Abstract | ||
---|---|---|
Some might argue that read-copy update ( RCU) is too low-level to be targeted by hackers, but the advent of Row Hammer [ 19] demonstrated the naivete of such views. After all, if black-hat hackers are ready, willing, and able to exploit hardware bugs such as Row Hammer, they are assuredly ready, willing, and able to exploit bugs in RCU. Nor is it any longer the case that RCU's involvement in exploitable Linux-kernel bugs is strictly theoretical. However, this bug involved not RCU's correctness, but rather its ease of use. Nevertheless, it was a real bug that really needed fixing. This paper describes this bug and the road to its eventual fix. |
Year | DOI | Venue |
---|---|---|
2019 | 10.1145/3319647.3325836 | SYSTOR '19: PROCEEDINGS OF THE 12TH ACM INTERNATIONAL SYSTEMS AND STORAGE CONFERENCE |
Keywords | Field | DocType |
Operating systems,Security: Exploitable bugs,Concurrency control,Read-copy update | Concurrency control,Computer science,Computer security,Usability,Correctness,Exploit,Read-copy-update,Control engineering,Hacker,Row hammer,Safety property | Conference |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
1 |
Name | Order | Citations | PageRank |
---|---|---|---|
Paul E. McKenney | 1 | 279 | 30.11 |