[PATCH v3 6/9] asm/nospec: mask speculative execution flows

2018-01-13 Thread Dan Williams
'__array_ptr' is proposed as a generic mechanism to mitigate against Spectre-variant-1 attacks, i.e. an attack that bypasses memory bounds checks via speculative execution). The '__array_ptr' implementation appears safe for current generation cpus across multiple architectures. In comparison,

[PATCH v3 6/9] asm/nospec: mask speculative execution flows

2018-01-13 Thread Dan Williams
'__array_ptr' is proposed as a generic mechanism to mitigate against Spectre-variant-1 attacks, i.e. an attack that bypasses memory bounds checks via speculative execution). The '__array_ptr' implementation appears safe for current generation cpus across multiple architectures. In comparison,