Mna skor zaraza vcerajksi update webu AMD o chybe,
Ak to chapem spravne, tak Zen ma HW ochranu SMEP a SMAP, ktorych zapnutie rusi/stazuje vyuzitie Spectre a
polovicu z toho maju niektorer Bulldozery ale Jagura tu ochranu nema ani jednu...
Software Techniques for Managing Speculation on AMD Processors Whitepaper
1/24/2018
In response to recently disclosed research techniques capable of exploiting the speculative behavior of modern processors to leak information to unauthorized code, AMD has published a whitepaper that provides software developers with guidance on options for managing speculative execution on AMD processors.
http://www.amd.com/en/corporate/speculative-execution
MITIGATION G-3
Description:
Enable Supervisor Mode Execution Protection (SMEP).
Effect:
The processor will never speculatively fetch instruction bytes in supervisor mode if the RIP address
points to a user page. This prevents the attacker from redirecting the kernel indirect branch to a target in
user code.
Applicability:
All AMD processors that support SMEP (Family 17h, Family 15h model >60h)
MITIGATION G-4
Description:
Enable SMAP (Supervisor Mode Access Protection)
Effect:
The processor will never initiate a fill if the translation has a SMAP violation (kernel accessing
user memory). This can prevent the kernel from bringing in user data cache lines. With SMEP and SMAP
enabled the attacker must find an indirect branch to attack in the area marked by SMAP that is allowed to
access user marked memory.
Applicability:
All AMD processors which support SMAP ( family 17h and greater).
https://www.amd.com/Documents/managing-speculation-on-amd-processors.pdf