On 2/20/19 9:10 AM, speck for mark gross wrote: >> + >> + - KGBD s/KGBD/KGDB >> + >> + If the kernel debugger is accessible by an unpriviledged attacker, >> + then the NMI handler is the least of the problems. >> + ... > > However; if I'm being pedantic, the attacker not having controlability aspect > of your argument can apply to most aspects of the MDS vulnerability. I think > that's why its name uses "data sampling". Also, I need to ask the chip heads > about if this list of NMI's is complete and can be expected to stay that way > across processor and platfrom generations. > > --mark > I don't think any of the code paths listed touches any user data. So even if an attacker have some means to control NMI, he won't get any useful data. Thanks. Tim