* [gentoo-user] spec_store_bypass mitigation
@ 2018-06-07 7:37 zless
2018-06-09 19:08 ` Mick
0 siblings, 1 reply; 3+ messages in thread
From: zless @ 2018-06-07 7:37 UTC (permalink / raw
To: gentoo-user
Hello,
I just finished installing kernel 4.14.48 on two
Intel laptops and I have different results for
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass
On one of them it looks nice:
"Mitigation: Speculative Store Bypass disabled via prctl and seccomp"
but on the other it still says "Vulnerable".
Any idea on what might influence this? The kernel configs are fairly similar, the only thing that's different is the microcode, which is from 2017 for the "vulnerable" one.
Thanks
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [gentoo-user] spec_store_bypass mitigation
2018-06-07 7:37 [gentoo-user] spec_store_bypass mitigation zless
@ 2018-06-09 19:08 ` Mick
2018-06-13 6:22 ` zless
0 siblings, 1 reply; 3+ messages in thread
From: Mick @ 2018-06-09 19:08 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1469 bytes --]
On Thursday, 7 June 2018 08:37:41 BST zless wrote:
> Hello,
>
> I just finished installing kernel 4.14.48 on two
> Intel laptops and I have different results for
>
> /sys/devices/system/cpu/vulnerabilities/spec_store_bypass
>
> On one of them it looks nice:
> "Mitigation: Speculative Store Bypass disabled via prctl and seccomp"
> but on the other it still says "Vulnerable".
>
> Any idea on what might influence this? The kernel configs are fairly
> similar, the only thing that's different is the microcode, which is from
> 2017 for the "vulnerable" one.
>
> Thanks
I would think it is cause by the microcode.
I have two really old Intel laptops and despite announcements to the contrary
I noticed the latest (stable) sys-firmware/intel-microcode-20180527-r1 changed
the Intel microcode version being loaded on both PCs, after I rebuilt the
kernel (4.9.95) to incorporate it (no initrd on either of them).
I see this for Spectre V2 which now includes IBPB and IBRS_FW:
$ dmesg | grep Spectre
[ 0.011385] Spectre V2 : Mitigation: Full generic retpoline
[ 0.011507] Spectre V2 : Spectre v2 mitigation: Enabling Indirect Branch
Prediction Barrier
[ 0.011645] Spectre V2 : Enabling Restricted Speculation for firmware calls
After you updated sys-firmware/intel-microcode did you rebuild and reboot the
*rebuilt* kernel on both PCs?
PS. For good measure I ran make clean first, but I'm not sure if this affects
the firmware.
--
Regards,
Mick
[-- Attachment #2: This is a digitally signed message part. --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [gentoo-user] spec_store_bypass mitigation
2018-06-09 19:08 ` Mick
@ 2018-06-13 6:22 ` zless
0 siblings, 0 replies; 3+ messages in thread
From: zless @ 2018-06-13 6:22 UTC (permalink / raw
To: gentoo-user
Hi Mick
În ziua de sâmbătă, 9 iunie 2018, la 22:08:23 EEST, Mick a scris:
> On Thursday, 7 June 2018 08:37:41 BST zless wrote:
> > Hello,
> >
> > I just finished installing kernel 4.14.48 on two
> > Intel laptops and I have different results for
> >
> > /sys/devices/system/cpu/vulnerabilities/spec_store_bypass
> >
> > On one of them it looks nice:
> > "Mitigation: Speculative Store Bypass disabled via prctl and seccomp"
> > but on the other it still says "Vulnerable".
> >
> > Any idea on what might influence this? The kernel configs are fairly
> > similar, the only thing that's different is the microcode, which is from
> > 2017 for the "vulnerable" one.
> >
> > Thanks
>
> I would think it is cause by the microcode.
>
> After you updated sys-firmware/intel-microcode did you rebuild and reboot the
> *rebuilt* kernel on both PCs?
I just booted in a even newer 4.14.49 kernel but no change so far.
dmesg: Speculative Store Bypass: Vulnerable
I can only conclude that yes, it is closely related to the firmware version.
Thanks
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2018-06-13 6:23 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2018-06-07 7:37 [gentoo-user] spec_store_bypass mitigation zless
2018-06-09 19:08 ` Mick
2018-06-13 6:22 ` zless
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox