On Tue, 2 Feb 2021 05:39:36 -0800, Ed Jaffe wrote:
>    ...
>> Does it validate that the source of the cache is accessible whenever the SPKA
>> is issued, i.e., does the cache have key and fetch protect bits?
>>
>> Any pre-executed instructions will have to be rolled back, correct?
>
>Results of instruction fetch, instruction decode, address generation,
>operand fetch, etc. down the "wrong" path are discarded.
>
Does this neutralize even the Spectre exploit?
    https://xkcd.com/1938/

-- gil

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to