Re: [PATCH v4 1/1] exec: seal system mappings

2025-02-06 Thread Thomas Weißschuh
On Thu, Feb 06, 2025 at 10:51:54AM -0500, enh wrote: > On Thu, Feb 6, 2025 at 10:28 AM Thomas Weißschuh > wrote: > > > > On Thu, Feb 06, 2025 at 09:38:59AM -0500, enh wrote: > > > On Thu, Feb 6, 2025 at 8:20 AM Thomas Weißschuh > > > wrote: > > > > > > > > On Fri, Jan 17, 2025 at 02:35:18PM -0500

Re: [PATCH v4 1/1] exec: seal system mappings

2025-02-06 Thread enh
On Thu, Feb 6, 2025 at 10:28 AM Thomas Weißschuh wrote: > > On Thu, Feb 06, 2025 at 09:38:59AM -0500, enh wrote: > > On Thu, Feb 6, 2025 at 8:20 AM Thomas Weißschuh > > wrote: > > > > > > On Fri, Jan 17, 2025 at 02:35:18PM -0500, enh wrote: > > > > On Fri, Jan 17, 2025 at 1:20 PM Jeff Xu wrote:

Re: [PATCH v4 1/1] exec: seal system mappings

2025-02-06 Thread Thomas Weißschuh
On Thu, Feb 06, 2025 at 09:38:59AM -0500, enh wrote: > On Thu, Feb 6, 2025 at 8:20 AM Thomas Weißschuh > wrote: > > > > On Fri, Jan 17, 2025 at 02:35:18PM -0500, enh wrote: > > > On Fri, Jan 17, 2025 at 1:20 PM Jeff Xu wrote: > > > > > > > > > > There are technical difficulties to seal vdso/vvar

Re: [PATCH v4 1/1] exec: seal system mappings

2025-02-06 Thread enh
On Thu, Feb 6, 2025 at 8:20 AM Thomas Weißschuh wrote: > > On Fri, Jan 17, 2025 at 02:35:18PM -0500, enh wrote: > > On Fri, Jan 17, 2025 at 1:20 PM Jeff Xu wrote: > > > > > > There are technical difficulties to seal vdso/vvar from the glibc > > > side. The dynamic linker lacks vdso/vvar mapping

Re: [PATCH v4 1/1] exec: seal system mappings

2025-02-06 Thread enh
On Thu, Jan 23, 2025 at 5:38 PM Matthew Wilcox wrote: [heh, long time no see! haven't been on an email thread with you in a while :-) ] > On Thu, Jan 23, 2025 at 04:50:46PM -0500, enh wrote: > > yeah, at this point i should (a) drag in +cferris who may have actual > > experience of this and (b)

Re: [PATCH v4 1/1] exec: seal system mappings

2025-02-06 Thread Thomas Weißschuh
On Fri, Jan 17, 2025 at 02:35:18PM -0500, enh wrote: > On Fri, Jan 17, 2025 at 1:20 PM Jeff Xu wrote: > > There are technical difficulties to seal vdso/vvar from the glibc > > side. The dynamic linker lacks vdso/vvar mapping size information, and > > architectural variations for vdso/vvar also

Re: [PATCH v4 1/1] exec: seal system mappings

2025-02-04 Thread Johannes Berg
On Fri, 2025-01-03 at 15:48 -0500, Liam R. Howlett wrote: > > So we have at least two userspace uses that this will breaks: checkpoint > restore and now gVisor, but who knows what else? I believe we previously pointed out it might also break running the ARCH=um kernel: https://lore.kernel.org/al

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-23 Thread Matthew Wilcox
On Thu, Jan 23, 2025 at 04:50:46PM -0500, enh wrote: > yeah, at this point i should (a) drag in +cferris who may have actual > experience of this and (b) admit that iirc i've never personally seen > _evidence_ of this, just claims. most famously in the chrome source... > if you `grep -r /proc/.*/ma

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-23 Thread enh
On Thu, Jan 23, 2025 at 3:40 AM Vlastimil Babka wrote: > > On 1/22/25 23:29, enh wrote: > > On Wed, Jan 22, 2025 at 12:24 PM Liam R. Howlett > > wrote: > >> > >> > >> We are making changes in this area. Can you elaborate on the 'awkward' > >> part? The locking or the tearing of data? > >> > >>

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-23 Thread Vlastimil Babka
On 1/22/25 23:29, enh wrote: > On Wed, Jan 22, 2025 at 12:24 PM Liam R. Howlett > wrote: >> >> >> We are making changes in this area. Can you elaborate on the 'awkward' >> part? The locking or the tearing of data? >> >> The way you state the page, it makes me think it's the tearing that is >> th

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-22 Thread enh
On Wed, Jan 22, 2025 at 12:24 PM Liam R. Howlett wrote: > > * enh [250121 10:38]: > > On Fri, Jan 17, 2025 at 5:08 PM Liam R. Howlett > > wrote: > > > > > > * enh [250117 14:35]: > > > ... > > > > > > > > > > > as a maintainer of a different linux libc, i've long wanted a "tell me > > > > ever

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-22 Thread Liam R. Howlett
* enh [250121 10:38]: > On Fri, Jan 17, 2025 at 5:08 PM Liam R. Howlett > wrote: > > > > * enh [250117 14:35]: > > ... > > > > > > > > as a maintainer of a different linux libc, i've long wanted a "tell me > > > everything there is to know about this vma" syscall rather than having > > > to par

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-21 Thread enh
On Fri, Jan 17, 2025 at 5:08 PM Liam R. Howlett wrote: > > * enh [250117 14:35]: > ... > > > > > as a maintainer of a different linux libc, i've long wanted a "tell me > > everything there is to know about this vma" syscall rather than having > > to parse /proc/maps... > > > > You mean an ioctl()

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-17 Thread Liam R. Howlett
* enh [250117 14:35]: ... > > as a maintainer of a different linux libc, i've long wanted a "tell me > everything there is to know about this vma" syscall rather than having > to parse /proc/maps... > You mean an ioctl()-based API to query VMAs from /proc//maps? Andrii had something like that

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-17 Thread Jeff Xu
On Fri, Jan 17, 2025 at 11:35 AM enh wrote: > > On Fri, Jan 17, 2025 at 1:20 PM Jeff Xu wrote: > > > > On Thu, Jan 16, 2025 at 9:18 AM Pedro Falcato > > wrote: > > > > > > On Thu, Jan 16, 2025 at 5:02 PM Benjamin Berg > > > wrote: > > > > > > > > Hi Lorenzo, > > > > > > > > On Thu, 2025-01-16

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-17 Thread enh
On Fri, Jan 17, 2025 at 1:20 PM Jeff Xu wrote: > > On Thu, Jan 16, 2025 at 9:18 AM Pedro Falcato wrote: > > > > On Thu, Jan 16, 2025 at 5:02 PM Benjamin Berg > > wrote: > > > > > > Hi Lorenzo, > > > > > > On Thu, 2025-01-16 at 15:48 +, Lorenzo Stoakes wrote: > > > > On Wed, Jan 15, 2025 at

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-17 Thread Jeff Xu
On Thu, Jan 16, 2025 at 9:18 AM Pedro Falcato wrote: > > On Thu, Jan 16, 2025 at 5:02 PM Benjamin Berg > wrote: > > > > Hi Lorenzo, > > > > On Thu, 2025-01-16 at 15:48 +, Lorenzo Stoakes wrote: > > > On Wed, Jan 15, 2025 at 12:20:59PM -0800, Jeff Xu wrote: > > > > On Wed, Jan 15, 2025 at 11:

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-17 Thread Jeff Xu
On Thu, Jan 16, 2025 at 7:49 AM Lorenzo Stoakes wrote: > > On Wed, Jan 15, 2025 at 12:20:59PM -0800, Jeff Xu wrote: > > Hi Lorenzo > > > > On Wed, Jan 15, 2025 at 11:46 AM Lorenzo Stoakes > > wrote: > > > > > > Jeff, > > > > > > My name is Lorenzo, not Lorenze. > > > > > I apologize. > > No worri

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-17 Thread Heiko Carstens
Hi Kees, On Thu, Jan 16, 2025 at 11:40:37AM -0800, Kees Cook wrote: > On Thu, Jan 16, 2025 at 06:26:55AM +0100, Christoph Hellwig wrote: > > On Wed, Jan 15, 2025 at 03:52:23PM -0800, Kees Cook wrote: > > > > You seem to be saying you're pushing an internal feature on upstream and > > > > only care

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-16 Thread Kees Cook
On Thu, Jan 16, 2025 at 03:34:40PM +, Lorenzo Stoakes wrote: > This was originally addressed with config flags, but then boot options were > provided which completely overrode this. > [...] > Again, I have no objection to a version of this series which explicitly > disallows known-broken scenar

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-16 Thread Kees Cook
On Thu, Jan 16, 2025 at 06:26:55AM +0100, Christoph Hellwig wrote: > On Wed, Jan 15, 2025 at 03:52:23PM -0800, Kees Cook wrote: > > > You seem to be saying you're pushing an internal feature on upstream and > > > only care about internal use cases, this is not how upstream works, as > > > Matthew a

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-16 Thread Pedro Falcato
On Thu, Jan 16, 2025 at 5:02 PM Benjamin Berg wrote: > > Hi Lorenzo, > > On Thu, 2025-01-16 at 15:48 +, Lorenzo Stoakes wrote: > > On Wed, Jan 15, 2025 at 12:20:59PM -0800, Jeff Xu wrote: > > > On Wed, Jan 15, 2025 at 11:46 AM Lorenzo Stoakes > > > wrote: > > > > [SNIP] > > > > > > > I've mad

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-16 Thread Lorenzo Stoakes
On Thu, Jan 16, 2025 at 06:01:47PM +0100, Benjamin Berg wrote: > Hi Lorenzo, > > On Thu, 2025-01-16 at 15:48 +, Lorenzo Stoakes wrote: > > On Wed, Jan 15, 2025 at 12:20:59PM -0800, Jeff Xu wrote: > > > On Wed, Jan 15, 2025 at 11:46 AM Lorenzo Stoakes > > > wrote: > > > > [SNIP] > > > > > > > I

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-16 Thread Benjamin Berg
Hi Lorenzo, On Thu, 2025-01-16 at 15:48 +, Lorenzo Stoakes wrote: > On Wed, Jan 15, 2025 at 12:20:59PM -0800, Jeff Xu wrote: > > On Wed, Jan 15, 2025 at 11:46 AM Lorenzo Stoakes > > wrote: > > [SNIP] > > > > > I've made it abundantly clear that this (NACKed) series cannot allow the > > > ke

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-16 Thread Lorenzo Stoakes
On Wed, Jan 15, 2025 at 12:20:59PM -0800, Jeff Xu wrote: > Hi Lorenzo > > On Wed, Jan 15, 2025 at 11:46 AM Lorenzo Stoakes > wrote: > > > > Jeff, > > > > My name is Lorenzo, not Lorenze. > > > I apologize. No worries, sorry I realise it was probably a typo! But just in case you didn't realise :P

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-16 Thread Lorenzo Stoakes
Kees, I reply inline below but the TL;DR is - I'm fine with an incremental approach, my requirements for arch support are sensible and doable and I'll _give a R-b tag_ if such a version is submitted. :) This isn't a discreet means of me trying to reject the whole idea, if I felt that way I'd just

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-15 Thread Christoph Hellwig
On Wed, Jan 15, 2025 at 03:52:23PM -0800, Kees Cook wrote: > > You seem to be saying you're pushing an internal feature on upstream and > > only care about internal use cases, this is not how upstream works, as > > Matthew alludes to. > > Internal? No. Chrome OS and Android. Linux runs more Androi

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-15 Thread Kees Cook
On Wed, Jan 15, 2025 at 07:46:00PM +, Lorenzo Stoakes wrote: > You are now suggesting disabling the !CRIU requirement. Which violates my > _requirements_ (not optional features). Why not make this simply incremental? The feature isn't intended to work with CRIU. Why don't we get the feature in

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-15 Thread Jeff Xu
Hi Lorenzo On Wed, Jan 15, 2025 at 11:46 AM Lorenzo Stoakes wrote: > > Jeff, > > My name is Lorenzo, not Lorenze. > I apologize. > I've made it abundantly clear that this (NACKed) series cannot allow the > kernel to be in a broken state even if a user sets flags to do so. > > This is because use

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-15 Thread Lorenzo Stoakes
Jeff, My name is Lorenzo, not Lorenze. I've made it abundantly clear that this (NACKed) series cannot allow the kernel to be in a broken state even if a user sets flags to do so. This is because users might lack context to make this decision and incorrectly do so, and now we ship a known-broken

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-15 Thread Jeff Xu
On Mon, Jan 13, 2025 at 1:26 PM Jeff Xu wrote: > > On Mon, Jan 6, 2025 at 5:12 PM Kees Cook wrote: > > > > On Fri, Jan 03, 2025 at 09:38:10PM +, Lorenzo Stoakes wrote: > > > On Tue, Dec 17, 2024 at 02:18:53PM -0800, Kees Cook wrote: > > > > On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chr

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-13 Thread Matthew Wilcox
On Mon, Jan 13, 2025 at 01:26:59PM -0800, Jeff Xu wrote: > This patch is intended for ChromeOS and Android and is > feature-complete from their perspective. "I have everything I need from the Google point of view, so I will push this feature into upstream". No, thanks.

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-13 Thread Jeff Xu
On Mon, Jan 6, 2025 at 5:12 PM Kees Cook wrote: > > On Fri, Jan 03, 2025 at 09:38:10PM +, Lorenzo Stoakes wrote: > > On Tue, Dec 17, 2024 at 02:18:53PM -0800, Kees Cook wrote: > > > On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > > > > Seal vdso, vvar, sigpage, uprobes a

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-06 Thread Kees Cook
On Fri, Jan 03, 2025 at 03:48:23PM -0500, Liam R. Howlett wrote: > So we have at least two userspace uses that this will breaks: checkpoint > restore and now gVisor, but who knows what else? How many config > options before we decide this can't be just on by default? See my reply to Lorenzo, but

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-06 Thread Kees Cook
On Fri, Jan 03, 2025 at 09:38:10PM +, Lorenzo Stoakes wrote: > On Tue, Dec 17, 2024 at 02:18:53PM -0800, Kees Cook wrote: > > On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > > > Seal vdso, vvar, sigpage, uprobes and vsyscall. > > > > > > Those mappings are readonly or exe

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-03 Thread Lorenzo Stoakes
On Tue, Dec 17, 2024 at 02:18:53PM -0800, Kees Cook wrote: > On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > > Seal vdso, vvar, sigpage, uprobes and vsyscall. > > > > Those mappings are readonly or executable only, sealing can protect > > them from ever changing or unmapped d

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-03 Thread Liam R. Howlett
* Kees Cook [241217 17:19]: > On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > > Seal vdso, vvar, sigpage, uprobes and vsyscall. > > > > Those mappings are readonly or executable only, sealing can protect > > them from ever changing or unmapped during the life time of the pr

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-02 Thread Andrei Vagin
On Tue, Dec 17, 2024 at 2:18 PM Kees Cook wrote: > > Also from discussions it sounds like there may need to be even finer-gain > control, likely via prctl, for dealing with the CRIU case. The proposal > is to provide an opt-out prctl with CAP_CHECKPOINT_RESTORE? I think this > is reasonable a

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-17 Thread Kees Cook
On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > Seal vdso, vvar, sigpage, uprobes and vsyscall. > > Those mappings are readonly or executable only, sealing can protect > them from ever changing or unmapped during the life time of the process. > For complete descriptions of m

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-16 Thread Jeff Xu
Hi Liam On Mon, Dec 16, 2024 at 10:56 AM Liam R. Howlett wrote: > > * Jeff Xu [241216 13:35]: > > ... > > > > > > > I like the idea and I think the opt-out solution should work for CRIU. > > > CRIU will be able to call this prctl and re-execute itself. > > > > > Great! Let's iterate on the opt-o

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-16 Thread Jeff Xu
Hi Andrei On Thu, Dec 12, 2024 at 10:33 PM Andrei Vagin wrote: > > On Wed, Dec 11, 2024 at 2:47 PM Jeff Xu wrote: > > > > Hi Andrei > > > > Thanks for your email. > > I was hoping to get some feedback from CRIU devs, and happy to see you > > reaching out.. > > > ... > > I have been thinking of o

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-16 Thread Liam R. Howlett
* Jeff Xu [241216 13:35]: ... > > > > I like the idea and I think the opt-out solution should work for CRIU. > > CRIU will be able to call this prctl and re-execute itself. > > > Great! Let's iterate on the opt-out solution then. > This patch set has been NACK'ed. Please rework your solution

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-12 Thread Andrei Vagin
On Wed, Dec 11, 2024 at 2:47 PM Jeff Xu wrote: > > Hi Andrei > > Thanks for your email. > I was hoping to get some feedback from CRIU devs, and happy to see you > reaching out.. > ... > I have been thinking of other alternatives, but those would require > more understanding on CRIU use cases. > On

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-11 Thread Jeff Xu
Hi Andrei Thanks for your email. I was hoping to get some feedback from CRIU devs, and happy to see you reaching out.. On Mon, Dec 9, 2024 at 8:12 PM Andrei Vagin wrote: > > On Mon, Nov 25, 2024 at 12:49 PM wrote: > > > > From: Jeff Xu > > > > Seal vdso, vvar, sigpage, uprobes and vsyscall. >

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-09 Thread Andrei Vagin
On Mon, Nov 25, 2024 at 12:49 PM wrote: > > From: Jeff Xu > > Seal vdso, vvar, sigpage, uprobes and vsyscall. > > Those mappings are readonly or executable only, sealing can protect > them from ever changing or unmapped during the life time of the process. > For complete descriptions of memory se

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-04 Thread Jeff Xu
On Wed, Dec 4, 2024 at 6:04 AM Benjamin Berg wrote: > > Hi, > > On Mon, 2024-11-25 at 20:20 +, jef...@chromium.org wrote: > > From: Jeff Xu > > > > Seal vdso, vvar, sigpage, uprobes and vsyscall. > > > > Those mappings are readonly or executable only, sealing can protect > > them from ever ch

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-04 Thread Benjamin Berg
Hi, On Wed, 2024-12-04 at 09:43 -0800, Jeff Xu wrote: > On Wed, Dec 4, 2024 at 6:04 AM Benjamin Berg > wrote: > > On Mon, 2024-11-25 at 20:20 +, jef...@chromium.org wrote: > > > From: Jeff Xu > > > > > > Seal vdso, vvar, sigpage, uprobes and vsyscall. > > > > > > Those mappings are readon

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-04 Thread Benjamin Berg
Hi, On Mon, 2024-11-25 at 20:20 +, jef...@chromium.org wrote: > From: Jeff Xu > > Seal vdso, vvar, sigpage, uprobes and vsyscall. > > Those mappings are readonly or executable only, sealing can protect > them from ever changing or unmapped during the life time of the process. > For complete

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-03 Thread Lorenzo Stoakes
NACK. Unfortunately past experience indicates that engaging in a back-and-forth is not productive. Please re-read what I've said and properly address the very serious concerns raised. This series is unacceptable in its current form as it allows untested architectures and known broken configurati

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-03 Thread Jeff Xu
On Mon, Dec 2, 2024 at 11:35 PM Lorenzo Stoakes wrote: > > On Mon, Dec 02, 2024 at 12:38:27PM -0800, Jeff Xu wrote: > > On Mon, Dec 2, 2024 at 10:29 AM Lorenzo Stoakes > > wrote: > > > > > > On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > > > > From: Jeff Xu > > > > > > >

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-02 Thread Lorenzo Stoakes
On Mon, Dec 02, 2024 at 12:38:27PM -0800, Jeff Xu wrote: > On Mon, Dec 2, 2024 at 10:29 AM Lorenzo Stoakes > wrote: > > > > On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > > > From: Jeff Xu > > > > > > Seal vdso, vvar, sigpage, uprobes and vsyscall. > > > > > > Those mappin

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-02 Thread Jeff Xu
On Mon, Nov 25, 2024 at 12:40 PM Matthew Wilcox wrote: > > On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > > +/* > > + * Kernel cmdline override for CONFIG_SEAL_SYSTEM_MAPPINGS > > + */ > > +enum seal_system_mappings_type { > > + SEAL_SYSTEM_MAPPINGS_DISABLED, > > +

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-02 Thread Jeff Xu
On Mon, Dec 2, 2024 at 10:29 AM Lorenzo Stoakes wrote: > > On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > > From: Jeff Xu > > > > Seal vdso, vvar, sigpage, uprobes and vsyscall. > > > > Those mappings are readonly or executable only, sealing can protect > > them from ever

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-02 Thread Lorenzo Stoakes
On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > From: Jeff Xu > > Seal vdso, vvar, sigpage, uprobes and vsyscall. > > Those mappings are readonly or executable only, sealing can protect > them from ever changing or unmapped during the life time of the process. > For complete

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-02 Thread Jeff Xu
On Mon, Dec 2, 2024 at 9:57 AM Lorenzo Stoakes wrote: > > On Mon, Dec 02, 2024 at 09:22:33AM -0800, Jeff Xu wrote: > > On Mon, Nov 25, 2024 at 12:40 PM Matthew Wilcox wrote: > > > > > > On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > > > > +/* > > > > + * Kernel cmdline ove

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-02 Thread Jeff Xu
On Mon, Dec 2, 2024 at 9:22 AM Jeff Xu wrote: > > On Mon, Nov 25, 2024 at 12:40 PM Matthew Wilcox wrote: > > > > On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > > > +/* > > > + * Kernel cmdline override for CONFIG_SEAL_SYSTEM_MAPPINGS > > > + */ > > > +enum seal_system_mapp

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-02 Thread Lorenzo Stoakes
On Mon, Dec 02, 2024 at 09:22:33AM -0800, Jeff Xu wrote: > On Mon, Nov 25, 2024 at 12:40 PM Matthew Wilcox wrote: > > > > On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > > > +/* > > > + * Kernel cmdline override for CONFIG_SEAL_SYSTEM_MAPPINGS > > > + */ > > > +enum seal_sys

Re: [PATCH v4 1/1] exec: seal system mappings

2024-11-25 Thread Matthew Wilcox
On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > +/* > + * Kernel cmdline override for CONFIG_SEAL_SYSTEM_MAPPINGS > + */ > +enum seal_system_mappings_type { > + SEAL_SYSTEM_MAPPINGS_DISABLED, > + SEAL_SYSTEM_MAPPINGS_ENABLED > +}; > + > +static enum seal_system_mappin

[PATCH v4 1/1] exec: seal system mappings

2024-11-25 Thread jeffxu
From: Jeff Xu Seal vdso, vvar, sigpage, uprobes and vsyscall. Those mappings are readonly or executable only, sealing can protect them from ever changing or unmapped during the life time of the process. For complete descriptions of memory sealing, please see mseal.rst [1]. System mappings such