Announcement

Collapse
No announcement yet.

Nebulet: A Rust Microkernel Running WebAssembly In Ring 0

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Nebulet: A Rust Microkernel Running WebAssembly In Ring 0

    Phoronix: Nebulet: A Rust Microkernel Running WebAssembly In Ring 0

    You should likely be familiar with WebAssembly as the binary format for executing code within web pages that can be nearly as fast as running native machine code -- and certainly much faster than JavaScript. A new research project has been exploring running WebAssembly in the CPU's Ring 0 -- yes, the highest privileged state of the processor -- in the name of better performance...

    Phoronix, Linux Hardware Reviews, Linux hardware benchmarks, Linux server benchmarks, Linux benchmarking, Desktop Linux, Linux performance, Open Source graphics, Linux How To, Ubuntu benchmarks, Ubuntu hardware, Phoronix Test Suite

  • #2
    This should be inmune to meltdown by default , how much performance do the orher vulnerabilities cost un Intel ? And in AMD ?

    Comment


    • #3
      Has threading and verifies if it accesses the memory region intended for it.
      Show me this magic, I need it in my ring 3 code.

      Comment


      • #4
        Funny how tecnlogy evolves , i was thinking that redox mayor be better off not using wayland , but that Is not the case in this even newer os where ipc will be dirt cheap

        Comment


        • #5
          <insert "I'm too old for this shit" meme here>

          Comment


          • #6
            Originally posted by GunpowaderGuy View Post
            This should be inmune to meltdown by default , how much performance do the orher vulnerabilities cost un Intel ? And in AMD ?
            only intel cpus are affected by meltdown, anyway how this microkernel should be immune?
            javascript can be an attack vector https://webkit.org/blog/8048/what-sp...an-for-webkit/

            Comment


            • #7
              Just give an untrusted third party physical access to your hardware. Nothing could go wrong.

              Comment


              • #8
                Originally posted by trek View Post

                only intel cpus are affected by meltdown, anyway how this microkernel should be immune?
                javascript can be an attack vector https://webkit.org/blog/8048/what-sp...an-for-webkit/

                Intel, Power and Arm processors are all affected by meltdown.


                however, it's only the Cortex A7x series which are affected, lesser processors don't have the same speculative execution that leads to this problem

                Comment


                • #9
                  Originally posted by trek View Post

                  only intel cpus are affected by meltdown, anyway how this microkernel should be immune?
                  javascript can be an attack vector https://webkit.org/blog/8048/what-sp...an-for-webkit/
                  Because there is no userspace in this project.

                  Comment


                  • #10
                    metldown proved that hatdware memory protection in some cpus ( not amd but not only intel either ) is faulty , this os is not affected because it does not uses that feature

                    Comment

                    Working...
                    X