So Yer.. back to my previous statement about Intel iCode...pjp wrote:Intel Warns Its Patches for Chip Flaws Are Buggypaywall wrote:One Intel partner familiar with the document said it is problematic the company is only notifying select customers they should hold off on the patches. The public has “been given the microcode update but has not been given the important technical information that Intel recommends that you don’t use this,” the partner said.
you missed: Intel kept it from the public that the updated ucode should not be used (but informed their strategic partners)krinn wrote:The info i'm sure about intel release of microcode so far:
- intel said they will release update fix fast (and they did for some) for most cpu made < 5 years
- since the documentation was written, intel has release more microcode (which may include your cpu, you should check latest microcode update)
- intel has also confirm a bug with "haswell" (i don't remember other cpu, but i own an haswell, might be why i remember this one) microcode (the 0x23 early release with fix for the spectre#2) is buggy and face reboot using it.
- intel didn't say anything about cpu past +5 years (which also mean, they didn't say they won't, but they suggest priority on <5years, which "should" imply also fix for +5 years)
That's NOT what they said. They said 'introduced', not 'made'. This difference is important for Ivy Bridge CPUs. Many of those CPUs were manufactured or sold within the last 5 years. But unfortunately, they were introduced Q2'12.krinn wrote:- intel said they will release update fix fast (and they did for some) for most cpu made < 5 years
I haven't said too that my haswell is not suffering from the reboot bug, while using 0x23.Naib wrote:you missed: Intel kept it from the public that the updated ucode should not be used (but informed their strategic partners)
Just adding it for clarity -> https://newsroom.intel.com/news/intel-s ... ot-issues/mv wrote:I haven't experienced any problems with it, either, so far.krinn wrote:I haven't said too that my haswell is not suffering from the reboot bug, while using 0x23
mno wrote:More broad article on the microcode side of things:
https://arstechnica.com/gadgets/2018/01 ... et-closer/
That's not what i have saw, nor anything sane to do!https://arstechnica.com/gadgets/2018/01/spectre-and-meltdown-patches-causing-trouble-as-realistic-attacks-get-closer wrote:and Intel is currently recommending that people cease installing a microcode update it issued to help tackle the Spectre problem.
So despite you might end up with the reboot bug, it's something you should still apply.https://newsroom.intel.com/news/intel-security-issue-update-addressing-reboot-issues/ wrote:End-users should continue to apply updates recommended by their system and operating system providers.
Mhm, now what is officially recommended on amd ryzen boxes ? Ehable CONFIG_PAGE_TABLE_ISOLATION=Y PTI and as its autodisabled by default enable it on the kernel command line with "pti=on" ? Or is this not required ?PrSo wrote:pjp wrote:But the underlying issue is still whether or not AMD should have it enabled. From the prior information, the answer appears to be yes.PrSo wrote:So it seems that even if you compile kernel with CONFIG_PAGE_TABLE_ISOLATION=Y PTI is auto-disabled on AMD cpu anyway.pjp wrote: That sounds to me like CONFIG_PAGE_TABLE_ISOLATION should be enabled for AMD processors. Or at least not setting it with the knowledge of leaving the vulnerability exposed.
To enable the functionality, I had to enable the kernel option AND enable it on the kernel command line with "pti=on". After that (and only after that):(I got the idea from Naib's post on page 5 of this thread which referenced "pti=off". Thanks Naib!)Code: Select all
dmesg |grep -i isol [ 0.000000] Kernel/User page tables isolation: force enabled on command line. [ 0.000000] Kernel/User page tables isolation: enabled
I think that you are playing here the advocatus diaboli role.
With the knowledge that the test case provided on wiki page was performed in 2013, and should be mitigated by KAISER (now PTI) I personally think that AMD statement to which you got link in mike155 post is still in power, of course with the assumption that AMD is aware of that vulnerability.
Thomas Lendacky wrote: AMD processors are not subject to the types of attacks that the kernel page table isolation feature protects against.
I know that this could be some kind of uncomfortable situation but there is nothing more we can do for now than to trust AMD with that. Maybe someone will write PoC on that case in the near future proofing that AMD was duly diligent.
If you think different on that subject please feel free to contact AMD an ask them to resolve your possible concerns.

You'll get more accurate information if you read GCC mailing lists: https://gcc.gnu.org/ml/gcc-patches/2018 ... 01303.htmlSpargeltarzan wrote:Does somebody read about a release date for Gcc 7.3 with retpoline? (Phoronix Link)
They write reptoline is merged already into it and it will be released in "a few weeks"


Code: Select all
# dmesg -t | grep gcc
Linux version 4.14.14 (root@xxx) (gcc version 7.2.1 20180117 (GCC)) #2 SMP Thu Jan 18 19:07:37 CET 2018
# dmesg -t | egrep "(isolation|Spectre)"
Kernel/User page tables isolation: enabled
Spectre V2 mitigation: Mitigation: Full generic retpoline
# cd /sys/devices/system/cpu/vulnerabilities
# for file in *; do echo "$file : $(tail -n1 $file)"; done
meltdown : Mitigation: PTI
spectre_v1 : Vulnerable
spectre_v2 : Mitigation: Full generic retpoline
VinzC, looks like you might have missed the announcement from Intel's CEO.VinzC wrote:Hi guys, sorry for hijacking this thread — I haven't delved into it thoroughly but I am wondering if my CPUs will receive fixes. In my laptop is an Ivy Bridge (Intel Core i3-3000), serial number=000306A9 and I can't find it in the Gentoo Meltdown & Spectre info pages. From what I've read in this thread (or was it elsewhere?) Intel would only "fix" (i.e. release updated microcode for) CPUs made during the last 5 years or so, is that correct?
Just need to keep your fingers crossed, because "prioritised by our customers" may not slice the cake for us older CPU freaks.By Jan. 15, we will have issued updates for at least 90 percent of Intel CPUs introduced in the past five years, with updates for the remainder of these CPUs available by the end of January. We will then focus on issuing updates for older products as prioritized by our customers.
I think a kernel recompile will be enough, I just upgraded to 4.14.14 and the tool says:Hossie wrote:Does anyone know about upstream fixes for Spectre V1? And what will be required for that? A GCC Update and a kernel recompile?
Code: Select all
STATUS: VULNERABLE (only 51 opcodes found, should be >= 70, heuristic to be improved when official patches become available)
I was thinking I should keep two versions of the kernel, one secured, one insecure - and use the insecure one to emerge -e world when the machine is airgapped :DSka` wrote:For v2 you need CONFIG_RETPOLINE (available from 4.14.14) and a new GCC (not available yet), then a simple emerge -e world with your new&slower CPU :D