Observability of cache-state differences for additional kernel TIKTAG gadgets
Ascertain whether the additional potentially exploitable TIKTAG gadgets identified in the Linux kernel can produce a measurable cache-state difference between Memory Tagging Extension (MTE) tag match and mismatch when executed through realistic system call paths, thereby confirming tag leakage and exploitability without kernel code modifications.
References
We discovered several more potentially exploitable gadgets, but we were not able to observe the cache state difference between the tag match and mismatch.
— TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution
(2406.08719 - Kim et al., 13 Jun 2024) in Section 6.2.2