possable incorrect vunerabilty report, Specter,Meltdown,Forshadow....

Help on building IPFire & Feature Requests
Post Reply
Posts: 1
Joined: August 8th, 2019, 2:19 am

possable incorrect vunerabilty report, Specter,Meltdown,Forshadow....

Post by coarsco » August 8th, 2019, 2:28 am

I have a VIa Eden C7 1.2Ghz/300mhz and the new "Processor Vulnerability Mitigations" seams to think its vulnerable to everything.

I believe this to be incorrect, as the Single Core, Eden C7 dose not have out of order execution.

The newer multi core versions I believe are known to be vulnerable as it has both out of order and branch prediction.

Its also worth noting the Single core C7 is 32bit only, the Multicore ones have x86-64 support

I would not be surprised if its vulnerable to maybe 1 of them but i cant see how it is vulnerable to all of them given the thing that makes them possible is not suppose to be in the processor.

I am working on testing the POC code for meltdown on one of the via Eden IP Fire boxes. I will post my results here.

Short list where someone else says the Via Eden single cores (C7) are not vulnerable.
https://forum.level1techs.com/t/list-of ... tre/123128

User avatar
Core Developer
Core Developer
Posts: 8522
Joined: May 7th, 2006, 8:57 am
Location: BS <-> NDH

Re: possable incorrect vunerabilty report, Specter,Meltdown,Forshadow....

Post by Arne.F » August 8th, 2019, 4:51 am

Please report both issues to the mainline linux kernel. We only display the informations that the kernel reports in /proc/cpuinfo and /sys/devices/system/cpu/vulnerabilities

The new 4.14.137 reports also the "swapgs" bug which depends on x86_64 so the 32bit kernel should not report this also...

Support the project on the donation!



PS: I will not answer support questions via email and ignore IPFire related messages on my non IPFire.org mail addresses.

Post Reply