Linux kernel Spectre V2 Vulnerable?
by Crippled from LinuxQuestions.org on (#4WNT3)
While I was searching in my logs hunting down on why I was having random kernel panics I came across this in dmesg: Code: [ 0.002867] Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
[ 0.002868] Spectre V2 : Mitigation: Full AMD retpoline
[ 0.002869] Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
[ 0.002870] Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier
[ 0.002871] Spectre V2 : User space: Vulnerable
[ 0.002872] Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp
[ 0.003091] Freeing SMP alternatives memory: 36K
[ 0.112466] smpboot: CPU0: AMD Ryzen 7 1700 Eight-Core Processor (family: 0x17, model: 0x1, stepping: 0x1)
[ 0.124010] Performance Events: Fam17h core perfctr, AMD PMU driver. What do you say about this line? "[ 0.002871] Spectre V2 : User space: Vulnerable" I have tried 3 different kernels and I get the same. Is this something to be concerned about?


[ 0.002868] Spectre V2 : Mitigation: Full AMD retpoline
[ 0.002869] Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
[ 0.002870] Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier
[ 0.002871] Spectre V2 : User space: Vulnerable
[ 0.002872] Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp
[ 0.003091] Freeing SMP alternatives memory: 36K
[ 0.112466] smpboot: CPU0: AMD Ryzen 7 1700 Eight-Core Processor (family: 0x17, model: 0x1, stepping: 0x1)
[ 0.124010] Performance Events: Fam17h core perfctr, AMD PMU driver. What do you say about this line? "[ 0.002871] Spectre V2 : User space: Vulnerable" I have tried 3 different kernels and I get the same. Is this something to be concerned about?