New Linux Syscall Enables Secret Memory Even the Kernel Can't Read

RoccamOccam writes: After many months of development, the memfd_secret() system call was finally merged for the upcoming 5.14 release of Linux. There have been many changes during this feature's development, but its core purpose remains the same: allow a user-space process to create a range of memory that is inaccessible to anybody else -- kernel included. That memory can be used to store cryptographic keys or any other data that must not be exposed to others. Reportedly, it is even safe from processor vulnerabilities like Spectre because secret memory is uncached mapped.

Read more of this story at Slashdot.



from Slashdot https://ift.tt/3z88ydo

SUBSCRIBE TO OUR NEWSLETTER

Related Posts :

“Work hard in silence, let your success be your noise"

0 Response to "New Linux Syscall Enables Secret Memory Even the Kernel Can't Read"

Post a Comment

ad

Search Your Job