-
Notifications
You must be signed in to change notification settings - Fork 476
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2020-0543 aka 'Special Register Buffer Data Sampling (SRBDS)' vs mitigation status: "Mitigation: Microcode" #492
Comments
rdmsr -d 0x123 |
Note that the kernel is now booted with srbds=on explicitly |
According to Intel's specs, the register should be 0 if enabled and 1 if disabled, while rdmsr returns 4 in this case. The presence of the msr and bit 0 gives a feedback. The cpuid request to check support for the mitigation seems to be fine in the script. |
Intel specs says bit 0 matters, while bits 1:63 are reserved for MSR 0x123... |
|
How the . I paste diff contents properly here? |
I have the same problem. It says I'm affected but I have mitigation on microcode. I have an i7-10510U processor. |
You could create a block of code in MarkDown and paste the patch inside of it. |
Running the tool on a Coffee-Lake Xeon (E-2286M) running kernel 6.8.9 gives the following output:
CVE-2020-0543 aka 'Special Register Buffer Data Sampling (SRBDS)'
However issuing: cat /sys/devices/system/cpu/vulnerabilities/srbds
reports:
"Mitigation: Microcode"
Shouldn't it be OK?
Thx:
Dw.
The text was updated successfully, but these errors were encountered: