tech-kern archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: Spectre
On Thu, Jan 18, 2018 at 12:37:11AM +0000, coypu%sdf.org@localhost wrote:
> - Variant 1 seems possible to avoid with low cost. It will likely result
> in an error somewhere along the line, which is detectable. Flushing
> the entire cache on userret will make it hard to exploit. Do all
> bound checks failing result in an easily noticed error?
On further thought, this won't be sufficient protection.
It only protects assuming we:
- Cache memory
- Time access to memory
- Flush cache
- Time access to now cached memory
Flushing on userret/kernel entry is not sufficient because I am assuming
it will need a second trip to userland. it does not, assuming we can
construct our own perfect gadget.
Home |
Main Index |
Thread Index |
Old Index