Also I don't believe any of these mechanisms are able to protect against meltdown or spectre. I think *BSD is no more immune than any other system, without performing the same separation between user and kernel memory.

On 1/5/2018 7:27 AM, Riccardo Giuntoli wrote:
But this is only for FreeBSD sure?

On Fri, Jan 5, 2018 at 2:02 AM, torsten <tors...@cnc-london.net> wrote:

Ps
security.bsd.see_other_uids=0
security.bsd.see_other_gids=0
security.bsd.unprivileged_read_msgbuf=0
security.bsd.unprivileged_proc_debug=0
kern.randompid=$(jot -r 1 9999)
security.bsd.stack_guard_page=1


-----Original Message-----
From: owner-m...@openbsd.org [mailto:owner-m...@openbsd.org] On Behalf
Of torsten
Sent: 05 January 2018 00:59
To: 'Rupert Gallagher'; 'Daniel Wilkins'; 'Allan Streib'
Cc: 'Alceu R. de Freitas Jr.'; misc@openbsd.org
Subject: Re: Kernel memory leaking on Intel CPUs?

I wonder how it is in reality for most *BSD users due to 1. hide
processes run by other users 2. disable reading kernel messaging
buffers...
3. disable kernel messaging debugging by unprivileged users

And some other tweeks

What surprises me is the "panic" publication of this because of already
known and in *BSDs addressed concerns about hyper threatening and
shared memory well back since 1994


-----Original Message-----
From: owner-m...@openbsd.org [mailto:owner-m...@openbsd.org] On
Behalf
Of Rupert Gallagher
Sent: 04 January 2018 22:22
To: Daniel Wilkins; Allan Streib
Cc: Alceu R. de Freitas Jr.; misc@openbsd.org
Subject: Re: Kernel memory leaking on Intel CPUs?

https://mobile.twitter.com/misc0110/status/948706387491786752

On Thu, Jan 4, 2018 at 16:49, Daniel Wilkins <t...@parlementum.net>
wrote:

Intel's said that it affects every processor in the last 20+ years
and that it's "not a big deal for most users" because it's only a
kernel memory *read*. @yahoo.com.br>






--
Graham Allan
Minnesota Supercomputing Institute - g...@umn.edu

Reply via email to