CVE-2021-26341 Straight-line Speculation (SLS) detection of mitigation

The ability to mitigate against this vulnerability was added to the kernel
in Jan 2022 (https://lore.kernel.org/lkml/Yd8o%2FhxM%2FOH3mdQR@zn.tnic/)
Detection is via kernel .config, as this mitigation is not reported in /sys
SLS affects AMD CPUs from Athlon XP through to Ryzen 5000 and EPYC server
processors (https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1026)

Signed-off-by: Rob Gill <rrobgill@protonmail.com>
This commit is contained in:
Rob Gill
2023-03-19 04:17:45 +10:00
parent a2843575be
commit eb53c24093
3 changed files with 82 additions and 4 deletions

View File

@ -24,7 +24,7 @@ jobs:
fi
- name: check direct execution
run: |
expected=15
expected=16
nb=$(sudo ./spectre-meltdown-checker.sh --batch json | jq '.[]|.CVE' | wc -l)
if [ "$nb" -ne "$expected" ]; then
echo "Invalid number of CVEs reported: $nb instead of $expected"
@ -34,7 +34,7 @@ jobs:
fi
- name: check docker-compose run execution
run: |
expected=15
expected=16
docker-compose build
nb=$(docker-compose run --rm spectre-meltdown-checker --batch json | jq '.[]|.CVE' | wc -l)
if [ "$nb" -ne "$expected" ]; then