l...@kernel.org>, Masahiro Yamada <masahi...@kernel.org>, Jarkko Sakkinen 
<jar...@profian.com>, Sami Tolvanen <samitolva...@google.com>, "Naveen N. Rao" 
<naveen.n....@linux.ibm.com>, Marco Elver <el...@google.com>, Kees Cook 
<keesc...@chromium.org>, Steven Rostedt <rost...@goodmis.org>, Nathan 
Chancellor <nat...@kernel.org>, "Russell King \(Oracle\)" 
<rmk+ker...@armlinux.org.uk>, Mark Brown <broo...@kernel.org>, Borislav Petkov 
<b...@alien8.de>, Alexander Egorenkov <egore...@linux.ibm.com>, Thomas 
Bogendoerfer <tsbog...@alpha.franken.de>, Parisc List 
<linux-par...@vger.kernel.org>, Nathaniel McCallum <nathan...@profian.com>, 
Dmitry Torokhov <dmitry.torok...@gmail.com>, "David S. Miller" 
<da...@davemloft.net>, "Kirill A. Shutemov" <kirill.shute...@linux.intel.com>, 
Tobias Huschle <husc...@linux.ibm.com>, "Peter Zijlstra \(Intel\)" 
<pet...@infradead.org>, "H. Peter Anvin" <h...@zytor.com>, sparclinux 
<sparcli...@vger.kernel.org>, Tiezhu Yang <yangtie...@loongson.cn>, Miroslav 
Benes <mbenes@s
 use.cz>, Chen Zhongjin <chenzhong...@huawei.com>, Ard Biesheuvel 
<a...@kernel.org>, the arch/x86 maintainers <x...@kernel.org>, Russell King 
<li...@armlinux.org.uk>, linux-riscv <linux-ri...@lists.infradead.org>, Ingo 
Molnar <mi...@redhat.com>, Aaron Tomlin <atom...@redhat.com>, Albert Ou 
<a...@eecs.berkeley.edu>, Heiko Carstens <h...@linux.ibm.com>, Liao Chang 
<liaocha...@huawei.com>, Paul Walmsley <paul.walms...@sifive.com>, Josh 
Poimboeuf <jpoim...@kernel.org>, Thomas Richter <tmri...@linux.ibm.com>, "open 
list:BROADCOM NVRAM DRIVER" <linux-m...@vger.kernel.org>, Changbin Du 
<changbin...@intel.com>, Palmer Dabbelt <pal...@dabbelt.com>, linuxppc-dev 
<linuxppc-dev@lists.ozlabs.org>, linux-modu...@vger.kernel.org
Errors-To: linuxppc-dev-bounces+archive=mail-archive....@lists.ozlabs.org
Sender: "Linuxppc-dev" 
<linuxppc-dev-bounces+archive=mail-archive....@lists.ozlabs.org>

On Thu, Jun 09, 2022 at 05:48:52AM +0200, Christoph Hellwig wrote:
> On Wed, Jun 08, 2022 at 01:26:19PM -0700, Luis Chamberlain wrote:
> > No, that was removed because it has only one user.
> 
> That is only part of the story.  The other part is that the overall
> kernel simply does not have any business allocating exutable memory.
> Executable memory is a very special concept for modules or module-like
> code like kprobes, and should not be exposed as a general concept.

It is not just modules and kprobes, it is also ftrace and bpf too now.
So while it should not be used everywhere calling it module_alloc()
is just confusing at this point. Likewise, module_alloc_huge() is
being proposed too and I'd rather we deal with this properly in aligment
of taking care of the rename as well.

If the concern is to restrict access we can use the module namespace stuff
so to ensure only intended users get access to it.

> Especially as executable memory really should not also be writable
> for security reasons.  In other words, we should actually never
> allocate executable memory, every.  We might seal memory and then
> mark it executable after having written to it, which is how modules
> and kprobes are implemented on all modern Linux ports anyway.

The respective free *should* do the executable bits, and there
is no generic way to do this for all archs and so it is open coded
today. In fact some architectures need further work / help and so
split up the module data and exect already on v5.19+ with the new
ARCH_WANTS_MODULES_DATA_IN_VMALLOC. See this thread for details:

https://lkml.kernel.org/r/yo1xtn441qbnt...@bombadil.infradead.org

Doing this work is not easy, but if we're going to do it, it must
be done right.

  Luis

Reply via email to