SlackwareThis Forum is for the discussion of Slackware Linux.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I also see the acpi dupe but that's it ...( I am using ext4 file systems )
-- kjh
Code:
# dmesg |grep -i -e mtrr -e 2038 -e guid -e ext2
[ 0.377983] MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details.
[ 4.396736] acpi PNP0C14:01: duplicate WMI GUID 05901221-D566-11D1-B2F0-00A0C9062910 (first instance was on PNP0C14:00)
[ 4.398961] acpi PNP0C14:02: duplicate WMI GUID 05901221-D566-11D1-B2F0-00A0C9062910 (first instance was on PNP0C14:00)
I also see the acpi dupe but that's it ...( I am using ext4 file systems )
-- kjh
Code:
# dmesg |grep -i -e mtrr -e 2038 -e guid -e ext2
[ 0.377983] MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details.
[ 4.396736] acpi PNP0C14:01: duplicate WMI GUID 05901221-D566-11D1-B2F0-00A0C9062910 (first instance was on PNP0C14:00)
[ 4.398961] acpi PNP0C14:02: duplicate WMI GUID 05901221-D566-11D1-B2F0-00A0C9062910 (first instance was on PNP0C14:00)
I don't have MMIO Stale Data CPU bug on this one, maybe on a laptop but I'll have to check.
And to expand on mtrr message:
Code:
[ 4.783180] mtrr: your CPUs had inconsistent variable MTRR settings
[ 4.783180] mtrr: probably your BIOS does not setup all CPUs.
[ 4.783180] mtrr: corrected configuration.
That's likely happened because I disabled virtual cores in BIOS.
Edit: There's no MMIO Stale Data CPU bug on my laptop either, but there is some other stuff:
Code:
[ 1.428314] acpi PNP0A03:00: [Firmware Info]: MMCONFIG for domain 0000 [bus 00-01] only partially covers this bridge
Code:
[ 1.432733] HPET not enabled in BIOS. You might try hpet=force boot option
Code:
[ 1.438455] pci 0000:02:09.0: bridge configuration invalid ([bus 00-00]), reconfiguring
[ 1.438514] pci_bus 0000:03: extended config space not accessible
[ 1.438542] pci_bus 0000:03: busn_res: can not insert [bus 03-02] under [bus 02] (conflicts with (null) [bus 02])
[ 1.438556] pci_bus 0000:03: busn_res: [bus 03-02] end is updated to 06
[ 1.438563] pci_bus 0000:03: busn_res: can not insert [bus 03-06] under [bus 02] (conflicts with (null) [bus 02])
[ 1.438575] pci 0000:02:09.0: devices behind bridge are unusable because [bus 03-06] cannot be assigned for them
[ 1.438584] pci 0000:00:14.4: bridge has subordinate 02 but max busn 06
Code:
[ 2.124382] AMD-Vi: AMD IOMMUv2 functionality not available on this system - This is not a bug.
Code:
[ 6.802321] resource sanity check: requesting [mem 0x000c0000-0x000dffff], which spans more than PCI Bus 0000:00 [mem 0x000d0000-0x000d1fff window]
Seems to work fine considering its age, even though that laptop's just a html reader / mp3 player today.
Do you figure the MMIO Stale data CPU bug is related to config i.e. is that the result of SMT being enabled on AMD CPU?
It is CPU specific and I believe it can be mitigated via a kernel boot parameter but I ignore it
-- kjh
OK, that explains it, I've had no idea what that was since I don't ever test on anything intel.
Had a small ATOM at some point, 2x Athlon, 1x Phenom, but those are re-located now.
All I have available here at this time:
Code:
Model name: AMD Ryzen 5 5600X 6-Core Processor
CPU max MHz: 3700.0000
CPU min MHz: 2200.0000
Vulnerability Itlb multihit: Not affected
Vulnerability L1tf: Not affected
Vulnerability Mds: Not affected
Vulnerability Meltdown: Not affected
Vulnerability Mmio stale data: Not affected
Vulnerability Retbleed: Not affected
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl and seccomp
Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Vulnerability Spectre v2: Mitigation; Retpolines, IBPB conditional, IBRS_FW, STIBP disabled, RSB filling, PBRSB-eIBRS Not affected
Vulnerability Srbds: Not affected
Vulnerability Tsx async abort: Not affected
Model name: AMD Turion(tm) 64 Mobile Technology ML-32
CPU max MHz: 1800.0000
CPU min MHz: 800.0000
Vulnerability Itlb multihit: Not affected
Vulnerability L1tf: Not affected
Vulnerability Mds: Not affected
Vulnerability Meltdown: Not affected
Vulnerability Mmio stale data: Not affected
Vulnerability Retbleed: Not affected
Vulnerability Spec store bypass: Not affected
Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Vulnerability Spectre v2: Mitigation; Retpolines, STIBP disabled, RSB filling, PBRSB-eIBRS Not affected
Vulnerability Srbds: Not affected
Vulnerability Tsx async abort: Not affected
I've enabled mitigations, but I think that stuff like chrome/firefox leaks way more data than those CPU bugs.
This firefox output for example:
Code:
Sandbox: Unexpected EOF, op 0 flags 00 path /proc/cpuinfo
Nobody asked permission to access /proc but w/e it's just accessing it for "reasons"..
So I guess having mitigations is fine, but often made useless by other stuff that's running on the modern system.
Distribution: Slackware64-current with "True Multilib" and KDE4Town.
Posts: 9,104
Original Poster
Rep:
FWIW: Built and installed the 6.0.5 kernel and so far, so good with the Nvidia-Linux-x86_64-470.141.03 kernel and driver from Sbo.
VirtualBox-7.0.2-154219-Linux_amd64.run is also running as it should.
Edit in: The problem streaming video in Firefox remains and now also affects Pale Moon. No problem streaming video in Vivaldi.
Last edited by cwizardone; 10-27-2022 at 11:46 AM.
Will we have another period of time without kernel updates?
I'll still be patient, now I'm busy with other more urgent problems than compiling kernels.
Old & Weird Laptops Risk Seeing Broken Backlight Controls With Linux 6.1
Code:
As a warning and call for testing, old and "weird" laptops may broken backlight controls
when moving to the Linux 6.1 kernel currently under development. Thus if invested in using
an old laptop with a modern kernel version, it may be useful trying out a Linux 6.1 release
candidate to help spot any regressions early.
Distribution: Slackware64-current with "True Multilib" and KDE4Town.
Posts: 9,104
Original Poster
Rep:
Year 2022, Round 64.
Another batch of updates has been scheduled for release on Saturday, 29 October 2022, at approximately 16:00, GMT. If no problems are found while testing the release candidates, they might be available sometime on Friday (depending on your time zone).
Greg Kroah-Hartman
Date: Thu Oct 27 2022 - 13:12:04 EST
..............
A process change for those who care.
Previously, all of the -rc patches have been sent to
linux-kernel@xxxxxxxxxxxxxxx. That turns out to be a lovely way to
stress-test email servers both on the sending, and receiving side.
The vger postmasters have done a valiant job in fixing up all sorts of
crazy issues that this has caused over the years, moving jobs to
different machines, moving some reciever domains to separate queues or
machines, and trying to debug loony gmail server issues. They have, and
continue to, do a wonderful job at all of this.
But the stable patch bombs were causing problems, no matter what. To
help try to aliviate the overally mail load on the main linux-kernel
list, I am now NOT sending all of the patches to lkml, only the -rc
announcements.
If you want to see all of the patches, they will all be cc:ed to the
stable@xxxxxxxxxxxxxxx list, and they should all show up almost
instantly on lore.kernel.org as they are getting sent also to the
patches@lists address as well.
So this should provide a bit of breathing room on the main linux-kernel
mailqueue for a while. And if you do want to see the full set of
patches, either use lore and the assorted tools that can easily get
emails out of it, or subscribe to the stable@vger mailing list.
thanks,
greg "I had a spam assassin rule named after me" k-h
Last edited by cwizardone; 10-27-2022 at 02:03 PM.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.