Daniel,
Here is the sample code to trigger Meltdown
https://bugs.chromium.org/p/project-zero/issues/detail?id=1272
Plus KVM exploit.
Implementation of both using the original papers
https://spectreattack.com/
Best regards,
--
Patrick K.
On 1/9/2018 12:32 PM, Daniel Walsh wrote:
Or SECCOMP for that matter. From my limited reading, I have not seen
what an application needs to access to trigger this vulnerabiltiy. Is
this just using standard SYSCALLS, that we could not block without
breaking the applications?
Anyone have thoughts on this?
Dan