Re: [RFC][PATCH 00/17] Fix up the recent SRSO patches

From: a-development
Date: Mon Apr 22 2024 - 03:01:22 EST


Hello. I have installed the kernel through https://aur.archlinux.org/packages/linux-mainline and noticed that SRSO is disabled. "Speculative Return Stack Overflow: IBPB-extending microcode not applied!"

cat /sys/devices/system/cpu/vulnerabilities/spec_rstack_overflow
Vulnerable: Safe RET, no microcode

So far, I have been succesfully suspending the one night I used it.

Assuming this is per-default, I've installed the kernel module for my PCIe Capture card and testing it.

Any new instructions?

Thanks

On 17.04.2024 11:12, Borislav Petkov wrote:
On Wed, Apr 17, 2024 at 08:08:53AM +0000, a-development@xxxxxxxxx wrote:
Today I failed to suspend, and the spec_rstack thing was off.

https://up.tail.ws/txt/non-working-suspend-2.txt

Ok, but please do not top-post. Put your reply underneath the next
you're replying to and remove the rest of the quoted text like I just
did.

So this could be caused by the proprietary module or something else.

If you want this debugged, you'd have to try to reproduce it with the
latest upstream kernel from here:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git

after having removed the propietary module.

HTH.