Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 26 May 2019 16:24:56 +0200
From:      =?UTF-8?Q?=c5=81ukasz_W=c4=85sikowski?= <lukasz@wasikowski.net>
To:        freebsd-security@freebsd.org
Subject:   Re: CVE-2017-5753 (Spectre Variant 1, bounds check bypass)
Message-ID:  <deb34b84-a90c-3dfc-2a2c-521a210e2c45@wasikowski.net>
In-Reply-To: <95d36182-df26-be72-972e-2f468be4a939@gmail.com>
References:  <95d36182-df26-be72-972e-2f468be4a939@gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
W dniu 2019-05-26 o 16:17, freneza pisze:

> Are there any plans to mitigate Spectre Variant 1?
> 
> I ran `spectre-meltdown-checker.sh` from
> https://raw.githubusercontent.com/speed47/spectre-meltdown-checker/master/spectre-meltdown-checker.sh
> and it says there is not mitigation for BSD yet.

And how about retpoline for Spectre Variant 2? AFAIR FreeBSD use IBRS
which is much slower than retpoline.

-- 
best regards,
Lukasz Wasikowski



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?deb34b84-a90c-3dfc-2a2c-521a210e2c45>