[Info-vax] Intel junk...Kernel-memory-leaking Intel processor design flaw forces Linux, Windows redesign
Jan-Erik Soderholm
jan-erik.soderholm at telia.com
Sat Jan 6 19:30:28 EST 2018
Den 2018-01-07 kl. 00:09, skrev Andy Burns:
> Tim Streater wrote:
>
>> Does that involve instructions that operate on the cache. Such as
>> "clear cache"?
>
> Yes, for the example I saw
>
> <https://gist.github.com/ErikAugust/724d4a969fb2c6ae1bbd7b2a9e3d4bb6/revisions>
>
>
> but I think it was only using spectre techniques to read from a chunk of
> memory within the same process, to demonstrate how the timing works.
>
> The x86-64 reference manual
>
> <https://www.intel.com/content/dam/www/public/us/en/documents/manuals/64-ia-32-architectures-software-developer-instruction-set-reference-manual-325383.pdf>
>
>
> states
>
> "The CLFLUSH instruction can be used at all privilege levels and is subject
> to all permission checking and faults associated with a byte load"
>
> so perhaps the example is too simplistic and a real attack wouldn't be able
> to flush the target area of memory from the cache lines, unless it already
> had permission to access that memory?
You just have to make sure that nothing that is related to what you are
doing is cached. Such as loading some *other* data that belongs to you.
More information about the Info-vax
mailing list