|
Message-ID: <c6c462fe-4aa1-3922-725d-03c3b1da0786@huawei.com> Date: Tue, 30 Jan 2018 15:57:58 +0200 From: Igor Stoppa <igor.stoppa@...wei.com> To: <lsf-pc@...ts.linux-foundation.org>, Linux-MM <linux-mm@...ck.org> CC: Michal Hocko <mhocko@...nel.org>, Kees Cook <keescook@...gle.com>, "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>, linux-security-module <linux-security-module@...r.kernel.org> Subject: [LSF/MM TOPIC] Protectable Dynamically allocated Memory for both kernel and userspace Hi, At the LSF/MM summit, I would like to discuss the following topics: - Dynamic allocation of protectable (read/only) memory in kernel space - Rare Write option for the aforementioned dynamic allocation (this is most likely related to Kees Cook's rare-write proposal) - Support for userspace to mprotect selected pages: * as permanently R/O * as rare write (this might be easier to implement than kernel rare-write) Probably both of these will also require a separate userspace memory allocator, which understands pools, or at the very least, can support different types of pages. - Optimization of vmalloc (combining vmap_area and vm_struct structures) -- igor stoppa
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.