[Simh] Fwd: VAX + Spectre
Clem Cole
clemc at ccc.com
Tue Sep 17 10:42:28 CDT 2019
Paul - be careful. All CPU's post the IBM AGS that used branch prediction
are suspect. Russ Robelen (who was the 360/50 lead, worked on 360/90 and
lead AGS) has the speculative executing patent. I tweaked him when it all
came out and said - look at what you did.
What Russ and team are great ideas and we all have used them since they
first published about it. And the fact is that it took 40 years before
someone even proposed that it was an issue and could become security
exploit (by some folks in German at a security conference) and it Google 18
months to reduce it to practice.
ᐧ
On Tue, Sep 17, 2019 at 9:55 AM Paul Koning <paulkoning at comcast.net> wrote:
> "Spectre" is one of two notorious bugs of modern CPUs involving
> speculative execution. I rather doubt that VAX is affected by this but I
> suspect others here have a lot more knowledge.
>
> paul
>
> Begin forwarded message:
>
> *From: *coypu at sdf.org
> *Subject: **VAX + Spectre*
> *Date: *September 17, 2019 at 5:32:42 AM EDT
> *To: *port-vax at netbsd.org
>
> So, this is a bug report:
> https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86811
>
> GCC would like to know if VAX needs Spectre-related work.
> Are any of the VAXes ever made capable of speculative execution? the
> first tech for doing it was in 1967, so not entirely far-fetched.
>
>
> _______________________________________________
> Simh mailing list
> Simh at trailing-edge.com
> http://mailman.trailing-edge.com/mailman/listinfo/simh
More information about the cctalk
mailing list