For this lecture, read the paper Meltdown: Reading Kernel Memory from User Space.
Assuming the RISC-V implemented the kind of out-of-order execution that Meltdown relies on, what data could a user program steal from the kernel using Meltdown?
Submit your answer in an ASCII text file named homework.txt to the corresponding "Lecture N" assignment on Gradescope.
Questions or comments regarding 6.1810? Send e-mail to the course staff at 61810-staff@lists.csail.mit.edu.