Diff for /wikisrc/security/meltdown_spectre.mdwn between versions 1.22 and 1.23

version 1.22, 2018/04/05 08:46:42 version 1.23, 2018/04/08 09:01:37
Line 26  riscv  |(Spec.) |Not vulnerable |  |  | Line 26  riscv  |(Spec.) |Not vulnerable |  |  |
   
 [[!table data="""  [[!table data="""
 Port            |Vendor/Model   |Spectre (V2)   |NetBSD-7       |NetBSD-8       |NetBSD-current  Port            |Vendor/Model   |Spectre (V2)   |NetBSD-7       |NetBSD-8       |NetBSD-current
 amd64           |Intel          |Vulnerable     |Not fixed      |Not fixed      |Fixed [MitigB]  amd64           |Intel          |Vulnerable     |Not fixed      |Not fixed      |Fixed [MitigB] [MitigD]
 amd64           |AMD            |Vulnerable     |Not fixed      |Not fixed      |Fixed [MitigC]  amd64           |AMD            |Vulnerable     |Not fixed      |Not fixed      |Fixed [MitigC] [MitigD]
 amd64           |VIA            |Unknown        |               |               |  amd64           |VIA            |Unknown        |               |               |
 i386            |Intel          |Vulnerable     |Not fixed      |Not fixed      |Not fixed  i386            |Intel          |Vulnerable     |Not fixed      |Not fixed      |Fixed [MitigD]
 i386            |AMD            |Vulnerable     |Not fixed      |Not fixed      |Fixed [MitigC]  i386            |AMD            |Vulnerable     |Not fixed      |Not fixed      |Fixed [MitigC]
 i386            |VIA            |Unknown        |               |               |  i386            |VIA            |Unknown        |               |               |
 mips            |MIPS P5600     |Vulnerable     |Not fixed      |Not fixed      |Not fixed  mips            |MIPS P5600     |Vulnerable     |Not fixed      |Not fixed      |Not fixed
Line 77  few AMD families. If the CPU supports th Line 77  few AMD families. If the CPU supports th
 automatically. It can be dynamically disabled by changing the  automatically. It can be dynamically disabled by changing the
 "machdep.spectre_v2.mitigated" sysctl.  "machdep.spectre_v2.mitigated" sysctl.
   
   ### Mitigation D: Retpoline
   
   SpectreV2 is mitigated in the kernel with the GCC "retpoline" compilation
   flag, which is enabled by default in GENERIC.
   
 ## External Resources  ## External Resources
   
 * [MIPS Blog Post](https://www.mips.com/blog/mips-response-on-speculative-execution-and-side-channel-vulnerabilities/)  * [MIPS Blog Post](https://www.mips.com/blog/mips-response-on-speculative-execution-and-side-channel-vulnerabilities/)

Removed from v.1.22  
changed lines
  Added in v.1.23


CVSweb for NetBSD wikisrc <wikimaster@NetBSD.org> software: FreeBSD-CVSweb