Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 5 Jan 2018 10:35:13 -0500
From:      Eric McCorkle <eric@metricspace.net>
To:        =?UTF-8?Q?C_Bergstr=c3=b6m?= <cbergstrom@pathscale.com>
Cc:        Freebsd Security <freebsd-security@freebsd.org>, "freebsd-arch@freebsd.org" <freebsd-arch@freebsd.org>, FreeBSD Hackers <freebsd-hackers@freebsd.org>
Subject:   Re: Intel hardware bug
Message-ID:  <755a65eb-b02e-05c5-e1a2-701cfd8bc837@metricspace.net>
In-Reply-To: <CAOnawYpe5V-kUn4tLWKyBcDmsKqUP9-VNRhfDG48VMFWFbq6Vw@mail.gmail.com>
References:  <736a2b77-d4a0-b03f-8a6b-6a717f5744d4@metricspace.net> <2594.1515141192@segfault.tristatelogic.com> <809675000.867372.1515146821354@mail.yahoo.com> <250f3a77-822b-fba5-dcd7-758dfec94554@metricspace.net> <CAOnawYpe5V-kUn4tLWKyBcDmsKqUP9-VNRhfDG48VMFWFbq6Vw@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On 01/05/2018 09:55, C Bergström wrote:

>     Don't bet on it.  There's reports of AMD vulnerabilities, also for ARM.
>     I doubt any major architecture is going to make it out unscathed.  (But
>     if one does, my money's on Power)
> 
> 
> Nope, the only arch that I'm aware of that gets past this is SPARC(hah!)
> due to the seperate userland and kernel memory virtualization.

Alas, poor Sparc.  I knew them, Horatio...

It looks like Red Hat is indeed reporting Power9 to be vulnerable:

https://access.redhat.com/security/vulnerabilities/speculativeexecution

Unfortunate.  I hope they get fixed silicon out in time for the Talos II
workstation.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?755a65eb-b02e-05c5-e1a2-701cfd8bc837>