tech-net archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: BPF64: proposal of platform-independent hardware-friendly backwards-compatible eBPF alternative
> [...] but isn't that (Spectre) an x86-specific thing?
No. Indeed, the Kicher/Genkin/Gruss/et al paper says, in its second
paragraph, that "vulnerable speculative execution capabilities are
found in microprocessors from Intel, AMD, and ARM". Any processor with
speculative execution and side-channels is in principle at risk; I
haven't looked at others in enough detail, but I'd be surprised if
there weren't at least a few others. (The first ones I'd look at are
PowerPC and RISC V.)
ARM and x86 are particularly bad not because they are more vulnerable
(though they may be), but because they are _very_ heavily used.
/~\ The ASCII Mouse
\ / Ribbon Campaign
X Against HTML mouse%rodents-montreal.org@localhost
/ \ Email! 7D C8 61 52 5D E7 2D 39 4E F1 31 3E E8 B3 27 4B
Home |
Main Index |
Thread Index |
Old Index