[Info-vax] The Road to V9.0
Simon Clubley
clubley at remove_me.eisner.decus.org-Earth.UFP
Thu Oct 10 08:25:34 EDT 2019
On 2019-10-10, clair.grant at vmssoftware.com <clairgrant71 at gmail.com> wrote:
> Below is a recent log from booting the system and executing a few commands and running SDA. (I edited out a bunch of our own debugging messages, otherwise it is the exact screen capture of a real system boot.) Two major things about to round into shape are 1) switching from the memory disk to the real system disk and 2) now that basic exception handling is in place, fleshing out the condition handlers and signaling.
>
[I've changed the subject line back to its original one.]
Ok, now this is starting to look _seriously_ interesting. :-)
Very well done on getting this far. When do you think we might start
seeing some of the user level applications, such as EDT or EVE, running
and a x86 node join a cluster ?
>
> VMS Software, Inc. OpenVMS (TM) x86_64 Operating System, XFBG-N4A
>
> Copyright 2019 VMS Software, Inc.
>
> MDS Mitigation active, variant verw(MD_CLEAR)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
That caught my attention. Which of the other architectural level
vulnerabilities you have had to mitigate against on VMS ?
For anyone wondering what this is all about, the following shows the
steps Red Hat have taken to mitigate against this:
https://www.redhat.com/en/blog/understanding-mds-vulnerability-what-it-why-it-works-and-how-mitigate-it
Thanks for the update Clair,
Simon.
--
Simon Clubley, clubley at remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.
More information about the Info-vax
mailing list