madfilkentist: (Default)
madfilkentist ([personal profile] madfilkentist) wrote in [personal profile] cellio 2018-01-05 11:43 am (UTC)

That's one of the better explanations of Meltdown I've seen. If I'm reading it correctly, it gives a piece which I hadn't understood before: that the kernel data is, in some circumstances, mapped to an application's address space (i.e., it's at some address, such as 002f3A44), but the application's process has neither read nor write permission for that address. Speculative execution can read that address anyway, which should only allow the result into the processor's cache. Then (I'm still waving hands on this part) the application can somehow sneak a peak at the cache.

Post a comment in response:

(will be screened)
(will be screened if not validated)
If you don't have an account you can create one now.
HTML doesn't work in the subject.
More info about formatting

If you are unable to use this captcha for any reason, please contact us by email at support@dreamwidth.org