On 5/01/2018 5:10 PM, Cannaerts, Jan wrote:
If a similar attack works, as long as it's addressable, you can read it.
I do not exactly know where the DAT tables live, and if they, or the real 
address
they reside at are in fetch-protected common storage, you could get a hold of 
them.
But regardless, I do not believe you can read using real addresses without
executing privileged instructions at some point.

We'll most likely never find out whether or not this flaw exists on z/Arch, as
IBM is going to patch this. I'd try it out but I have neither the time nor
the hardware.

Example code is already out there https://gist.github.com/ErikAugust/724d4a969fb2c6ae1bbd7b2a9e3d4bb6. I built this on my PC and it worked! Is there a zArch instruction to flush a cache line like the _mm_clflush() built-in for x86? If so it would be easy to compile and run spectre.c on z/OS and see what happens.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to