From owner-freebsd-current@freebsd.org Wed Jan 3 00:56:51 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A51CBE875FF for ; Wed, 3 Jan 2018 00:56:51 +0000 (UTC) (envelope-from imb@protected-networks.net) Received: from mail.protected-networks.net (mail.protected-networks.net [IPv6:2001:470:8d59:1::8]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.protected-networks.net", Issuer "Protected Networks CA" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 6FB287BC34 for ; Wed, 3 Jan 2018 00:56:51 +0000 (UTC) (envelope-from imb@protected-networks.net) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d= protected-networks.net; h=content-transfer-encoding :content-language:content-type:content-type:in-reply-to :mime-version:user-agent:date:date:message-id:from:from :references:subject:subject; s=201508; t=1514941009; bh=cNqblEln eyRGwryzKjElZoH9+efPFkm5RkANx7FB6IE=; b=SO5lbS/ZVf73MUhvg8cnf5be 98dCk8opZxVa0+WjsMVdGl0xJdKxqkure62GRpzvjKHMKtuaYieP+QamyC8FBhKr ytD2HgGiIWZOz/H4MiT7fU4GW/DYpe+csOoCUloSFqvNjdTfSrN3evDh67J1T9TT eJbtxMqkAjET9GaPL6Q= Received: from toshi.auburn.protected-networks.net (toshi.auburn.protected-networks.net [192.168.1.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) (Authenticated sender: imb@mail.protected-networks.net) by mail.protected-networks.net (Postfix) with ESMTPSA id B1CC636E7A; Tue, 2 Jan 2018 19:56:49 -0500 (EST) Subject: Re: Intel CPU design flaw - FreeBSD affected? To: Cy Schubert , Warner Losh Cc: FreeBSD Current References: <20180103001949.6AF4F2C9@spqr.komquats.com> From: Michael Butler Openpgp: id=6F63E6399DCC8E3E94D60F0642FF6BAE0442D492; url=0442D492 Message-ID: <5787e63c-9a88-c807-c132-572e8454a4d0@protected-networks.net> Date: Tue, 2 Jan 2018 19:56:48 -0500 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:52.0) Gecko/20100101 Thunderbird/52.5.2 MIME-Version: 1.0 In-Reply-To: <20180103001949.6AF4F2C9@spqr.komquats.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 03 Jan 2018 00:56:51 -0000 On 01/02/18 19:20, Cy Schubert wrote: > This Linux commit gives us a hint. > > https://lkml.org/lkml/2017/12//27/2 Sadly, the articles I've read to date make no mention of which Intel silicon revs are vulnerable. However, the use of the PCID feature, which is only available on more recent CPUs, does seem to afford a slightly lesser performance hit when completely splitting the kernel and user address space mappings :-( imb