|
|
Message-ID: <c6c462fe-4aa1-3922-725d-03c3b1da0786@huawei.com>
Date: Tue, 30 Jan 2018 15:57:58 +0200
From: Igor Stoppa <igor.stoppa@...wei.com>
To: <lsf-pc@...ts.linux-foundation.org>, Linux-MM <linux-mm@...ck.org>
CC: Michal Hocko <mhocko@...nel.org>, Kees Cook <keescook@...gle.com>,
"kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>,
linux-security-module <linux-security-module@...r.kernel.org>
Subject: [LSF/MM TOPIC] Protectable Dynamically allocated Memory for both
kernel and userspace
Hi,
At the LSF/MM summit, I would like to discuss the following topics:
- Dynamic allocation of protectable (read/only) memory in kernel space
- Rare Write option for the aforementioned dynamic allocation
(this is most likely related to Kees Cook's rare-write proposal)
- Support for userspace to mprotect selected pages:
* as permanently R/O
* as rare write
(this might be easier to implement than kernel rare-write)
Probably both of these will also require a separate userspace memory
allocator, which understands pools, or at the very least, can support
different types of pages.
- Optimization of vmalloc (combining vmap_area and vm_struct structures)
--
igor stoppa
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.