<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: More on potential processor problems	</title>
	<atom:link href="https://www.dragonflydigest.com/2007/06/29/more-on-potential-processor-problems/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.dragonflydigest.com/2007/06/29/more-on-potential-processor-problems/</link>
	<description>A running description of activity related to DragonFly BSD.</description>
	<lastBuildDate>Fri, 29 Jun 2007 23:39:24 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>
		By: Joe "Floid" Kanowitz		</title>
		<link>https://www.dragonflydigest.com/2007/06/29/more-on-potential-processor-problems/comment-page-1/#comment-13155</link>

		<dc:creator><![CDATA[Joe "Floid" Kanowitz]]></dc:creator>
		<pubDate>Fri, 29 Jun 2007 23:39:24 +0000</pubDate>
		<guid isPermaLink="false">http://www.shiningsilence.com/dbsdlog/index.php/2007/06/29/2312.html#comment-13155</guid>

					<description><![CDATA[Hmm.  Addressed in the Slashdot thread, but:
&quot;AE21 - The execution disable bit is shared between cores. I&#039;m not sure what this means but Intel seems to think that it compromises an anti-hacker feature. Sounds pretty serious.&quot;

I read this the same way as the AC did, and imagine this could be an issue for OSes offering some sort of workaround for legacy software that breaks with it enabled.  Trying to let just one &#039;trusted&#039; process live insecurely for its timeslice would inadvertently do the same for whatever&#039;s running on the other CPU.

Modest practical risk, but ugly (workaround: only use one core) if anyone ever wanted to implement the above.]]></description>
			<content:encoded><![CDATA[<p>Hmm.  Addressed in the Slashdot thread, but:<br />
&#8220;AE21 &#8211; The execution disable bit is shared between cores. I&#8217;m not sure what this means but Intel seems to think that it compromises an anti-hacker feature. Sounds pretty serious.&#8221;</p>
<p>I read this the same way as the AC did, and imagine this could be an issue for OSes offering some sort of workaround for legacy software that breaks with it enabled.  Trying to let just one &#8216;trusted&#8217; process live insecurely for its timeslice would inadvertently do the same for whatever&#8217;s running on the other CPU.</p>
<p>Modest practical risk, but ugly (workaround: only use one core) if anyone ever wanted to implement the above.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: from hades / und wieder mal der Core2Duo		</title>
		<link>https://www.dragonflydigest.com/2007/06/29/more-on-potential-processor-problems/comment-page-1/#comment-13152</link>

		<dc:creator><![CDATA[from hades / und wieder mal der Core2Duo]]></dc:creator>
		<pubDate>Fri, 29 Jun 2007 14:01:24 +0000</pubDate>
		<guid isPermaLink="false">http://www.shiningsilence.com/dbsdlog/index.php/2007/06/29/2312.html#comment-13152</guid>

					<description><![CDATA[[...] Matthew Dillon, der Chef von DragonFly BSD, gab seine Meinung diesbez&#252;glich ab. Darum gings initial, klick.   Post a comment &#8212; Trackback URI RSS 2.0 feed for these comments [...]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] Matthew Dillon, der Chef von DragonFly BSD, gab seine Meinung diesbez&#252;glich ab. Darum gings initial, klick.   Post a comment &mdash; Trackback URI RSS 2.0 feed for these comments [&#8230;]</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
