Sujet : Re: Another security vulnerability
De : tkoenig (at) *nospam* netcologne.de (Thomas Koenig)
Groupes : comp.archDate : 27. Mar 2024, 09:20:49
Autres entêtes
Organisation : A noiseless patient Spider
Message-ID : <uu0kt1$2nr9j$1@dont-email.me>
References : 1 2 3
User-Agent : slrn/1.0.3 (Linux)
Michael S <
already5chosen@yahoo.com> schrieb:
In case you missed it, the web page contains link to pdf:
https://gofetch.fail/files/gofetch.pdf
Looking the paper, it seems that a separate "load value" instruction
(where it is guaranteed that no pointer prefetching will be done)
could fix this particular issue. Compilers know what type is being
loaded from memory, and could issue the corresponding instruction.
This would not impact performance.
Only works for new versions of an architecture, and supporting
compilers, but no code change would be required. And, of course,
it would eat up opcode space.