From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 630C8138334 for ; Wed, 17 Jul 2019 20:51:25 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id C290CE0839; Wed, 17 Jul 2019 20:51:17 +0000 (UTC) Received: from very.loosely.org (very.loosely.org [173.255.215.69]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 60BB0E0825 for ; Wed, 17 Jul 2019 20:51:17 +0000 (UTC) Received: from c-67-174-233-217.hsd1.ca.comcast.net ([67.174.233.217]:33840 helo=foolinux.mooo.com) by ahiker.mooo.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.92-111-1a207ebe0) (envelope-from ) id 1hnqtP-00045f-Jf; Wed, 17 Jul 2019 13:51:15 -0700 Date: Wed, 17 Jul 2019 13:51:06 -0700 From: Ian Zimmerman To: gentoo-user@lists.gentoo.org Subject: [gentoo-user] Re: AMD microcode updates - where are they?! Message-ID: <20190717205106.4qajy7dmc7rctnjr@matica.foolinux.mooo.com> References: <21714265.1ZXtKVbesA@localhost> <2145688.70jHgKrVLc@localhost> Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20180716 X-Loosely-ASN: 7922 X-Archives-Salt: 2de266b5-a4c0-4251-ac04-2ddd9398e845 X-Archives-Hash: 951d2556f74d7a57094d912be44e1376 On 2019-07-17 07:46, Corbin wrote: > My kernel version : 4.19.59 > > Please note that I am using the "experimental" USE FLAG for > "sys-kernel/gentoo-sources". > > CPU selected is "AMD Piledriver" > > Also, I am using the latest firmware for "sys-kernel/linux-firmware" ( > 20190712:0 ). > > Kernel command line parameters on boot : > > "spectre_v2=on spectre_v2_user=on spec_store_bypass_disable=on" A couple paragraphs down in that redhat article it says: Red Hat Enterprise Linux defaults on AMD CPUs: Due to the differences in underlying hardware implementation, AMD X86 systems are not vulnerable to variant #3. The correct default values will be set on AMD hardware based on dynamic checks during the boot sequence. pti=0 ibrs=0 ibpb=1 retp=1 -> fix variant #1 #2 if the microcode update is applied pti=0 ibrs=2 ibpb=1 retp=1 -> fix variant #1 #2 on older processors that can disable indirect branch prediction without microcode updates Note: A microcode patch provided by the vendor must be applied in order for the tunables to be visible. which of course is self-contradictory, so not a full answer but maybe a clue. Are those settings meant to go on a boot command line? -- Please don't Cc: me privately on mailing lists and Usenet, if you also post the followup to the list or newsgroup. To reply privately _only_ on Usenet and on broken lists which rewrite From, fetch the TXT record for no-use.mooo.com.