I wonder whether having the language know about array bounds (i.e. memory safety) makes it easier to deploy mitigations against Spectre…
Sure. See the followup: my point is that if you had a “load without speculation” instruction, safe languages could better deploy it.
-
-
You can do that with CPUID after each bounds check

-
Yeah, by that I mean “a *reasonable* load-without-speculation” instruction. :)
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
