A question that pops up in my mind is: is there a mapping of all physical memory inside the kernels supported by Genode (and for which kernel is this true, besides Linux)?
One of the things mentioned in the paper: > We focus on addresses that are mapped within the at- > tacker’s process, i.e., the user-accessible user space ad- > dresses as well as the user-inaccessible kernel space ad- > dresses. Note that attacks targeting code that is executed > within the context (i.e., address space) of another process > are possible [19], but out of scope in this work, since all > physical memory (including the memory of other pro- > cesses) can be read through the kernel address space any- > way. In other words, is it possible for the meltdown attack on genode to leak memory of other user-level components? -- Met vriendelijke groet / kind regards, Boris Mulder Cyber Security Labs B.V. | Gooimeer 6-31 | 1411 DD Naarden | The Netherlands +31 35 631 3253 (office) ------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org! http://sdm.link/slashdot _______________________________________________ genode-main mailing list genode-main@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/genode-main