Date: Thu, 4 Jan 2018 11:18:10 -0700 From: Gordon Tetlow <gordon@tetlows.org> To: Julian Elischer <julian@freebsd.org> Cc: Lev Serebryakov <lev@freebsd.org>, "freebsd-security@freebsd.org" <freebsd-security@freebsd.org> Subject: Re: clang way to patch for Spectre? Message-ID: <CAKghNw2Fy9JP7Acrj_nuyJ_rEX7LvYmjGd7okyxcvQuYT0=-Ow@mail.gmail.com> In-Reply-To: <43417734-d420-5be9-333b-8d0d02d7a58a@freebsd.org> References: <291645341.20180104190237@serebryakov.spb.ru> <43417734-d420-5be9-333b-8d0d02d7a58a@freebsd.org>
index | next in thread | previous in thread | raw e-mail
On Thu, Jan 4, 2018 at 10:49 AM, Julian Elischer <julian@freebsd.org> wrote: > On 5/1/18 12:02 am, Lev Serebryakov wrote: >> >> Hello Freebsd-security, >> >> https://reviews.llvm.org/D41723 >> >> > not really.. > > What's to stop an unprivileged used bringing his own compiler? or a > precompiled binary? If I'm reading this right (and there is a good chance I'm not), since unprivileged users don't bring the kernel or system libraries to the system, the mitigations would still work. Gordonhome | help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAKghNw2Fy9JP7Acrj_nuyJ_rEX7LvYmjGd7okyxcvQuYT0=-Ow>
