Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 12 Feb 2019 01:27:44 +0200
From: Igor Stoppa <>
Cc: Igor Stoppa <>,
	Andy Lutomirski <>,
	Nadav Amit <>,
	Matthew Wilcox <>,
	Peter Zijlstra <>,
	Kees Cook <>,
	Dave Hansen <>,
	Mimi Zohar <>,
	Thiago Jung Bauermann <>,
	Ahmed Soliman <>,,,,
Subject: [RFC PATCH v4 07/12] __wr_after_init: Documentation: self-protection

Update the self-protection documentation, to mention also the use of the
__wr_after_init attribute.

Signed-off-by: Igor Stoppa <>

CC: Andy Lutomirski <>
CC: Nadav Amit <>
CC: Matthew Wilcox <>
CC: Peter Zijlstra <>
CC: Kees Cook <>
CC: Dave Hansen <>
CC: Mimi Zohar <>
CC: Thiago Jung Bauermann <>
CC: Ahmed Soliman <>
 Documentation/security/self-protection.rst | 14 ++++++++------
 1 file changed, 8 insertions(+), 6 deletions(-)

diff --git a/Documentation/security/self-protection.rst b/Documentation/security/self-protection.rst
index f584fb74b4ff..df2614bc25b9 100644
--- a/Documentation/security/self-protection.rst
+++ b/Documentation/security/self-protection.rst
@@ -84,12 +84,14 @@ For variables that are initialized once at ``__init`` time, these can
 be marked with the (new and under development) ``__ro_after_init``
-What remains are variables that are updated rarely (e.g. GDT). These
-will need another infrastructure (similar to the temporary exceptions
-made to kernel code mentioned above) that allow them to spend the rest
-of their lifetime read-only. (For example, when being updated, only the
-CPU thread performing the update would be given uninterruptible write
-access to the memory.)
+Others, which are statically allocated, but still need to be updated
+rarely, can be marked with the ``__wr_after_init`` attribute.
+The update mechanism must avoid exposing the data to rogue alterations
+during the update. For example, only the CPU thread performing the update
+would be given uninterruptible write access to the memory.
+Currently there is no protection available for data allocated dynamically.
 Segregation of kernel memory from userspace memory

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.