Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Missing/incomplete/"unknown" data about CPU vulnerabilities #9533

Closed
emanruse opened this issue Oct 23, 2024 · 2 comments
Closed

Missing/incomplete/"unknown" data about CPU vulnerabilities #9533

emanruse opened this issue Oct 23, 2024 · 2 comments
Labels
P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. R: not applicable E.g., help/support requests, questions, discussions, "not a bug," not enough info, not actionable. T: bug Type: bug report. A problem or defect resulting in unintended behavior in something that exists.

Comments

@emanruse
Copy link

Qubes OS release

4.2.3

Brief summary

Some CPU vulnerabilities are reported with missing/incomplete info.

Steps to reproduce

grep . /sys/devices/system/cpu/vulnerabilities/*

or

lscpu

Expected behavior

Meaningful info about each vulnerability and mitigations.

Actual behavior

There is no actual info about some vulnerabilities. Examples of "unknown":

/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status

or

/sys/devices/system/cpu/vulnerabilities/mmio_stale_data:Mitigation: Clear CPU buffers; SMT Host state unknown

The later one is additionally confusing considering, considering the output of journalctl:

[    1.661691] dom0 kernel: cpu 1 spinlock event irq 141
[    1.662029] dom0 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details.
[    1.662046] dom0 kernel: cpu 2 spinlock event irq 142
[    1.662049] dom0 kernel: cpu 3 spinlock event irq 143
@emanruse emanruse added P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. T: bug Type: bug report. A problem or defect resulting in unintended behavior in something that exists. labels Oct 23, 2024
@HW42
Copy link

HW42 commented Oct 24, 2024

In VMs (including dom0) the kernel doesn't have full information about the system. So (as the first message you quoted already hints at) you need to look at the hypervisor. Take a look at xl dmesg (or /var/log/xen/console/hypervisor.log) and see what Xen thinks. In particular the messages starting with Speculative mitigation facilities.

If you think that for a specific vulnerability Linux running inside a Xen VM actually should be able to determine whether the system is susceptible to it, that would be a feature request (or maybe bug) for upstream.

@HW42 HW42 added the R: not applicable E.g., help/support requests, questions, discussions, "not a bug," not enough info, not actionable. label Oct 24, 2024
Copy link

This issue has been closed as "not applicable." Here are some common examples of cases in which issues are closed as not applicable:

We respect the time and effort you have taken to file this issue, and we understand that this outcome may be unsatisfying. Please accept our sincere apologies and know that we greatly value your participation and membership in the Qubes community.

Regarding help and support requests, please note that this issue tracker (qubes-issues) is not intended to serve as a help desk or tech support center. Instead, we've set up other venues where you can ask for help and support, ask questions, and have discussions. By contrast, the issue tracker is more of a technical tool intended to support our developers in their work. We thank you for your understanding.

If anyone reading this believes that this issue was closed in error or that the resolution of "not applicable" is not accurate, please leave a comment below saying so, and we will review this issue again. For more information, see How issues get closed.

@github-actions github-actions bot closed this as not planned Won't fix, can't repro, duplicate, stale Oct 24, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. R: not applicable E.g., help/support requests, questions, discussions, "not a bug," not enough info, not actionable. T: bug Type: bug report. A problem or defect resulting in unintended behavior in something that exists.
Projects
None yet
Development

No branches or pull requests

2 participants