I wonder whether having the language know about array bounds (i.e. memory safety) makes it easier to deploy mitigations against Spectre…
-
Show this thread
-
Replying to @pcwalton
there’s some cool research OSes that run code in ring 0 iff it can be proven to only access in-bounds memory (usually by prefixing every load with an AND mask, preventing self modifying code, etc)
1 reply 0 retweets 3 likes -
This Tweet is unavailable.
-
Replying to @chc40
Right, you need the extra magic “load without speculation” insn. My point is that safe languages seem better equipped to deploy that insn.
1 reply 1 retweet 3 likes -
(…once that instruction exists, of course.)
1 reply 0 retweets 2 likes -
This Tweet is unavailable.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.