[gentoo-user] AMD microcode problem - Fam15h ( FYI )

2018-05-23 Thread Corbin Bird
FYI :

Did the microcode update, compiled and installed the 4.9.101 kernel with it.
After rebooting, I started having kernel hard lock problems.

Before compiling / installing kernel 4.9.102, I made an addition to the
CFLAGS var in make.conf : -mno-lwp
( 'lwp' is 'Light Weight Profiling' )

No kernel hard locks after the reboot.

Lesson Learned :
The kernel needs to be compiled, installed, system rebooted,
re-compiled, re-installed and re-booted again.
Otherwise the kernel compile process doesn't adjust to the removal of
instruction sets.
The 'make.conf' entry is to catch any other uses, system wide.


Config Info :

Using 'sys-kernel/gentoo-sources' USE flags : experimental modules symlink

-march=bdver2

kernel .config settings :
# CONFIG_PROFILING is not set
CONFIG_HAVE_OPROFILE=y
CONFIG_OPROFILE_NMI_TIMER=y
CONFIG_KPROBES=y


Corbin



[gentoo-user] Re: Console serial terminal/console with command history?

2018-05-23 Thread Grant Edwards
On 2018-05-23, tu...@posteo.de  wrote:

> I have to apologise: I overlooked a certain option of rlwrap:
>
>   rlwrap -a picocom -b 115200 --imap lfcrlf,crcrlf -s /usr/local/bin/msend 
> /dev/ttyACM0
>
> or
>
>   rlwrap -a tio -b 115200 -d 8 -s 1 -p none -m INLCRNL /dev/ttyACM0
>
> or similiar does the job perfectly.

Brilliant!

Thanks for following up with the solution.  After decades of using
serial ports on Linux, I still didn't know about picocom or tio.  I'll
make a note of them and how to use them with rlwrap!

-- 
Grant Edwards   grant.b.edwardsYow! Those people look
  at   exactly like Donnie and
  gmail.comMarie Osmond!!




[gentoo-user] new spectre v4 info in /sys/devices/system/cpu/vulnerabilities/ in 4.16.11

2018-05-23 Thread Adam Carter
AMD fam10/barcelona;
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user
pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD
retpoline

AMD fam15/bulldozer:
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation:
Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user
pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD
retpoline, IBPB

Intel Skylake:
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user
pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic
retpoline, IBPB, IBRS_FW