Fwd: VAX + Spectre

Cameron Kaiser spectre at floodgap.com
Tue Sep 17 10:06:10 CDT 2019


> "Spectre" is one of two notorious bugs of modern CPUs involving speculative
> execution.  I rather doubt that VAX is affected by this but I suspect others
> here have a lot more knowledge.

However, even speculative execution isn't enough to make Spectre possible or
feasible. For example, the PowerPC G3 and 7400 CPUs speculatively execute,
but because indirect branches can only be done on special-purpose registers
and the G3 and 7400 halt speculative execution until the SPR is loaded with
the destination address, this means they won't speculatively execute after
any indirect branch in code and makes them resistant to the currently known
variants of Spectre.

Given how weird the VAX can be in some respects, I wouldn't be surprised if
similar idiosyncratic behaviours exist that confound such attacks similarly.

http://tenfourfox.blogspot.com/2018/01/actual-field-testing-of-spectre-on.html

-- 
------------------------------------ personal: http://www.cameronkaiser.com/ --
  Cameron Kaiser * Floodgap Systems * www.floodgap.com * ckaiser at floodgap.com
-- When you're in it up to your ears, keep your mouth shut. -------------------


More information about the cctalk mailing list