[libre-riscv-dev] [Bug 209] spectre-proof speculative execution

bugzilla-daemon at libre-soc.org bugzilla-daemon at libre-soc.org
Mon May 18 20:06:41 BST 2020


https://bugs.libre-soc.org/show_bug.cgi?id=209

Yehowshua <yimmanuel3 at gatech.edu> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |yimmanuel3 at gatech.edu

--- Comment #3 from Yehowshua <yimmanuel3 at gatech.edu> ---
According to the Spectre paper here: https://spectreattack.com/spectre.pdf

there are multiple Spectre style vulnerabilities. I will focus here on Spectre
variant 1 from the paper.

The solution I present below comes from the Solutions section of the paper in
"Mitigation Options".

Variant 1 of the attack can be prevented by having commit buffers from L2 or
memory to L1 during speculative execution, and by having a commit buffer from
reg to L1.

Its all about making sure that cache is reverted during L1 so that you can
cache flushes cannot leak sensitive information.

Oh, and cache flushes should be disallowed during speculative execution.

The timing concept you describe

-- 
You are receiving this mail because:
You are on the CC list for the bug.


More information about the libre-riscv-dev mailing list