[OffTopic] A vulnerability postmortem on Network Security Services

Paulo Pinto pjmlp at progtools.org
Fri Dec 3 10:04:11 UTC 2021


On Friday, 3 December 2021 at 08:45:06 UTC, Ola Fosheim Grøstad 
wrote:
> On Friday, 3 December 2021 at 06:56:53 UTC, Paulo Pinto wrote:
>> That is how SPARC ADI, ARM MTE work.
>>
>> Intel borked their MPX execution, so who knows if they will 
>> come up with something up, given that iOS and Android are now 
>> making use of hardware memory tagging.
>
> Where did you find info on iOS and Android shipping with memory 
> tagging?
>
> According to the ARM MTE paper it adds 4 bits for every 16 
> bytes and is probabilistic in nature, so it does not work with 
> large offsets. It also forces 16 byte alignment of objects on 
> the stack.

Read my previous comment, 
https://forum.dlang.org/post/anyicezeifvbuxurhwkz@forum.dlang.org

On Android's case it is quite recent, only the models with 
Armv8.5 have it turned on, for older CPUs there is a lightheight 
version applied to critical components via HWASan.

And on iOS although Project Zero has find some flaws on PAC, they 
have been fixing those issues.


More information about the Digitalmars-d mailing list