Originally posted by pegasus
View Post
Announcement
Collapse
No announcement yet.
Intel Revs Its Linear Address Masking Patches For Linux
Collapse
X
-
- Likes 1
-
-
Originally posted by bob l'eponge View PostIt depends. If the CPU actually ignore those bits when accessing the pointed item but really compare them in the CAS operation, then it behaves like a DCAS, since it's comparing X and Y at unrelated address, and you can fiddle with the bits in Y and X whatever you like. The operation is something likeCode:X = X | some marker in high bits; Z = Y & high bits mask; DCAS(X, Y, Z, new value)
If instead it ignores the high bit in all instructions then it's a regular DWCAS as you said.
I don't know this technology so I can't say. We'll certainly see people use it through.
Comment
-
Originally posted by OneTimeShot View PostReminds me of the old days when people used to stash stuff in the top 8 bits of 32bit addresses...
...a lot of software stopped working when 16Mb stopped being "a lot of memory"....
- Likes 2
Comment
-
It's actually quite amusing to see that after the decades of "who cares about wasted gigabytes", it suddenly comes en vogue to "save" a few bits on each address register.
Undoubtedly there are useful applications. But likewise undoubtedly this paves the way for a whole new family of vulnerabilities - or shall I say "a whole new tribe". A very similar thing like the oh so praised branch prediction that came to haunt us not even a decade later.
Comment
-
Originally posted by lowflyer View PostIt's actually quite amusing to see that after the decades of "who cares about wasted gigabytes", it suddenly comes en vogue to "save" a few bits on each address register.
- Likes 2
Comment
-
There are all sorts of things you COULD do with this. However, ISTM at least 90% likely that the main use will be for (pre-)exploit protection, i.e. holding refcounts, or a few bits/hash of the call stack, etc; either at runtime or via valgrind / fuzzers / etc.
- Likes 1
Comment
-
Originally posted by arQon View PostThere are all sorts of things you COULD do with this. However, ISTM at least 90% likely that the main use will be for (pre-)exploit protection, i.e. holding refcounts, or a few bits/hash of the call stack, etc; either at runtime or via valgrind / fuzzers / etc.
- Likes 1
Comment
Comment