Separate kernel and userspace address spaces on Linux SPARC?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi!

In the light of the recent x86 vulnerability which allows user space
applications to peak into kernel memory and consequently make the
system vulnerable to Return-Oriented Programming (ROP) attacks, I have
heard that these attacks are not possible on SPARC v9 as the architecture
uses separate address spaces for kernel and userspace.

While I have found literature that this applies to Solaris, I couldn't
find any direct mentions of Linux on SPARC.

Does anyone of the SPARC kernel people know what the situation on Linux
SPARC is?

Thanks,
Adrian

-- 
 .''`.  John Paul Adrian Glaubitz
: :' :  Debian Developer - glaubitz@xxxxxxxxxx
`. `'   Freie Universitaet Berlin - glaubitz@xxxxxxxxxxxxxxxxxxx
  `-    GPG: 62FF 8A75 84E0 2956 9546  0006 7426 3B37 F5B5 F913
--
To unsubscribe from this list: send the line "unsubscribe sparclinux" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Kernel Development]     [DCCP]     [Linux ARM Development]     [Linux]     [Photo]     [Yosemite Help]     [Linux ARM Kernel]     [Linux SCSI]     [Linux x86_64]     [Linux Hams]

  Powered by Linux