Войти в систему

Home
    - Создать дневник
    - Написать в дневник
       - Подробный режим

LJ.Rossia.org
    - Новости сайта
    - Общие настройки
    - Sitemap
    - Оплата
    - ljr-fif

Редактировать...
    - Настройки
    - Список друзей
    - Дневник
    - Картинки
    - Пароль
    - Вид дневника

Сообщества

Настроить S2

Помощь
    - Забыли пароль?
    - FAQ
    - Тех. поддержка



Пишет LWN.net ([info]syn_lwnheadline)
@ 2019-01-17 17:04:00


Previous Entry  Add to memories!  Tell a Friend!  Next Entry
[$] Defending against page-cache attacks
The kernel's page cache works to improve performance by minimizing disk I/O
and increasing the sharing of physical memory. But, like other
performance-enhancing techniques that involve resources shared across
security boundaries, the page cache can be abused as a way to extract
information that should be kept secret. A recent paper [PDF] by Daniel Gruss
and colleagues showed how the page cache can be targeted for a number of
different attacks, leading to an abrupt change in how the
mincore() system call works at the end
of the 5.0 merge window
. But subsequent discussion has made it clear
that mincore() is just the tip of the iceberg; it is unclear what
will really need to be done to protect a system against page-cache attacks
or what the performance cost might be.


(Читать комментарии) (Добавить комментарий)