From owner-freebsd-current@freebsd.org Fri Jan 5 03:32:22 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id CF085EAC6FA for ; Fri, 5 Jan 2018 03:32:22 +0000 (UTC) (envelope-from markmi@dsl-only.net) Received: from asp.reflexion.net (outbound-mail-210-160.reflexion.net [208.70.210.160]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 64E5F72048 for ; Fri, 5 Jan 2018 03:32:21 +0000 (UTC) (envelope-from markmi@dsl-only.net) Received: (qmail 13679 invoked from network); 5 Jan 2018 03:32:15 -0000 Received: from unknown (HELO mail-cs-01.app.dca.reflexion.local) (10.81.19.1) by 0 (rfx-qmail) with SMTP; 5 Jan 2018 03:32:15 -0000 Received: by mail-cs-01.app.dca.reflexion.local (Reflexion email security v8.40.3) with SMTP; Thu, 04 Jan 2018 22:32:15 -0500 (EST) Received: (qmail 31663 invoked from network); 5 Jan 2018 03:32:15 -0000 Received: from unknown (HELO iron2.pdx.net) (69.64.224.71) by 0 (rfx-qmail) with (AES256-SHA encrypted) SMTP; 5 Jan 2018 03:32:15 -0000 Received: from [192.168.1.25] (c-76-115-7-162.hsd1.or.comcast.net [76.115.7.162]) by iron2.pdx.net (Postfix) with ESMTPSA id 53BE1EC8E80 for ; Thu, 4 Jan 2018 19:32:14 -0800 (PST) From: Mark Millard Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\)) Subject: Re: Intel CPU design flaw - FreeBSD affected? Message-Id: <05382876-0605-424D-9BDD-CE1BF6C744CF@dsl-only.net> Date: Thu, 4 Jan 2018 19:32:13 -0800 To: FreeBSD Current X-Mailer: Apple Mail (2.3273) X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 05 Jan 2018 03:32:22 -0000 Darren Reed darrenr at freebsd.org wrote on Thu Jan 4 11:56:29 UTC 2018 : > Most people are only talking about meltdown which doesn't hit AMD. > spectre impacts *both* Intel and AMD. > > SuSE are making available a microcode patch for AMD 17h processors that > disables branch prediction: > > > https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html https://www.amd.com/en/corporate/speculative-execution reports. . . For the Bounds Check Bypass Spectre variant (#1): Resolved by software / OS updates to be made available by system vendors and manufacturers. Negligible performance impact expected. For the Branch Target Injection Spectre variant (#2): Differences in AMD architecture mean there is a near zero risk of exploitation of this variant. Vulnerability to Variant 2 has not been demonstrated on AMD processors to date. For the Rogue Data Cache Load Meltdown variant (#3): Zero AMD vulnerability due to AMD architecture differences. How long #2 will have a "has not been demonstrated" status is yet to be seen. === Mark Millard markmi at dsl-only.net