Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAGXu5jK7LcS9M4NBZr3q8RVQss6GKQ-ifxhOTCMTAGZv3hF02A@mail.gmail.com>
Date: Thu, 10 Dec 2015 10:42:27 -0800
From: Kees Cook <keescook@...omium.org>
To: "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>
Cc: Catalin Marinas <catalin.marinas@....com>, PaX Team <pageexec@...email.hu>
Subject: Re: Self Introduction

I've put the matrix up on the wiki here:

http://kernsec.org/wiki/index.php/Exploit_Methods/Userspace_data_usage

On Thu, Dec 10, 2015 at 9:55 AM, Daniel Micay <danielmicay@...il.com> wrote:
>> ARMv8 64-bit: ??
>
> The worst case scenario would be doing something like the x86_64 UDEREF.
>
>> x86 pre-late-Broadwell: nothing upstream (though UDEREF in PaX exists)
>
> It's worth noting that there's the pre-PCID implementation (slow and
> vulnerable to races) and then two choices of better implementations when
> PCID is available. You probably know that already, but it's not obvious
> to everyone else.

Yeah. PCID was Sandybridge and later?

-Kees

-- 
Kees Cook
Chrome OS & Brillo Security

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.