[Info-vax] Intel x86-64 Processor Design Security Vulnerability?

Stephen Hoffman seaohveh at hoffmanlabs.invalid
Tue Jan 2 21:49:50 EST 2018


On 2018-01-02 18:24:24 +0000, Simon Clubley said:

>> The issue appears specific to Intel x86-64 designs, and does not arise 
>> in the AMD x86-64 designs.
> 
> If this is what it sounds like, I wonder if a microkernel based 
> operating system would be more protected against this than a monolithic 
> operating system would be ?

For those inclined, I'd expect that OpenVMS can be targeted by 
rowhammer on both Itanium and Alpha.  Rowhammer is likely too "new" to 
particularly have hardware mitigations available in either platform, 
too.

VSI hasn't specifically indicated if they're porting OpenVMS directly 
or if they're going to repeat the earlier experimental Mach port.  But 
I'd expect that they're porting without using Mach, given there were no 
discussions of Mach at the boot camp.

For those interested at microkernels, have a look at seL4.  
https://sel4.systems

Once the apparent embargo has been lifted, we'll have a better idea 
what's involved.  But I'd tend to expect most (all?) monolithic kernels 
and microkernels alike will be making changes for Intel x86-64 system 
support, based on what's been rumored.




-- 
Pure Personal Opinion | HoffmanLabs LLC 




More information about the Info-vax mailing list