Path: ...!news.misty.com!news.iecc.com!.POSTED.news.iecc.com!not-for-mail From: John Levine Newsgroups: comp.arch Subject: Re: ARM is sort of channeling the IBM 360 Date: Thu, 20 Jun 2024 18:45:47 -0000 (UTC) Organization: Taughannock Networks Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Injection-Date: Thu, 20 Jun 2024 18:45:47 -0000 (UTC) Injection-Info: gal.iecc.com; posting-host="news.iecc.com:2001:470:1f07:1126:0:676f:7373:6970"; logging-data="72280"; mail-complaints-to="abuse@iecc.com" In-Reply-To: Cleverness: some X-Newsreader: trn 4.0-test77 (Sep 1, 2010) Originator: johnl@iecc.com (John Levine) Bytes: 1712 Lines: 19 According to John Savard : >I saw this article about a memory-proitection mechanism on ARM that >has been bypassed... > >https://www.techspot.com/news/103440-researchers-crack-arm-memory-safety-mechanism-achieve-95.html > >and I was struck by how similar it sounds to the memory keys used on >the 360. It's not that close. S/360 had a single key in the PSW that it matched against all of a program's storage refrences while this has the tag in a pointer, so it's more like a capability. The x86 protection keys are more like S/360. There's a key for each virtual page and a PKRU register that has to match. -- Regards, John Levine, johnl@taugh.com, Primary Perpetrator of "The Internet for Dummies", Please consider the environment before reading this e-mail. https://jl.ly