Annotation of wikisrc/security/meltdown_spectre.mdwn, revision 1.20

1.6       maxv        1: [[!meta title="Meltdown and Spectre Status Page"]]
1.1       maxv        2: 
                      3: Status of the Fixes
                      4: -------------------
                      5: 
1.18      maxv        6: NetBSD-6, and all the anterior releases, have no planned fixes.
                      7: 
1.7       maxv        8: ## Spectre Variant 1
                      9: 
1.1       maxv       10: [[!table data="""
1.18      maxv       11: Port           |Vendor/Model   |Spectre (V1)   |NetBSD-7       |NetBSD-8       |NetBSD-current
                     12: amd64          |Intel          |Vulnerable     |Not fixed      |Not fixed      |Not fixed
                     13: amd64          |AMD            |Vulnerable     |Not fixed      |Not fixed      |Not fixed
                     14: amd64          |VIA            |Unknown        |               |               |
                     15: i386           |Intel          |Vulnerable     |Not fixed      |Not fixed      |Not fixed
                     16: i386           |AMD            |Vulnerable     |Not fixed      |Not fixed      |Not fixed
                     17: i386           |VIA            |Unknown        |               |               |
                     18: mips           |MIPS P5600     |Vulnerable     |Not fixed      |Not fixed      |Not fixed
                     19: mips           |MIPS P6600     |Vulnerable     |Not fixed      |Not fixed      |Not fixed
                     20: mips           |Other Models   |Not vulnerable |               |               |
                     21: ia64           |Intel          |Not vulnerable |               |               |
                     22: riscv          |(Spec.)        |Not vulnerable |               |               |
1.1       maxv       23: """]]
                     24: 
1.7       maxv       25: ## Spectre Variant 2
                     26: 
1.1       maxv       27: [[!table data="""
1.18      maxv       28: Port           |Vendor/Model   |Spectre (V2)   |NetBSD-7       |NetBSD-8       |NetBSD-current
1.19      maxv       29: amd64          |Intel          |Vulnerable     |Not fixed      |Not fixed      |Fixed [MitigB]
                     30: amd64          |AMD            |Vulnerable     |Not fixed      |Not fixed      |Fixed [MitigC]
1.18      maxv       31: amd64          |VIA            |Unknown        |               |               |
                     32: i386           |Intel          |Vulnerable     |Not fixed      |Not fixed      |Not fixed
                     33: i386           |AMD            |Vulnerable     |Not fixed      |Not fixed      |Not fixed
                     34: i386           |VIA            |Unknown        |               |               |
                     35: mips           |MIPS P5600     |Vulnerable     |Not fixed      |Not fixed      |Not fixed
                     36: mips           |MIPS P6600     |Vulnerable     |Not fixed      |Not fixed      |Not fixed
                     37: mips           |Other Models   |Not vulnerable |               |               |
                     38: ia64           |Intel          |Not vulnerable |               |               |
                     39: riscv          |(Spec.)        |Not vulnerable |               |               |
1.1       maxv       40: """]]
                     41: 
1.7       maxv       42: ## Meltdown
                     43: 
1.1       maxv       44: [[!table data="""
1.18      maxv       45: Port           |Vendor/Model   |Meltdown (V3)  |NetBSD-7       |NetBSD-8       |NetBSD-current
1.20    ! maxv       46: amd64          |Intel          |Vulnerable     |Not fixed      |Fixed [MitigA] |Fixed [MitigA]
1.18      maxv       47: amd64          |AMD            |Not vulnerable |               |               |
                     48: amd64          |VIA            |Unknown        |               |               |
                     49: i386           |Intel          |Vulnerable     |Not fixed      |Not fixed      |Not fixed
                     50: i386           |AMD            |Not vulnerable |               |               |
                     51: i386           |VIA            |Unknown        |               |               |
                     52: mips           |MIPS P5600     |Not vulnerable |               |               |
                     53: mips           |MIPS P6600     |Not vulnerable |               |               |
                     54: mips           |Other Models   |Not vulnerable |               |               |
                     55: ia64           |Intel          |Not vulnerable |               |               |
                     56: riscv          |(Spec.)        |Not vulnerable |               |               |
1.1       maxv       57: """]]
                     58: 
1.16      maxv       59: ## Mitigations
                     60: 
                     61: ### Mitigation A: SVS
                     62: 
                     63: Meltdown is mitigated with the SVS feature. It can be dynamically disabled
                     64: by changing the "machdep.svs.enabled" sysctl.
                     65: 
1.19      maxv       66: ### Mitigation B: Intel IBRS
                     67: 
                     68: SpectreV2 can be mitigated with the IBRS method (Intel only for now). If
                     69: the CPU supports this method, it is used automatically. It can be
                     70: dynamically disabled by changing the "machdep.spectre_v2.mitigated"
                     71: sysctl.
                     72: 
                     73: ### Mitigation C: AMD DIS_IND
                     74: 
                     75: SpectreV2 can be mitigated with the DIS_IND method, available only on a
                     76: few AMD families. If the CPU supports this method, it is used
                     77: automatically. It can be dynamically disabled by changing the
                     78: "machdep.spectre_v2.mitigated" sysctl.
                     79: 
1.10      maxv       80: ## External Resources
                     81: 
1.11      maxv       82: * [MIPS Blog Post](https://www.mips.com/blog/mips-response-on-speculative-execution-and-side-channel-vulnerabilities/)
1.12      maxv       83: * [ARM Security Update](https://developer.arm.com/support/security-update)
1.15      maxv       84: * [RISC-V](https://riscv.org/2018/01/more-secure-world-risc-v-isa/)
1.10      maxv       85: 
1.13      maxv       86: ## Notes
                     87: 
                     88: * VIA Technologies did not issue any statement regarding their CPUs. It is not currently known whether they are affected.
                     89: * For Spectre Variant 2, neither Intel, nor AMD, has issued a stable microcode update.
                     90: 

CVSweb for NetBSD wikisrc <wikimaster@NetBSD.org> software: FreeBSD-CVSweb