On Thu, Jan 4, 2018 at 9:54 AM, Neale Ferguson <[email protected]> wrote:

> Red hat issued a vulnerability alert and include Z and Power:
> https://access.redhat.com/security/vulnerabilities/speculativeexecution
>
> It provides no details of why. Given the different pipeline architectures
> I'd like to know why.
>
> The fix for Intel et alii appears to be separate address spaces but Z has
> always had that.
>

​So, if I am understanding the problem correctly, the exploit is fixed on
Linux/Intel by not mapping the kernel data into every user's address space,
but separating the user's address space from the kernel's address space.
And you are saying that Linux on z always maintained this separation. Or am
I still fuzzy on the actual problem?​


-- 
I have a theory that it's impossible to prove anything, but I can't prove
it.

Maranatha! <><
John McKown

----------------------------------------------------------------------
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390
----------------------------------------------------------------------
For more information on Linux on System z, visit
http://wiki.linuxvm.org/

Reply via email to