If you arerunning a current kernel, in
/sys/devices/system/cpu/vulnerabilities you will see there is now an
entry for spec_store_bypass.

On intel machines, you will need updated firmware to be able to fix
that.  So, I looked at the latest (20180425) firmware for my
haswell.  There _is_ a new version there (0x24, dated from January)
but that is NOT enough, that file still says 'Vulnerable'.

On AMD, new firmware is apparently not needed.

With linux-4.17.0 on my ryzen that file contains

Mitigation: Speculative Store Bypass disabled via prctl and seccomp

but that actually means soemthing like "only a program which uses
seccomp, for the new prctl for this, will be mitigated".

I found the documentation hard to grok (too many negatives), but
apparently adding a bootarg of spec_store_bypass_disable=on does
turn it on all the time on suitable machines.

The reason it is not normally enabled all the time is that it will
apparently slow things down a lot.  I hope to do _some_ tests with
it set, but for the moemnt I don't have time.

ĸen
-- 
              Keyboard not found, Press F1 to continue
-- 
http://lists.linuxfromscratch.org/listinfo/blfs-support
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to