In summary of the last ~1.5 years of my work, I wrote a comprehensive whitepaper on the limitations of C language, kernel infoleaks, Bochspwn Reloaded and many related topics. It's out now! Thanks to all involved. Feels good
https://twitter.com/benhawkes/status/1009835610931060736 …
-
-
Replying to @j00ru
It would be amazing to run this under syzkaller if support was ported to x86!
1 reply 0 retweets 0 likes -
Replying to @NedWilliamson @j00ru
We just need to find at least one person out there who cares about i386 linux. I don't know maybe it works already (since we have arm). But I have hard time justifying spending any of my time on it...
1 reply 0 retweets 0 likes -
What I do care about is x86_64 linux + KMSAN.
1 reply 0 retweets 0 likes -
I was about to say, I almost forgot about syzkaller + kmsan, which should be higher quality anyways since you have better instrumentation
1 reply 0 retweets 0 likes -
Replying to @NedWilliamson @j00ru
Also easier to maintain, detect put_user, port to arm64, etc. It's almost alive and kicking, grep for KMSAN here https://syzkaller.appspot.com/?fixed=upstream and here https://syzkaller.appspot.com/
1 reply 0 retweets 1 like -
Exciting :)
1 reply 0 retweets 0 likes
I agree, syzkaller + KMSAN is an awesome combo and definitely a good long-term approach for Linux. Bochspwn Reloaded is no competition to the sanitizers, as by definition source code-level instrumentation is more powerful than DBI
-
-
However if someone really wanted to run syzkaller + Bochspwn Reloaded, it should be possible to add support for x64 in the latter with some dev. work. There probably aren't any fundamental obstacles, as evidenced by the Windows x64 implementation ;)
0 replies 0 retweets 1 likeThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.