Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp1186926imm; Wed, 23 May 2018 11:41:46 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpzotGiWTzoRW8OHjq4Q/xwuovPfSCTJEcReZunVcKTZz9zSK8sGtlaAhMrNkCrjeaL4R7V X-Received: by 2002:a63:b046:: with SMTP id z6-v6mr3167754pgo.16.1527100906834; Wed, 23 May 2018 11:41:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527100906; cv=none; d=google.com; s=arc-20160816; b=mWEYuiydpFgFG+efloulWwuULyjfHWoIDWw/OEFgAw11HxDWbunrHXnC/yhUZzKO5M VJoogzZbHJiBxCH6nQRD917knkUikr9H+NBi8uC3CyCEhNpUWhZvAJ3nw0GNiBjm+rl8 8PZmUlwvyvox0htu5yERWWKdoMFpAMd3Rv8ifNQXAVcSmV3+3cRp2NwI0fKKs/6yekPx 1bV8QTucoBg/t988nvfiBmjORzKBaGEbOCNqreW03/SoFk4udVwJnpAj8AgnBQDfUdXj 2vMDL42DX3ZHIL3+KtNKfQBieG29rKJUFnH7Qr0kGEQ9LrBHutGY6tdauMthjItnJBgm vS2g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:to:subject:arc-authentication-results; bh=a711hlmdr2uz6bi+oqzqD2JhlclWhD4BriZ0C891d2U=; b=PrJlAUaQJKhcx5RsdmpAXQFREJnn0cBt6OLmQIXZCRYkqjMmI7u/Q/GrstGBIKfhXI /Xc/BQqiR/VQziagdVx2W/YyTM8N+hGd+axMhpaAjwSY/xioe6tBNkxANjwNG/chDq7+ yvOQ5AT9A7L/k3/do07TezE5ZqK6oRD2zkiaoiqkuGp+TjMegQivZ+Jmqn7t/2VEiIaX TPXpzkRhhIxEV7dlpgYQ9IPciU7wauB5ET9d6gGWk32zB5QbdeN2LUVKnb2SbUeAVJOX wS2LYofjiFJmM9+iGucmSFWEy/ahZx5e7taJZ9JqdLdqweQPqc6fasXpsQrfv8JvmzkL H7pg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u5-v6si19501826pfi.96.2018.05.23.11.41.30; Wed, 23 May 2018 11:41:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933999AbeEWSkT (ORCPT + 99 others); Wed, 23 May 2018 14:40:19 -0400 Received: from mout.web.de ([217.72.192.78]:44069 "EHLO mout.web.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933291AbeEWSkS (ORCPT ); Wed, 23 May 2018 14:40:18 -0400 Received: from [192.168.178.50] ([94.134.138.137]) by smtp.web.de (mrweb101 [213.165.67.124]) with ESMTPSA (Nemesis) id 0MGRVU-1fYhpw2KSe-00DI1S for ; Wed, 23 May 2018 20:40:16 +0200 Subject: =?UTF-8?B?UmU6IFN1Z2dlc3Rpb246IOKAnnNwZWN0cmVfdjI9b2Zm4oCcIGFuZCA=?= =?UTF-8?Q?=e2=80=9enopti=e2=80=9c_per_default_in_=22Intel_Atom_N270=22_case?= =?UTF-8?Q?=3f?= To: linux-kernel@vger.kernel.org References: <72a7122d-0020-f307-a76d-bb80a2c19842@web.de> <20180523105302.GE15312@amd> <20180523170706.GA21118@probook> From: =?UTF-8?Q?Christian_Kr=c3=bcger?= Message-ID: <476a4c02-592f-ddf9-d550-c81be74ce931@web.de> Date: Wed, 23 May 2018 20:40:16 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: <20180523170706.GA21118@probook> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: de-LU Content-Transfer-Encoding: 8bit X-Provags-ID: V03:K1:Ftk22eKySTAJLFYHAK+VD5MbMVjBNxNZu1pmcsikvkZF/iRcwbn 3APMCmVRtGSJE19N9LUCMR73wVBfAQb2bYqbrPsLfn0J1h4VGjXJj7wjXAMFgEDWP1sarW9 VmDSZoxxK304/F422BsF/ttlVEIu20LS5vC8QCL03nZWjMxJT9uuQsTB71ewVoBJh1jRHdq 2VTYP/jeU/n/092mndvNQ== X-UI-Out-Filterresults: notjunk:1;V01:K0:BfxKNHsfDhQ=:3WYoA+KHbt3P2Bfuv6oTnb BirJnaDIQE/gEdsf65zf5izC+vli9hSspOqQKm9PujywwkLzHXU5E77nHRCeHPse8Bs2ynij9 DE/XBudYHN5D1mXs8DoOAdu2p4Qe14CLY4eelL7aKxrpmiTVoP1JFw6mTLu5jCcH/gx9HK1hB O1TpPErtgek+iZ0crtw5jsZMsU/fMwUuuiBsLpGYpm/CnqUiyQPm9ZzlhtHgrsREMY5oVIrDB tLT/zSoCgctLz5aNBWBylrKTybaRtLj6pPr1UNUs4fznkDXXaVjtewxH2pnks/qg+y9qQ0+sC Qjyo5XZ05u+X9cTFcyD3b4ApdrYf64NYSOI4Sdd6KK9aZJ/jEAjZ5BvouAm3k84Qjhj5/Ubju 6C3horHET+sEEUGnOqhIAzw8NaQbTYa1JQlcc66TRlbsnfSfFduttVAYm+OLF5oIDOi4FXuyv D0kOBZp9EKHyyXEY8xYQpThrj+/o/P8zH9KGfzF2hmF1g4u84oqkRkRFaV1KbR1R4ttD8idcy 0w6ThMeg/WmeH18WvmFGVFAgE+S/+T5wb6f85MZK0d6U2uHd4iGmM/NJbKhprS5mrkLHOcFyu juhCPHU4CBMUJLnQ0NpHIE1solCEuyF3DTUnsckbusvgBMZLgN4PW3HM0Io2UY8Nssn3l9X8K yv+Gw6x5n+EexI6W1cvn6j4R0EGu21CAxAO8wnk8gUDsFnarfj5UadInLDgAgRC4M/ijelk+G g867wxZYRo3U8MI2v95jkL45h8HEY2OuiO7kTmpQTcOvHac2XueL+MOsYqsNezIsOdd8DfPrw hpKgo8y Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Am 23.05.2018 um 19:07 schrieb Johannes Hirte: > On 2018 Mai 23, Pavel Machek wrote: >> On Sat 2018-05-19 21:53:02, Christian Krüger wrote: >>> Hi, >>> >>> Since the old "in-order-execution" Intel CPUs like the Intel Atom N270 >>> (known for being installed in many Netbooks and Nettops) are not sensitive >>> for "Meltdown" & "Spectre" , wouldn't it be a good idea to exclude these >>> anyway "weak" CPUs from the costly patches by default? >>> >>> Browsing the web, I can "feel the difference" if the matching kernel options >>> are applied on such a device. >> >> Can you also measure the difference? Placebo effect is hard to avoid. >> >> But yes, we do not need to do workarounds on non-buggy machines... >> >> Pavel > > On my Atom N270 there doesn't seem to be any workaround active with > kernel 4.14.42: > > localhost ~ # cat /sys/devices/system/cpu/vulnerabilities/* > Not affected > Not affected > Not affected > > Christian, did you verified the mitigations are active on your system? > What kernels are affected? > $ uname -a Linux user-device 3.13.0-143-generic #192-Ubuntu SMP Tue Feb 27 10:46:44 UTC 2018 i686 i686 i686 GNU/Linux $ cat /sys/devices/system/cpu/vulnerabilities/* Vulnerable Mittigation: OSB (observable speculation barrier, Intel v6) Mittigation: Full generic repoline OK, so I've updated the OS on my (usually off-line) Netbook: $ uname -a Linux user-device 3.13.0-149-generic #199-Ubuntu SMP Thu May 17 10:12:57 UTC 2018 i686 i686 i686 GNU/Linux $ cat /sys/devices/system/cpu/vulnerabilities/* Not affected Not affected Not affected Not affected Conclusion: Don't bother others before not checking the latest version. (Actually this is the first time it made a difference... ). Sorry for the noise and thanks for listening and all the great work! Christian