Linux, for the first time, is in the process of merging a security patch that will cause significant slowdown https://lwn.net/SubscriberLink/741878/eb6c9d3913d7cb2b/ … "all existing x86 processors are seemingly affected by information-disclosure vulnerabilities, future processors may not be"
-
-
Hmm. My OS Sortix would be affected. But regardless of CPU bugs, running User-Space in another address space without the kernel mapped and running kernel with User-Space non executable just seems very prudent and I should do that.
-
Yes. If I ever get to do my kernel, address spaces will be completely separate for all archs, no taking advantage of arch-specific mmu features to keep both mapped but separate perms.
-
All I really need is a fast/good way to copy from another address space. Unclear about cost of switching address space on each syscall. I kinda want to build what you propose.
End of conversation
New conversation -
-
-
> X86_BUG_CPU_INSECURE this is actually funny
-
I was honestly worried that people might disable it till I saw the name they used for the Kconfig option
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.