Re: [RFC][PATCH 00/17] Fix up the recent SRSO patches
From: a-development
Date: Mon Apr 22 2024 - 03:01:22 EST
Hello. I have installed the kernel through
https://aur.archlinux.org/packages/linux-mainline and noticed that SRSO
is disabled. "Speculative Return Stack Overflow: IBPB-extending
microcode not applied!"
cat /sys/devices/system/cpu/vulnerabilities/spec_rstack_overflow
Vulnerable: Safe RET, no microcode
So far, I have been succesfully suspending the one night I used it.
Assuming this is per-default, I've installed the kernel module for my
PCIe Capture card and testing it.
Any new instructions?
Thanks
On 17.04.2024 11:12, Borislav Petkov wrote:
On Wed, Apr 17, 2024 at 08:08:53AM +0000, a-development@xxxxxxxxx
wrote:
Today I failed to suspend, and the spec_rstack thing was off.
https://up.tail.ws/txt/non-working-suspend-2.txt
Ok, but please do not top-post. Put your reply underneath the next
you're replying to and remove the rest of the quoted text like I just
did.
So this could be caused by the proprietary module or something else.
If you want this debugged, you'd have to try to reproduce it with the
latest upstream kernel from here:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
after having removed the propietary module.
HTH.