[gentoo-user] AMD microcode problem - Fam15h ( FYI )
FYI : Did the microcode update, compiled and installed the 4.9.101 kernel with it. After rebooting, I started having kernel hard lock problems. Before compiling / installing kernel 4.9.102, I made an addition to the CFLAGS var in make.conf : -mno-lwp ( 'lwp' is 'Light Weight Profiling' ) No kernel hard locks after the reboot. Lesson Learned : The kernel needs to be compiled, installed, system rebooted, re-compiled, re-installed and re-booted again. Otherwise the kernel compile process doesn't adjust to the removal of instruction sets. The 'make.conf' entry is to catch any other uses, system wide. Config Info : Using 'sys-kernel/gentoo-sources' USE flags : experimental modules symlink -march=bdver2 kernel .config settings : # CONFIG_PROFILING is not set CONFIG_HAVE_OPROFILE=y CONFIG_OPROFILE_NMI_TIMER=y CONFIG_KPROBES=y Corbin
[gentoo-user] Re: Console serial terminal/console with command history?
On 2018-05-23, tu...@posteo.dewrote: > I have to apologise: I overlooked a certain option of rlwrap: > > rlwrap -a picocom -b 115200 --imap lfcrlf,crcrlf -s /usr/local/bin/msend > /dev/ttyACM0 > > or > > rlwrap -a tio -b 115200 -d 8 -s 1 -p none -m INLCRNL /dev/ttyACM0 > > or similiar does the job perfectly. Brilliant! Thanks for following up with the solution. After decades of using serial ports on Linux, I still didn't know about picocom or tio. I'll make a note of them and how to use them with rlwrap! -- Grant Edwards grant.b.edwardsYow! Those people look at exactly like Donnie and gmail.comMarie Osmond!!
[gentoo-user] new spectre v4 info in /sys/devices/system/cpu/vulnerabilities/ in 4.16.11
AMD fam10/barcelona; /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline AMD fam15/bulldozer: /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB Intel Skylake: /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW