[Webkit-unassigned] [Bug 181453] Spectre bound check mitigation efficiency

bugzilla-daemon at webkit.org bugzilla-daemon at webkit.org
Tue Jan 9 19:18:12 PST 2018


--- Comment #2 from dougc <dtc-llvm at scieneer.com> ---
> This doesn’t completely fix Spectre since the CPU will sometimes verify the branch after the leaking load. There is nothing in your code snippet that prevents this. 

Yes that is a possibility, but to me an unknown. Did you get some confirmation from Intel etc on this, or is it just that this in an unknown?

If it has to be masking, or other data flow strategies to limit the index, then so be it, but just wanted to be sure.

You are receiving this mail because:
You are the assignee for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.webkit.org/pipermail/webkit-unassigned/attachments/20180110/c762fcc3/attachment.html>

More information about the webkit-unassigned mailing list