Hi all! I'm running an up-to-date Centos-7 on an AMD Vishera 6300, 6 core CPU. I note that when I run the redhat script to test for spectre & meltdown I get this result for variant 2: Variant #2 (Spectre): Vulnerable CVE-2017-5715 - speculative execution branch target injection - Kernel with mitigation patches: OK - HW support / updated microcode: NO - IBRS: Not disabled on kernel commandline - IBPB: Not disabled on kernel commandline and when I run the one from github I get this: CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2' * Mitigated according to the /sys interface: NO (kernel confirms your system is vulnerable) * Mitigation 1 * Kernel is compiled with IBRS/IBPB support: YES * Currently enabled features * IBRS enabled for Kernel space: NO * IBRS enabled for User space: NO * IBPB enabled: NO * Mitigation 2 * Kernel compiled with retpoline option: YES * Kernel compiled with a retpoline-aware compiler: UNKNOWN> STATUS: VULNERABLE (Vulnerable: Retpoline without IBPB)So, I"m wondering: 1. has RH in fact released mitigations for this issue for AMD processors, and 2. has AMD released microcode updates for this? I have no idea how to query AMD with such a question, anybody here know? Thanks in advance! -- ---- Fred Smith -- fredex at fcshome.stoneham.ma.us ----------------------------- The eyes of the Lord are everywhere, keeping watch on the wicked and the good. ----------------------------- Proverbs 15:3 (niv) -----------------------------
On 16/03/18 18:24, Fred Smith wrote:> Hi all! > > I'm running an up-to-date Centos-7 on an AMD Vishera 6300, 6 core CPU. >What kernel are you running (uname -r)?> I note that when I run the redhat script to test for spectre & meltdown > I get this result for variant 2: > > Variant #2 (Spectre): Vulnerable > CVE-2017-5715 - speculative execution branch target injection > - Kernel with mitigation patches: OK > - HW support / updated microcode: NO > - IBRS: Not disabled on kernel commandline > - IBPB: Not disabled on kernel commandline > > > and when I run the one from github I get this: > > CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2' > * Mitigated according to the /sys interface: NO (kernel confirms your system is vulnerable) > * Mitigation 1 > * Kernel is compiled with IBRS/IBPB support: YES > * Currently enabled features > * IBRS enabled for Kernel space: NO > * IBRS enabled for User space: NO > * IBPB enabled: NO > * Mitigation 2 > * Kernel compiled with retpoline option: YES > * Kernel compiled with a retpoline-aware compiler: UNKNOWN >> STATUS: VULNERABLE (Vulnerable: Retpoline without IBPB) > > > So, I"m wondering: > 1. has RH in fact released mitigations for this issue for AMD processors, and > 2. has AMD released microcode updates for this? > > I have no idea how to query AMD with such a question, anybody here know? > > Thanks in advance! >
On Fri, Mar 16, 2018 at 09:42:34PM +0000, Phil Perry wrote:> On 16/03/18 18:24, Fred Smith wrote: > >Hi all! > > > >I'm running an up-to-date Centos-7 on an AMD Vishera 6300, 6 core CPU. > > > > What kernel are you running (uname -r)?uname -r 3.10.0-693.21.1.el7.x86_64> > >I note that when I run the redhat script to test for spectre & meltdown > >I get this result for variant 2: > > > >Variant #2 (Spectre): Vulnerable > >CVE-2017-5715 - speculative execution branch target injection > > - Kernel with mitigation patches: OK > > - HW support / updated microcode: NO > > - IBRS: Not disabled on kernel commandline > > - IBPB: Not disabled on kernel commandline > > > > > >and when I run the one from github I get this: > > > >CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2' > >* Mitigated according to the /sys interface: NO (kernel confirms your system is vulnerable) > >* Mitigation 1 > > * Kernel is compiled with IBRS/IBPB support: YES > > * Currently enabled features > > * IBRS enabled for Kernel space: NO > > * IBRS enabled for User space: NO > > * IBPB enabled: NO > >* Mitigation 2 > > * Kernel compiled with retpoline option: YES > > * Kernel compiled with a retpoline-aware compiler: UNKNOWN > >>STATUS: VULNERABLE (Vulnerable: Retpoline without IBPB) > > > > > >So, I"m wondering: > >1. has RH in fact released mitigations for this issue for AMD processors, and > >2. has AMD released microcode updates for this? > > > >I have no idea how to query AMD with such a question, anybody here know? > > > >Thanks in advance! > > > > _______________________________________________ > CentOS mailing list > CentOS at centos.org > https://lists.centos.org/mailman/listinfo/centos-- ---- Fred Smith -- fredex at fcshome.stoneham.ma.us ----------------------------- God made him who had no sin to be sin for us, so that in him we might become the righteousness of God." --------------------------- Corinthians 5:21 ---------------------------------