On Sat, Oct 5, 2024 at 1:21 PM Oleg Nesterov <o...@redhat.com> wrote:
>
> Sorry for the noise, forgot to mention...
>
> On 10/04, jef...@chromium.org wrote:
> >
> > --- a/Documentation/admin-guide/kernel-parameters.txt
> > +++ b/Documentation/admin-guide/kernel-parameters.txt
> > @@ -1535,6 +1535,15 @@
> >                       Permit 'security.evm' to be updated regardless of
> >                       current integrity status.
> >
> > +     exec.seal_system_mappings = [KNL]
> > +                     Format: { never | always }
> > +                     Seal system mappings: vdso, vvar, sigpage, uprobes,
> > +                     vsyscall.
> > +                     This overwrites KCONFIG CONFIG_SEAL_SYSTEM_MAPPINGS_*
> > +                     - 'never':  never seal system mappings.
> > +                     - 'always': always seal system mappings.
> > +                     If not specified or invalid, default is the KCONFIG 
> > value.
>
> perhaps the documentation should also mention that this new parameter has
> no effect if CONFIG_64BIT=n.
Good point, I will add that.

Thanks

>
> Oleg.
>

Reply via email to