LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Hardware
User Name
Password
Linux - Hardware This forum is for Hardware issues.
Having trouble installing a piece of hardware? Want to know if that peripheral is compatible with Linux?

Notices


Reply
  Search this Thread
Old 11-20-2020, 07:19 PM   #1
PauloEduardo
LQ Newbie
 
Registered: Nov 2020
Distribution: Debian
Posts: 11

Rep: Reputation: Disabled
Exclamation Spectre mitigation: LFENCE not serializing, switching to generic retpoline


Every time I start the system, this error appears:

Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Spectre V2 : Spectre mitigation: LFENCE not serializing, switching to generic retpoline
Spectre V2 : Mitigation: Full generic retpoline
Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch

Sorry if the English is bad, I'm using a translator.
 
Old 11-21-2020, 01:18 AM   #2
ondoho
LQ Addict
 
Registered: Dec 2013
Posts: 19,872
Blog Entries: 12

Rep: Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053
Does your system still work/boot?
Unless you're running a server you can probably forget about the error.

Have you searched for the error?

Are you aware of the Spectre security vulnerability?

Last edited by ondoho; 11-21-2020 at 01:20 AM.
 
Old 11-21-2020, 02:53 PM   #3
PauloEduardo
LQ Newbie
 
Registered: Nov 2020
Distribution: Debian
Posts: 11

Original Poster
Rep: Reputation: Disabled
Arrow

Quote:
Does your system still work/boot?
Yes.

Quote:
Have you searched for the error?
Yes.

Quote:
Are you aware of the Spectre security vulnerability?
Yes.

My processor model is: AMD Athlon(tm) 64 Processor 3500+
 
Old 11-22-2020, 09:14 PM   #4
PauloEduardo
LQ Newbie
 
Registered: Nov 2020
Distribution: Debian
Posts: 11

Original Poster
Rep: Reputation: Disabled
In short: I want to know, if it is worth solving this problem. If I solve this problem, my computer's performance will increase.
 
Old 11-23-2020, 12:36 AM   #5
EdGr
Senior Member
 
Registered: Dec 2010
Location: California, USA
Distribution: I run my own OS
Posts: 1,061

Rep: Reputation: 492Reputation: 492Reputation: 492Reputation: 492Reputation: 492
Spectre is problematic only for servers that run untrusted code.

If a client machine is running any code that is trying to steal your data, there are much easier ways to do that than Spectre.
Ed
 
Old 11-23-2020, 02:44 AM   #6
obobskivich
Member
 
Registered: Jun 2020
Posts: 614

Rep: Reputation: Disabled
Note that this is not saying spectre mitigations are not in place, or that you should disregard security, its simply saying a different means of mitigation is being employed. You can run spectre-meltdown-checker (https://github.com/speed47/spectre-meltdown-checker) to check this - I have an older Athlon64 that throws this same output in dmesg as well, and spectre-meltdown-checker seems to indicate the cause is a lack of microcode support on the CPU's side (this is unfixable on our end - AMD would have to do it), unless I'm fully misunderstanding the output (and to note: my newer AMD systems show a microcode update associated with this mitigation).

As far as 'will your machine perform better' - probably not, because this is 'as good as it gets' for that CPU would be my guess. As far as rolling back to some older, unpatched kernel, I'd probably not do that, and just let this go as-is. The really severe performance impacts that made it into the news were A) largely overblown and B) mostly confined to Intel chips, so basically 'it is what it is.' If you want more performance for this computer, I'd say you're better off upgrading the CPU - Athlon64 3500+ is exceptionally dated, and even if you don't want to/can't build an all new computer, you can probably upgrade to a faster CPU (you'd need to know which socket your 3500+ is - if its a socket 939 or AM2 you can probably get a dual-core; if its an AM2 you may even be able to get a triple, quad, or hexa core).
 
Old 11-23-2020, 11:29 PM   #7
ondoho
LQ Addict
 
Registered: Dec 2013
Posts: 19,872
Blog Entries: 12

Rep: Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053
Quote:
Originally Posted by PauloEduardo View Post
If I solve this problem, my computer's performance will increase.
I suspect the opposite.
Fixing the SPECTRE vulnerablility will definitely and significantly decrease performance.
Which is why, IIRC, the mainline kernel leaves it unfixed; it's up to the user to activate the fix.
 
Old 11-24-2020, 12:24 PM   #8
PauloEduardo
LQ Newbie
 
Registered: Nov 2020
Distribution: Debian
Posts: 11

Original Poster
Rep: Reputation: Disabled
It looks like "If I solve this problem, my computer's performance will increase." has been misinterpreted. Excuse me for forgetting the question mark, I was asking a question and not a statement. (Perhaps, the translator is leaving the context a little different)
 
Old 11-24-2020, 06:44 PM   #9
obobskivich
Member
 
Registered: Jun 2020
Posts: 614

Rep: Reputation: Disabled
Quote:
Originally Posted by ondoho View Post
I suspect the opposite.
Fixing the SPECTRE vulnerablility will definitely and significantly decrease performance.
Which is why, IIRC, the mainline kernel leaves it unfixed; it's up to the user to activate the fix.
Then Slackware and Ubuntu aren't using 'the mainline kernel' because on all of my systems it shows as patched against the myriad CVEs and I'm not 'enabling' anything explicitly - again, the notice that this user is getting DOES NOT indicate that protection is not applied, it indicates that protection is 'falling back' due to not finding an MSR that it otherwise expects, and it's on AMD to provide a microcode update to make that MSR available (and they aren't doing that for K8 - I know 15h and Zen are updated, I honestly do not recall if K10 is updated, but they have said K8 and K7 will not receive updates due to age). Also note that the performance woes are really only associated with newer Intel chips (especially Skylake+) on (largely) synthetic benchmarks/workloads, although there is (reportedly) a hit to database performance that may translate to a real-world loss of some % but nothing is going near the 30-40% that the doomsayers originally insisted (which is what, I believe, prompted most people to believe they should 'go without' patches). On AMD and ARM the performance impacts, where even applicable (remember that AMD and ARM are largely unaffected by a lot of the spectre/meltdown CVEs) , is negligible. On Intel, the real-world performance hit is also fairly minimal, but still measurable on platforms where you can test with/without patching - since 9th gen the patches are baked-in from the factory, and this was expanded with 10th and 11th gen, and this does mean that when you see 10900k being compared to Ryzen whatever, there is no 'subtract some % once its secured' - its already doing what it should be doing. The 'worst affected' in terms of performance were the early Skylake chips with SGX that do not have hardware fixes, but even there it is not the 30-40% that made headlines a few years ago.

Quote:
Originally Posted by PauloEduardo View Post
It looks like "If I solve this problem, my computer's performance will increase." has been misinterpreted. Excuse me for forgetting the question mark, I was asking a question and not a statement. (Perhaps, the translator is leaving the context a little different)
As I said in my reply, you very likely cannot 'fix' this - the lack of a microcode update is the 'problem', and only AMD can fix that, and they aren't going to do it for a nearly 20 year old CPU. That being said, your system is working as well as can probably be expected given the context, and it is applying protection against one of the two 'big' CVEs out of this that its potentially vulnerable to. If you want more performance, I would figure out what socket that 3500+ is in, and replace it with something faster.

Last edited by obobskivich; 11-24-2020 at 06:48 PM.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: CentOS Linux 6.10 Released with Retpoline-Based Mitigations for Spectre V2 Flaw LXer Syndicated Linux News 0 07-05-2018 09:14 PM
Spectre and Meltdown Mitigation with Ubuntu 16.04 donald3.heckel Linux - Security 2 04-16-2018 11:32 PM
LXer: Canonical Outs New Ubuntu Kernel Update with Compiler-Based Retpoline Mitigation LXer Syndicated Linux News 0 02-22-2018 08:42 AM
LXer: Purism Progress Report, Spectre Mitigation for Ubuntu, Malicious Chrome Extensions and More LXer Syndicated Linux News 0 01-19-2018 12:43 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Hardware

All times are GMT -5. The time now is 10:42 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration