stable.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* TSA mitigation doesn't work on 6.6.y
@ 2025-07-11 12:03 Thomas Voegtle
  2025-07-11 12:25 ` Borislav Petkov
  0 siblings, 1 reply; 24+ messages in thread
From: Thomas Voegtle @ 2025-07-11 12:03 UTC (permalink / raw)
  To: stable; +Cc: kim.phillips, bp


Hello,

with kernel v6.16-rc5-121-gbc9ff192a6c9 I see this:

cat /sys/devices/system/cpu/vulnerabilities/tsa
Mitigation: Clear CPU buffers

dmesg | grep micro
[    1.479203] microcode: Current revision: 0x0a20102e
[    1.479206] microcode: Updated early from: 0x0a201016

So, this works.

but same machine with 6.6.97:
dmesg | grep micro
[    0.451496] Transient Scheduler Attacks: Vulnerable: Clear CPU buffers
attempted, no microcode
[    1.077149] microcode: Current revision: 0x0a20102e
[    1.077152] microcode: Updated early from: 0x0a201016

so:
cat /sys/devices/system/cpu/vulnerabilities/tsa
Vulnerable: Clear CPU buffers attempted, no microcode

but it is switched on:
zcat /proc/config.gz | grep TSA
CONFIG_MITIGATION_TSA=y

And other stuff which need microcode works:
cat /sys/devices/system/cpu/vulnerabilities/spec_rstack_overflow
Mitigation: Safe RET

without microcode you wwould see:
Vulnerable: Safe RET, no microcode


6.12.37 broken too
6.15.6 works
v6.16-rc5-121-gbc9ff192a6c9 works


This is a:
processor       : 11
vendor_id       : AuthenticAMD
cpu family      : 25
model           : 33
model name      : AMD Ryzen 5 5600X 6-Core Processor
stepping        : 0
microcode       : 0xa20102e


Is something missing in 6.6.y and 6.12.y?


     Thomas


^ permalink raw reply	[flat|nested] 24+ messages in thread

end of thread, other threads:[~2025-07-14 16:33 UTC | newest]

Thread overview: 24+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-07-11 12:03 TSA mitigation doesn't work on 6.6.y Thomas Voegtle
2025-07-11 12:25 ` Borislav Petkov
2025-07-11 13:15   ` Thomas Voegtle
2025-07-11 15:35     ` Borislav Petkov
2025-07-11 16:03       ` Thomas Voegtle
2025-07-11 16:44         ` Borislav Petkov
2025-07-11 16:56           ` Thomas Voegtle
2025-07-11 17:41             ` Borislav Petkov
2025-07-11 18:11               ` Thomas Voegtle
2025-07-11 18:15                 ` Borislav Petkov
2025-07-11 19:18                   ` [PATCH 6.12-stable] x86/CPU/AMD: Properly check the TSA microcode Borislav Petkov
2025-07-13 13:05                     ` Sasha Levin
2025-07-11 19:23                   ` [PATCH 6.6-stable] " Borislav Petkov
2025-07-13 13:30                     ` Sasha Levin
2025-07-11 19:30                   ` [PATCH 6.1-stable] " Borislav Petkov
2025-07-13 13:06                     ` Sasha Levin
2025-07-11 19:45                   ` [PATCH 5.15-stable] " Borislav Petkov
2025-07-12 12:04                     ` Greg KH
2025-07-13 13:06                     ` Sasha Levin
2025-07-13 16:10                       ` Borislav Petkov
2025-07-14  1:50                         ` Sasha Levin
2025-07-14 10:28                           ` Borislav Petkov
2025-07-14 16:30                             ` Sasha Levin
2025-07-14 16:33                               ` Borislav Petkov

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).