Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <c6c462fe-4aa1-3922-725d-03c3b1da0786@huawei.com>
Date: Tue, 30 Jan 2018 15:57:58 +0200
From: Igor Stoppa <igor.stoppa@...wei.com>
To: <lsf-pc@...ts.linux-foundation.org>, Linux-MM <linux-mm@...ck.org>
CC: Michal Hocko <mhocko@...nel.org>, Kees Cook <keescook@...gle.com>,
	"kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>,
	linux-security-module <linux-security-module@...r.kernel.org>
Subject: [LSF/MM TOPIC] Protectable Dynamically allocated Memory for both
 kernel and userspace

Hi,

At the LSF/MM summit, I would like to discuss the following topics:

- Dynamic allocation of protectable (read/only) memory in kernel space
- Rare Write option for the aforementioned dynamic allocation
  (this is most likely related to Kees Cook's rare-write proposal)
- Support for userspace to mprotect selected pages:
   * as permanently R/O
   * as rare write
    (this might be easier to implement than kernel rare-write)
   Probably both of these will also require a separate userspace memory
   allocator, which understands pools, or at the very least, can support
   different types of pages.
- Optimization of vmalloc (combining vmap_area and vm_struct structures)

--
igor stoppa

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.