|
|
Subscribe / Log in / New account

KAISER: hiding the kernel from user space

KAISER: hiding the kernel from user space

[Kernel] Posted Nov 15, 2017 1:16 UTC (Wed) by corbet

Since the beginning, Linux has mapped the kernel's memory into the address space of every running process. There are solid performance reasons for doing this, and the processor's memory-management unit can ordinarily be trusted to prevent user space from accessing that memory. More recently, though, some more subtle security issues related to this mapping have come to light, leading to the rapid development of a new patch set that ends this longstanding practice for the x86 architecture.

Full Story (comments: 34)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds