|
Message-ID: <CAGXu5jK7LcS9M4NBZr3q8RVQss6GKQ-ifxhOTCMTAGZv3hF02A@mail.gmail.com> Date: Thu, 10 Dec 2015 10:42:27 -0800 From: Kees Cook <keescook@...omium.org> To: "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com> Cc: Catalin Marinas <catalin.marinas@....com>, PaX Team <pageexec@...email.hu> Subject: Re: Self Introduction I've put the matrix up on the wiki here: http://kernsec.org/wiki/index.php/Exploit_Methods/Userspace_data_usage On Thu, Dec 10, 2015 at 9:55 AM, Daniel Micay <danielmicay@...il.com> wrote: >> ARMv8 64-bit: ?? > > The worst case scenario would be doing something like the x86_64 UDEREF. > >> x86 pre-late-Broadwell: nothing upstream (though UDEREF in PaX exists) > > It's worth noting that there's the pre-PCID implementation (slow and > vulnerable to races) and then two choices of better implementations when > PCID is available. You probably know that already, but it's not obvious > to everyone else. Yeah. PCID was Sandybridge and later? -Kees -- Kees Cook Chrome OS & Brillo Security
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.