On 04.01.2018 22:07, Michael Butler wrote:
>
> Interestingly, the Xeon 5400 series is not listed as vulnerable in the
> Intel documentation where the 5500 and 5600s are; I checked as I have a
> bunch of E5440s in service.
>
> https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088
On 04.01.2018 19:51, Jan Kokemüller wrote:
> It is possible to emulate a high resolution counter with a thread that
> continuously increments a variable [1]. This is the reason why browser
> vendors are currently disabling the SharedArrayBuffer feature [2].
>
> [1]:
> https://gist.github.com/Eri
Hello,
I disabled the ldtsc and ldtscp instructions for usermode on one of my
production servers:
% ./spectre
Reading 40 bytes:
Bus error (core dumped)
All PoC code I have seen today relies on those instructions.
Is there any other way to measure the memory/cache access times ?
On 10.4-RELEASE
On 04.01.2018 19:23, Klaus P. Ohrhallinger wrote:
> Hello,
>
> I disabled the ldtsc and ldtscp instructions for usermode on one of my
> production servers:
>
Oops, RDTSC of course.
___
freebsd-current@freebsd.org mai