L1TF in CentOS

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



Hi,
      I've applied the latest kernel upticks of kernel and microcode_ctl for L1TF.
Just rpm updates and rebooted, no further changes.

kernel-2.6.32-754.3.5.el6.x86_64.rpm
kernel-firmware-2.6.32-754.3.5.el6.noarch.rpm
kernel-headers-2.6.32-754.3.5.el6.x86_64.rpm
perf-2.6.32-754.3.5.el6.x86_64.rpm
microcode_ctl-1.17-33.3.el6_10.x86_64.rpm

L1TF has several mitigations.  So far I can see that only this one is applied.

# cat /sys/devices/system/cpu/vulnerabilities/l1tf
Mitigation: PTE Inversion

Is this the definitive check?  I'm trying to confirm the L1Data Cache flush isn't enabled.    It's ok if only this PTE Inversion is applied for me, I just need
to be sure, because when I read this url from Redhat, it says 2 of the 3
mitigations are enabled by default, but I see only 1:

https://access.redhat.com/security/vulnerabilities/L1TF
"/All mitigations are enabled by default with the exception of disabling
Hyper-Threading, which customers must take explicit manual steps to turn off./"

Also, I haven't been able to find clarity on what mitigations need to be applied
to VMs, which ones to VM servers, which to kvm instances and kvm servers,
and if containers and container servers need any special treatment.

Thanks!
-->Pat
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
https://lists.centos.org/mailman/listinfo/centos




[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]


  Powered by Linux