From owner-freebsd-security@freebsd.org Thu Jan 4 17:06:26 2018 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 2931DEA5DAE for ; Thu, 4 Jan 2018 17:06:26 +0000 (UTC) (envelope-from eric@metricspace.net) Received: from mail.metricspace.net (mail.metricspace.net [IPv6:2001:470:1f11:617::107]) by mx1.freebsd.org (Postfix) with ESMTP id B811973F95 for ; Thu, 4 Jan 2018 17:06:25 +0000 (UTC) (envelope-from eric@metricspace.net) Received: from [192.168.43.57] (mobile-166-171-187-140.mycingular.net [166.171.187.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) (Authenticated sender: eric) by mail.metricspace.net (Postfix) with ESMTPSA id 714AE85D5; Thu, 4 Jan 2018 17:06:23 +0000 (UTC) Subject: Re: Intel hardware bug From: Eric McCorkle To: Brett Glass , =?UTF-8?Q?Dag-Erling_Sm=c3=b8rgrav?= , Erich Dollansky Cc: "freebsd-security@freebsd.org" , "Ronald F. Guilmette" References: <02563ce4-437c-ab96-54bb-a8b591900ba0@FreeBSD.org> <19876.1515025752@segfault.tristatelogic.com> <20180104132807.266fe46c.freebsd.ed.lists@sumeritec.com> <86vaghu0ps.fsf@desk.des.no> <201801041552.IAA17267@mail.lariat.net> <736a2b77-d4a0-b03f-8a6b-6a717f5744d4@metricspace.net> <201801041621.JAA17566@mail.lariat.net> Message-ID: <13341e69-a8f5-253d-ccb8-e2c14d2322f9@metricspace.net> Date: Thu, 4 Jan 2018 12:06:22 -0500 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:52.0) Gecko/20100101 Thunderbird/52.5.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 04 Jan 2018 17:06:26 -0000 On 01/04/2018 12:03, Eric McCorkle wrote: > You could block meltdown, I suppose, by making the entire > kernel address space absolutely forbidden under penalty of an > uncatchable signal. Actually, scratch that; it doesn't work. The caches are still affected, and could be measured by another core. I suppose you could attempt to flush them upon killing a process in this way, but you still have a window, so it's only a probabilistic defense.