Conversation

twitter.com/DanielMicay/st It's worth noting that CONFIG_DEBUG_LIST is enabled in GrapheneOS with panic on data corruption, which according to bugs.chromium.org/p/project-zero breaks the exploit primitive. However, this is just one vulnerability, and many won't be mitigated like that.
Quote Tweet
Unfortunately, due to lack of resources and support, it hasn't yet been possible to start doing this for the ongoing revival of the project. In the past, I used to do it myself, but don't have the time and energy available anymore and people aren't stepping up to fill that gap.
Show this thread
2
4
Replying to
Binder is in the upstream kernel and is used outside of Android too. It's used to implement userspace mobile device drivers which are used elsewhere. It's the communication mechanism between the sandboxes. Other OSes reuse those drivers even if they use dbus, etc. elsewhere.
2
1
Replying to and
Microkernels with a focus on security end up needing to design a very efficient, lightweight and powerful IPC mechanism as part of a tiny core kernel. Need to be able to enforce a flexible / powerful security model at a high level among other things. Linux doesn't have an answer.
2
Replying to and
Binder ended up upstream, unlike essentially all the other attempts at offering a more modern IPC mechanism, and it's definitely used more broadly than Android now. Beyond just using drivers designed for an Android environment too. It's among what's available so people use it.
1
Replying to and
Same thing applies to pretty much everything else like the file watch APIs (inotify, etc.), AIO, event polling, etc. End up having flawed solutions and then one new API after another trying to solve problems with the old one, and all accumulated complexity can never be removed.