ono to nie je tak jednoznačné
Niečo majú pôvodné jadrá Zen (17h family)
a niečo
mali neskoršie vylepšenia architektúry Bulldozer (15h family) niekedy po roku 2011
ale Jaguar (16h family) to nemala
hlavná stránka sráv AMD
AMD Processor Security
AMD Processors: Google Project Zero, Spectre and Meltdown
Recent Updates
Whitepaper: Managing Speculation on AMD Processors -
1/24/2018
AMD Processor Security Page -
1/11/2018
https://www.amd.com/en-us/who-we-are/newsrooma tá security page
Software Techniques for Managing Speculation on AMD Processors Whitepaper
1/24/2018
In response to recently disclosed research techniques capable of exploiting the speculative behavior of modern processors to leak information to unauthorized code, AMD has published a whitepaper that provides software developers with guidance on options for managing speculative execution on AMD processors.
https://www.amd.com/en/corporate/speculative-executionA ten whitepaper
MITIGATION G-3
Description:
Enable Supervisor Mode Execution Protection (SMEP).
Effect:
The processor will never speculatively fetch instruction bytes in supervisor mode if the RIP address
points to a user page. This prevents the attacker from redirecting the kernel indirect branch to a target in
user code.
Applicability:
All AMD processors that support SMEP (Family 17h, Family 15h model >60h
MITIGATION G-4
Description:
Enable SMAP (Supervisor Mode Access Protection)
Effect:
The processor will never initiate a fill if the translation has a SMAP violation (kernel accessing
user memory). This can prevent the kernel from bringing in user data cache lines. With SMEP and SMAP
enabled the attacker must find an indirect branch to attack in the area marked by SMAP that is allowed to
access user marked memory.
Applicability:
All AMD processors which support SMAP ( family 17h and greater).
http://developer.amd.com/wordpress/media/2013/12/Managing-Speculation-on-AMD-Processors.pdfa chyba nebola asi neznáma dlhšie
Co tvrdil Theo de Raadt před 11 lety?
V souvislosti s chybami Spectre / Meltdown koluje nyní internetem také neustálé odkazování na mailing list OpenBSD, kde Theo de Raadt v červnu 2007 velmi nelichotivě komentoval procesory Intel Core 2. Závěr si učiňte sami.
https://www.root.cz/clanky/novy-vyvoj-kolem-spectre-a-meltdown-a-nastvany-linus-torvalds/List: openbsd-misc
Subject: Intel Core 2
From: Theo de Raadt <deraadt () cvs ! openbsd ! org>
Date: 2007-06-27 17:08:16
Message-ID: 200706271708.l5RH8GkK024621 () cvs ! openbsd ! org
[Download message RAW]
Various developers are busy implimenting workarounds for serious bugs
in Intel's Core 2 cpu.
These processors are buggy as hell, and some of these bugs don't just
cause development/debugging problems, but will *ASSUREDLY* be
exploitable from userland code.
https://marc.info/?l=openbsd-misc&m=118296441702631A keďže vývoj CPU trvá č rokz je to celé divné.. Asi AMS skúšalo niečo už vtedy a teraz to využíva
Takže uvidíme...