|
Message-ID: <20180126164310.13a29ad2@alans-desktop> Date: Fri, 26 Jan 2018 16:43:10 +0000 From: Alan Cox <gnomes@...rguk.ukuu.org.uk> To: "Jason A. Donenfeld" <Jason@...c4.com> Cc: gregkh@...uxfoundation.org, linux-kernel@...r.kernel.org, kernel-hardening@...ts.openwall.com Subject: Re: [PATCH v2] cpu: do not leak vulnerabilities to unprivileged users On Fri, 26 Jan 2018 13:31:58 +0100 "Jason A. Donenfeld" <Jason@...c4.com> wrote: > While it's public information if the CPU in general has spectre/meltdown > bugs, it probably shouldn't be as globally obvious to all unprivileged > users As I replied to you last time you posted this a) The info is already trivially accessible via /proc/cpuinfo or by measurement to an attacker b) Some JIT and other environments need to know Alan
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.