stable.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Greg KH <gregkh@linuxfoundation.org>
To: Nick Lowe <nick.lowe@gmail.com>
Cc: stable@vger.kernel.org
Subject: Re: AMD GX-412TC flagged as being vulnerable to Meltdown in 4.9.77
Date: Sun, 21 Jan 2018 14:23:15 +0100	[thread overview]
Message-ID: <20180121132315.GA3769@kroah.com> (raw)
In-Reply-To: <CADSoG1uqxBYyDLH-0wLaTGHnyhfTepapWHU-v5pSH4EH-PPYJQ@mail.gmail.com>

On Sun, Jan 21, 2018 at 12:43:43PM +0000, Nick Lowe wrote:
> Hi,
> 
> On an APU2C4 which uses a AMD GX-412TC SOC, this is incorrectly
> flagged as being vulnerable to Meltdown in 4.9.77
> 
> root@LEDE:/sys/devices/system/cpu/vulnerabilities# cat meltdown
> Vulnerable
> 
> root@LEDE:/sys/devices/system/cpu/vulnerabilities# cat /proc/cpuinfo
> processor : 0
> vendor_id : AuthenticAMD
> cpu family : 22
> model : 48
> model name : AMD GX-412TC SOC
> stepping : 1
> microcode : 0x7030105
> cpu MHz : 600.000
> cache size : 2048 KB
> physical id : 0
> siblings : 4
> core id : 0
> cpu cores : 4
> apicid : 0
> initial apicid : 0
> fpu : yes
> fpu_exception : yes
> cpuid level : 13
> wp : yes
> flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov
> pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext fxsr_opt
> pdpe1gb rdtscp lm constant_tsc rep_good acc_power nopl nonstop_tsc
> extd_apicid aperfmperf eagerfpu pni pclmulqdq monitor ssse3 cx16
> sse4_1 sse4_2 movbe popcnt aes xsave avx f16c lahf_lm cmp_legacy svm
> extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch osvw ibs skinit
> wdt topoext perfctr_nb bpext ptsc perfctr_l2 cpb hw_pstate retpoline
> retpoline_amd vmmcall bmi1 xsaveopt arat npt lbrv svm_lock nrip_save
> tsc_scale flushbyasid decodeassists pausefilter pfthreshold
> overflow_recov
> bugs : fxsave_leak sysret_ss_attrs null_seg cpu_meltdown spectre_v1 spectre_v2
> bogomips : 1996.12
> TLB size : 1024 4K pages
> clflush size : 64
> cache_alignment : 64
> address sizes : 40 bits physical, 48 bits virtual
> power management: ts ttp tm 100mhzsteps hwpstate cpb acc_power [13]
> 
> <snip>

What does the latest 4.14.y release, or Linus's tree show for this CPU?

thanks,

greg k-h

      parent reply	other threads:[~2018-01-21 13:23 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-01-21 12:43 AMD GX-412TC flagged as being vulnerable to Meltdown in 4.9.77 Nick Lowe
2018-01-21 12:49 ` Nick Lowe
2018-01-21 13:25   ` Greg KH
2018-01-21 15:17     ` Greg KH
2018-01-21 15:31     ` Nick Lowe
2018-01-21 15:39       ` Greg KH
2018-01-21 15:54         ` Greg KH
2018-01-21 13:23 ` Greg KH [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20180121132315.GA3769@kroah.com \
    --to=gregkh@linuxfoundation.org \
    --cc=nick.lowe@gmail.com \
    --cc=stable@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).