From mboxrd@z Thu Jan 1 00:00:00 1970 Reply-To: kernel-hardening@lists.openwall.com MIME-Version: 1.0 Sender: keescook@google.com In-Reply-To: <1449774477.8579.4.camel@gmail.com> References: <20151209172101.GA70633@davidb.org> <1449770155.8579.2.camel@gmail.com> <1449774477.8579.4.camel@gmail.com> Date: Thu, 10 Dec 2015 11:23:34 -0800 Message-ID: From: Kees Cook Content-Type: text/plain; charset=UTF-8 Subject: Re: [kernel-hardening] Self Introduction To: "kernel-hardening@lists.openwall.com" Cc: Catalin Marinas , PaX Team , Michael Ellerman , Heiko Carstens , Ralf Baechle List-ID: On Thu, Dec 10, 2015 at 11:07 AM, Daniel Micay wrote: >> Yeah. PCID was Sandybridge and later? > > Yeah, that's right. And it defaults to the strong PCID implementation, > but there's also a weaker but significantly faster PCID-based one. Is there anyone from Intel on the list? I would love to see UDEREF ported to upstream on x86 (and the non PCID version too). No one has stepped up to work on it yet. As for non-ARM and non-x86, IIRC s/390 has always had PAN, and I'd love to update the matrix for powerpc and MIPS. http://kernsec.org/wiki/index.php/Exploit_Methods/Userspace_data_usage -Kees -- Kees Cook Chrome OS & Brillo Security