TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

ARM64 CPUs speculatively execute instructions after ERET

73 点作者 devhwrng超过 5 年前

1 comment

wyldfire超过 5 年前
Interesting that BSD [1] and Linux [2] have different patches. AFAICT Linux uses the speculation barrier and BSD has data+instruction barriers instead.<p>If you&#x27;re returning from an exception handler, I&#x27;m guessing you don&#x27;t care how hard you flush the pipeline? Is one of these more optimal &#x2F; more safe or are they mostly equivalent?<p>[1] <a href="https:&#x2F;&#x2F;ftp.openbsd.org&#x2F;pub&#x2F;OpenBSD&#x2F;patches&#x2F;6.6&#x2F;common&#x2F;014_eret.patch.sig" rel="nofollow">https:&#x2F;&#x2F;ftp.openbsd.org&#x2F;pub&#x2F;OpenBSD&#x2F;patches&#x2F;6.6&#x2F;common&#x2F;014_e...</a><p>[2] <a href="https:&#x2F;&#x2F;patchwork.kernel.org&#x2F;patch&#x2F;10700361&#x2F;" rel="nofollow">https:&#x2F;&#x2F;patchwork.kernel.org&#x2F;patch&#x2F;10700361&#x2F;</a>
评论 #21826586 未加载