> "Spectre" is one of two notorious bugs of modern CPUs involving speculative > execution. I rather doubt that VAX is affected by this but I suspect others > here have a lot more knowledge.
However, even speculative execution isn't enough to make Spectre possible or feasible. For example, the PowerPC G3 and 7400 CPUs speculatively execute, but because indirect branches can only be done on special-purpose registers and the G3 and 7400 halt speculative execution until the SPR is loaded with the destination address, this means they won't speculatively execute after any indirect branch in code and makes them resistant to the currently known variants of Spectre. Given how weird the VAX can be in some respects, I wouldn't be surprised if similar idiosyncratic behaviours exist that confound such attacks similarly. http://tenfourfox.blogspot.com/2018/01/actual-field-testing-of-spectre-on.html -- ------------------------------------ personal: http://www.cameronkaiser.com/ -- Cameron Kaiser * Floodgap Systems * www.floodgap.com * [email protected] -- When you're in it up to your ears, keep your mouth shut. -------------------
