> It is.
> PPC64 is big endian, PPC64LE is little endian.
>
> POWER8/9 are Bi-Endian so you can use both (most linux distros only
> support little)
>
> PPC64 compile covers PowerPC and POWER.
>
>
> TALOS 2 is an end user obtainable derivative of the Romulus POWER 9
> development board, there are a variety of modifications and it is more
> open source than Romulus - you can also pay for it with bitcoin.
> It supports dual sforza CPU's which have up to 24 cores per socket
> with SMT4 (4 threads at the same time per core) 





Re: [gentoo-user] Microcode updates for "old" Intel CPU's

2018-01-09 Thread Rich Freeman
On Tue, Jan 9, 2018 at 8:33 PM, Corbin Bird  wrote:
>
> On 01/09/2018 01:56 AM, Mick wrote:
>
> At this point, the only sure bet, is a non x86, x86_64, ARM, ARM64 CPU.
>
> Don't know enough to make a recommendation on a particular CPU arch at this
> point.
>

Good luck with that...

If you aren't hearing about Spectre fixes for a CPU it is most likely
because it is so obscure that nobody has bothered to check whether it
is vulnerable.

Sure, there are some CPUs that have been tested and found to be ok.
However, almost anything modern is vulnerable to spectre.  I just
wasn't something that was on anybody's radar.  New CPUs are likely to
be resistant to these types of attacks regardless of vendor.

Sure, if I was about to place an order for 1000 CPUs tomorrow I'd
probably pick AMD over Intel to avoid the PTI overhead, but that is
about as far as I'd let these vulnerabilities affect purchase
decisions.  There are lots of good reasons to go with ARM vs x86, but
this isn't really one of them.  And outside of x86/ARM I think almost
any other CPU choice is going to be a niche item.

-- 
Rich