Guys, I have little question about Spectre#1 mitigation in Win10 kernel.
For what Win10 kernel trap handlers were updated with LFENCE instructions? As I understand Spectre#1 can't allow Ring 3 code to read kernel memory or to be executed as Ring 0. Or I'm wrong?
Discussion on reverse-engineering and debugging.
1 post • Page 1 of 1