[Info-vax] Intel x86-64 Processor Design Security Vulnerability?
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Tue Jan 2 21:49:50 EST 2018
On 2018-01-02 18:24:24 +0000, Simon Clubley said:
>> The issue appears specific to Intel x86-64 designs, and does not arise
>> in the AMD x86-64 designs.
>
> If this is what it sounds like, I wonder if a microkernel based
> operating system would be more protected against this than a monolithic
> operating system would be ?
For those inclined, I'd expect that OpenVMS can be targeted by
rowhammer on both Itanium and Alpha. Rowhammer is likely too "new" to
particularly have hardware mitigations available in either platform,
too.
VSI hasn't specifically indicated if they're porting OpenVMS directly
or if they're going to repeat the earlier experimental Mach port. But
I'd expect that they're porting without using Mach, given there were no
discussions of Mach at the boot camp.
For those interested at microkernels, have a look at seL4.
https://sel4.systems
Once the apparent embargo has been lifted, we'll have a better idea
what's involved. But I'd tend to expect most (all?) monolithic kernels
and microkernels alike will be making changes for Intel x86-64 system
support, based on what's been rumored.
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list