If only x86 chips came out of RESET with the MMUs
already turned on.
MitchAlsup1 wrote:
If only x86 chips came out of RESET with the MMUs
already turned on.
Probably sufficient, but not necessary.
Apparently Intel chips are not vulnerable to this particular atack.
If only x86 chips came out of RESET with the MMUs
already turned on.
mitchalsup@aol.com (MitchAlsup1) writes:
If only x86 chips came out of RESET with the MMUs
already turned on.
How would that help?
On Fri, 9 Aug 2024 20:22:55 +0000, Scott Lurndal wrote:
mitchalsup@aol.com (MitchAlsup1) writes:
If only x86 chips came out of RESET with the MMUs
already turned on.
How would that help?
Code/data cannot be accessed from places not permitted by the
mapping tables--especially places meant to be secure as
mentioned in the above article.
mitchalsup@aol.com (MitchAlsup1) writes:
On Fri, 9 Aug 2024 20:22:55 +0000, Scott Lurndal wrote:
mitchalsup@aol.com (MitchAlsup1) writes:
If only x86 chips came out of RESET with the MMUs
already turned on.
How would that help?
Code/data cannot be accessed from places not permitted by the
mapping tables--especially places meant to be secure as
mentioned in the above article.
Who sets up the page table?
When the chip comes out of reset, the firmware (which must,
by definition, be trusted/secure) is the only software running and
it must have complete control of the machine if only for
the various proprietary initialization sequences that need
to be run for e.g. PCIe link training, inter-chiplet link
setup and training, configuring the ring/switch/mesh fabric,
LLC slices, bridge setup (i.e. routing MMIO accesses to
the appropriate destination when initiated by a core),
reading SPDs and training DRAM controllers, etc.
On Sat, 10 Aug 2024 17:23:08 +0000, Scott Lurndal wrote:
mitchalsup@aol.com (MitchAlsup1) writes:
On Fri, 9 Aug 2024 20:22:55 +0000, Scott Lurndal wrote:
mitchalsup@aol.com (MitchAlsup1) writes:
If only x86 chips came out of RESET with the MMUs
already turned on.
How would that help?
Code/data cannot be accessed from places not permitted by the
mapping tables--especially places meant to be secure as
mentioned in the above article.
Who sets up the page table?
The people who write BOOT code
When the chip comes out of reset, the firmware (which must,
by definition, be trusted/secure) is the only software running and
it must have complete control of the machine if only for
the various proprietary initialization sequences that need
to be run for e.g. PCIe link training, inter-chiplet link
setup and training, configuring the ring/switch/mesh fabric,
LLC slices, bridge setup (i.e. routing MMIO accesses to
the appropriate destination when initiated by a core),
reading SPDs and training DRAM controllers, etc.
All of the above it true. But consider what happens when a few
instructions in the ROM get <flash> changed making the BOOT
code insecure.
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 546 |
Nodes: | 16 (2 / 14) |
Uptime: | 12:08:16 |
Calls: | 10,387 |
Calls today: | 2 |
Files: | 14,061 |
Messages: | 6,416,714 |