Oh my Gosh, again tthey speak!
Let me explain this, this Cache is the cache used for Pipelines, SMT and its ilk use the same process as Pipelining but a different register. SMT and its ilk are a Gimick as Pipelining already does the same thing. A guy at Camp Gemini once explained to me this Level 0 access, and as Camp Gemini work closely with Governments, they were warned of this problem (Spectre) way back, and had to code it out of their systems.
Think about it, How does a Cache that is only meant to be read by the core itself have;
- Access to the Kernel? (windows Scheduler which is the spyware for Gov agencies which keeps track of the activity of the core for Monitoring purposes), but it has been know by deep contracting companies; like camp Gemini, that there is little purpose for the scheduler than to read the contents and report accross the Kernel(deliberate)
- Have access to anything other than the core and its hardware encoded routines, but somehow the Microcode has access to a hard wire cache system, and we are not talking just "is content full or empty commands" but "what is the content command."
- Think of the overheads of the exploit, it means that the CPU is using cycles to send back information accross the Kernel to be packaged up and sent to the Internet Port. Would not a simple Antivirus or spyware software detect such activity or be made to before it can be sent remotely?
- SMT and its ilk (hyperthreading) along with pipelining have always been know to make these exploits, at it is not about the hardware intended operation, but the hardware has been wired to allow for both Microcode, and thus extenal nafarious influence since its inception. Intel has been accused of this by people like;
Thomas Drake, Bunnatine Creenhouse, Russell Tice, Edward snowdon and manu others, who have actually worked in the high level industries.
- AMD resisted such influence until the advent of Lisa Su.
- AMD also now using same practices as Intel used to (AKA 5)
You guys need to read Snowdons info on Level 0 access.
Geez, Read about this stuff first!