Re: [BUG] x86 : i486 reporting to be vulnerable to Meltdown/Spectre_V1/Spectre_V2

From: Alan Cox
Date: Thu Feb 08 2018 - 15:54:25 EST


> > Also worth nothing that the difference between the cpu and memory
> > speeds is much lower - so far fewer instructions could be speculatively
> > executed while waiting a cache miss.

But they also have more instructions that take a lot of clocks and are
easier to stall - eg by doing things like opening and mmapping
a framebuffer and then doing a floating point double store to it
misaligned.

Meltdown we can at least reasonably test but spectre is hard.

Alan