Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 30 Jan 2018 15:57:58 +0200
From: Igor Stoppa <>
To: <>, Linux-MM <>
CC: Michal Hocko <>, Kees Cook <>,
	"" <>,
	linux-security-module <>
Subject: [LSF/MM TOPIC] Protectable Dynamically allocated Memory for both
 kernel and userspace


At the LSF/MM summit, I would like to discuss the following topics:

- Dynamic allocation of protectable (read/only) memory in kernel space
- Rare Write option for the aforementioned dynamic allocation
  (this is most likely related to Kees Cook's rare-write proposal)
- Support for userspace to mprotect selected pages:
   * as permanently R/O
   * as rare write
    (this might be easier to implement than kernel rare-write)
   Probably both of these will also require a separate userspace memory
   allocator, which understands pools, or at the very least, can support
   different types of pages.
- Optimization of vmalloc (combining vmap_area and vm_struct structures)

igor stoppa

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.