Date: Thu, 4 Jan 2018 11:18:10 -0700 From: Gordon Tetlow <gordon@tetlows.org> To: Julian Elischer <julian@freebsd.org> Cc: Lev Serebryakov <lev@freebsd.org>, "freebsd-security@freebsd.org" <freebsd-security@freebsd.org> Subject: Re: clang way to patch for Spectre? Message-ID: <CAKghNw2Fy9JP7Acrj_nuyJ_rEX7LvYmjGd7okyxcvQuYT0=-Ow@mail.gmail.com> In-Reply-To: <43417734-d420-5be9-333b-8d0d02d7a58a@freebsd.org> References: <291645341.20180104190237@serebryakov.spb.ru> <43417734-d420-5be9-333b-8d0d02d7a58a@freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Jan 4, 2018 at 10:49 AM, Julian Elischer <julian@freebsd.org> wrote: > On 5/1/18 12:02 am, Lev Serebryakov wrote: >> >> Hello Freebsd-security, >> >> https://reviews.llvm.org/D41723 >> >> > not really.. > > What's to stop an unprivileged used bringing his own compiler? or a > precompiled binary? If I'm reading this right (and there is a good chance I'm not), since unprivileged users don't bring the kernel or system libraries to the system, the mitigations would still work. Gordon
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAKghNw2Fy9JP7Acrj_nuyJ_rEX7LvYmjGd7okyxcvQuYT0=-Ow>