Date: Sun, 26 May 2019 16:24:56 +0200 From: =?UTF-8?Q?=c5=81ukasz_W=c4=85sikowski?= <lukasz@wasikowski.net> To: freebsd-security@freebsd.org Subject: Re: CVE-2017-5753 (Spectre Variant 1, bounds check bypass) Message-ID: <deb34b84-a90c-3dfc-2a2c-521a210e2c45@wasikowski.net> In-Reply-To: <95d36182-df26-be72-972e-2f468be4a939@gmail.com> References: <95d36182-df26-be72-972e-2f468be4a939@gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
W dniu 2019-05-26 o 16:17, freneza pisze: > Are there any plans to mitigate Spectre Variant 1? > > I ran `spectre-meltdown-checker.sh` from > https://raw.githubusercontent.com/speed47/spectre-meltdown-checker/master/spectre-meltdown-checker.sh > and it says there is not mitigation for BSD yet. And how about retpoline for Spectre Variant 2? AFAIR FreeBSD use IBRS which is much slower than retpoline. -- best regards, Lukasz Wasikowski
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?deb34b84-a90c-3dfc-2a2c-521a210e2c45>