On 2/22/24 09:57, Petr Tesařík wrote: > * Hardware designers are adding (other) hardware security defenses to > ring-0 that are not applied to ring-3. > > Could you give an example of these other security defenses, please? Here's one example: > https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/data-dependent-prefetcher.html "DDP is neither trained by nor triggered by supervisor-mode accesses." But seriously, this is going to be my last message on this topic. I appreciate your enthusiasm, but I don't see any viable way forward for this approach.