Dave Hansen writes:
> On 03/12/2015 03:35 PM, Andrew Morton wrote:
>> On Mon, 09 Mar 2015 13:43:21 -0700 Dave Hansen wrote:
>>> From: Dave Hansen
>>>
>>> Physical addresses are sensitive information. There are
>>> existing, known exploits that are made easier if physical
>>> information is
On 03/12/2015 03:35 PM, Andrew Morton wrote:
> On Mon, 09 Mar 2015 13:43:21 -0700 Dave Hansen wrote:
>> From: Dave Hansen
>>
>> Physical addresses are sensitive information. There are
>> existing, known exploits that are made easier if physical
>> information is available. Here is one example:
Dave Hansen d...@sr71.net writes:
On 03/12/2015 03:35 PM, Andrew Morton wrote:
On Mon, 09 Mar 2015 13:43:21 -0700 Dave Hansen d...@sr71.net wrote:
From: Dave Hansen dave.han...@linux.intel.com
Physical addresses are sensitive information. There are
existing, known exploits that are made
On 03/12/2015 03:35 PM, Andrew Morton wrote:
On Mon, 09 Mar 2015 13:43:21 -0700 Dave Hansen d...@sr71.net wrote:
From: Dave Hansen dave.han...@linux.intel.com
Physical addresses are sensitive information. There are
existing, known exploits that are made easier if physical
information is
On Mon, 09 Mar 2015 13:43:21 -0700 Dave Hansen wrote:
>
> From: Dave Hansen
>
> Physical addresses are sensitive information. There are
> existing, known exploits that are made easier if physical
> information is available. Here is one example:
>
>
On Mon, 09 Mar 2015 13:43:21 -0700 Dave Hansen d...@sr71.net wrote:
From: Dave Hansen dave.han...@linux.intel.com
Physical addresses are sensitive information. There are
existing, known exploits that are made easier if physical
information is available. Here is one example:
Dave Hansen writes:
> On 03/09/2015 05:03 PM, Kees Cook wrote:
>> On Mon, Mar 9, 2015 at 4:43 PM, Eric W. Biederman
>> wrote:
>>> A 1 to 1 blinding function like integer multiplication mudulo 2^32 by an
>>> appropriate random number ought to keep from revealing page numbers or
>>> page
On 03/09/2015 05:03 PM, Kees Cook wrote:
> On Mon, Mar 9, 2015 at 4:43 PM, Eric W. Biederman
> wrote:
>> A 1 to 1 blinding function like integer multiplication mudulo 2^32 by an
>> appropriate random number ought to keep from revealing page numbers or
>> page ajacencies while not requiring any
On 03/09/2015 04:08 PM, Eric W. Biederman wrote:
> If the concern is to protect against root getting into the kernel the
> "trusted_kernel" snake-oil just compile out the pagemap file. Nothing
> else is remotely interesting from a mainenance point of view.
The paper I linked to showed one
On Mon, Mar 9, 2015 at 4:43 PM, Eric W. Biederman wrote:
>
> A 1 to 1 blinding function like integer multiplication mudulo 2^32 by an
> appropriate random number ought to keep from revealing page numbers or
> page ajacencies while not requiring any changes in userspace.
>
> That way the revealed
A 1 to 1 blinding function like integer multiplication mudulo 2^32 by an
appropriate random number ought to keep from revealing page numbers or
page ajacencies while not requiring any changes in userspace.
That way the revealed pfn and the physcial pfn would be different but
you could still use
On Mon, Mar 9, 2015 at 4:08 PM, Eric W. Biederman wrote:
> Kees Cook writes:
>
>> On Mon, Mar 9, 2015 at 3:13 PM, Eric W. Biederman
>> wrote:
>>> Dave Hansen writes:
>>>
From: Dave Hansen
Physical addresses are sensitive information. There are
existing, known exploits
Kees Cook writes:
> On Mon, Mar 9, 2015 at 3:13 PM, Eric W. Biederman
> wrote:
>> Dave Hansen writes:
>>
>>> From: Dave Hansen
>>>
>>> Physical addresses are sensitive information. There are
>>> existing, known exploits that are made easier if physical
>>> information is available. Here is
On Mon, Mar 9, 2015 at 3:13 PM, Eric W. Biederman wrote:
> Dave Hansen writes:
>
>> From: Dave Hansen
>>
>> Physical addresses are sensitive information. There are
>> existing, known exploits that are made easier if physical
>> information is available. Here is one example:
>>
>>
Dave Hansen writes:
> From: Dave Hansen
>
> Physical addresses are sensitive information. There are
> existing, known exploits that are made easier if physical
> information is available. Here is one example:
>
> http://www.cs.columbia.edu/~vpk/papers/ret2dir.sec14.pdf
>
> If you know
On Mon, Mar 9, 2015 at 1:43 PM, Dave Hansen wrote:
>
> From: Dave Hansen
>
> Physical addresses are sensitive information. There are
> existing, known exploits that are made easier if physical
> information is available. Here is one example:
>
>
On Mon, Mar 9, 2015 at 1:43 PM, Dave Hansen d...@sr71.net wrote:
From: Dave Hansen dave.han...@linux.intel.com
Physical addresses are sensitive information. There are
existing, known exploits that are made easier if physical
information is available. Here is one example:
Dave Hansen d...@sr71.net writes:
From: Dave Hansen dave.han...@linux.intel.com
Physical addresses are sensitive information. There are
existing, known exploits that are made easier if physical
information is available. Here is one example:
On Mon, Mar 9, 2015 at 4:08 PM, Eric W. Biederman ebied...@xmission.com wrote:
Kees Cook keesc...@chromium.org writes:
On Mon, Mar 9, 2015 at 3:13 PM, Eric W. Biederman ebied...@xmission.com
wrote:
Dave Hansen d...@sr71.net writes:
From: Dave Hansen dave.han...@linux.intel.com
Physical
On Mon, Mar 9, 2015 at 3:13 PM, Eric W. Biederman ebied...@xmission.com wrote:
Dave Hansen d...@sr71.net writes:
From: Dave Hansen dave.han...@linux.intel.com
Physical addresses are sensitive information. There are
existing, known exploits that are made easier if physical
information is
Kees Cook keesc...@chromium.org writes:
On Mon, Mar 9, 2015 at 3:13 PM, Eric W. Biederman ebied...@xmission.com
wrote:
Dave Hansen d...@sr71.net writes:
From: Dave Hansen dave.han...@linux.intel.com
Physical addresses are sensitive information. There are
existing, known exploits that
On Mon, Mar 9, 2015 at 4:43 PM, Eric W. Biederman ebied...@xmission.com wrote:
A 1 to 1 blinding function like integer multiplication mudulo 2^32 by an
appropriate random number ought to keep from revealing page numbers or
page ajacencies while not requiring any changes in userspace.
That
A 1 to 1 blinding function like integer multiplication mudulo 2^32 by an
appropriate random number ought to keep from revealing page numbers or
page ajacencies while not requiring any changes in userspace.
That way the revealed pfn and the physcial pfn would be different but
you could still use
Dave Hansen dave.han...@intel.com writes:
On 03/09/2015 05:03 PM, Kees Cook wrote:
On Mon, Mar 9, 2015 at 4:43 PM, Eric W. Biederman ebied...@xmission.com
wrote:
A 1 to 1 blinding function like integer multiplication mudulo 2^32 by an
appropriate random number ought to keep from revealing
On 03/09/2015 05:03 PM, Kees Cook wrote:
On Mon, Mar 9, 2015 at 4:43 PM, Eric W. Biederman ebied...@xmission.com
wrote:
A 1 to 1 blinding function like integer multiplication mudulo 2^32 by an
appropriate random number ought to keep from revealing page numbers or
page ajacencies while not
On 03/09/2015 04:08 PM, Eric W. Biederman wrote:
If the concern is to protect against root getting into the kernel the
trusted_kernel snake-oil just compile out the pagemap file. Nothing
else is remotely interesting from a mainenance point of view.
The paper I linked to showed one example of
26 matches
Mail list logo