Re: [PATCH v4 1/1] exec: seal system mappings

2025-02-06 Thread Thomas Weißschuh
On Thu, Feb 06, 2025 at 10:51:54AM -0500, enh wrote: > On Thu, Feb 6, 2025 at 10:28 AM Thomas Weißschuh > wrote: > > > > On Thu, Feb 06, 2025 at 09:38:59AM -0500, enh wrote: > > > On Thu, Feb 6, 2025 at 8:20 AM Thomas Weißschuh > > > wrote: > > > > > > > > On Fri, Jan 17, 2025 at 02:35:18PM -0500

Re: [PATCH v4 1/1] exec: seal system mappings

2025-02-06 Thread enh
On Thu, Feb 6, 2025 at 10:28 AM Thomas Weißschuh wrote: > > On Thu, Feb 06, 2025 at 09:38:59AM -0500, enh wrote: > > On Thu, Feb 6, 2025 at 8:20 AM Thomas Weißschuh > > wrote: > > > > > > On Fri, Jan 17, 2025 at 02:35:18PM -0500, enh wrote: > > > > On Fri, Jan 17, 2025 at 1:20 PM Jeff Xu wrote:

Re: [PATCH v4 1/1] exec: seal system mappings

2025-02-06 Thread Thomas Weißschuh
On Thu, Feb 06, 2025 at 09:38:59AM -0500, enh wrote: > On Thu, Feb 6, 2025 at 8:20 AM Thomas Weißschuh > wrote: > > > > On Fri, Jan 17, 2025 at 02:35:18PM -0500, enh wrote: > > > On Fri, Jan 17, 2025 at 1:20 PM Jeff Xu wrote: > > > > > > > > > > There are technical difficulties to seal vdso/vvar

Re: [PATCH v4 1/1] exec: seal system mappings

2025-02-06 Thread enh
On Thu, Feb 6, 2025 at 8:20 AM Thomas Weißschuh wrote: > > On Fri, Jan 17, 2025 at 02:35:18PM -0500, enh wrote: > > On Fri, Jan 17, 2025 at 1:20 PM Jeff Xu wrote: > > > > > > There are technical difficulties to seal vdso/vvar from the glibc > > > side. The dynamic linker lacks vdso/vvar mapping

Re: [PATCH v4 1/1] exec: seal system mappings

2025-02-06 Thread enh
On Thu, Jan 23, 2025 at 5:38 PM Matthew Wilcox wrote: [heh, long time no see! haven't been on an email thread with you in a while :-) ] > On Thu, Jan 23, 2025 at 04:50:46PM -0500, enh wrote: > > yeah, at this point i should (a) drag in +cferris who may have actual > > experience of this and (b)

Re: [PATCH v4 1/1] exec: seal system mappings

2025-02-06 Thread Thomas Weißschuh
On Fri, Jan 17, 2025 at 02:35:18PM -0500, enh wrote: > On Fri, Jan 17, 2025 at 1:20 PM Jeff Xu wrote: > > There are technical difficulties to seal vdso/vvar from the glibc > > side. The dynamic linker lacks vdso/vvar mapping size information, and > > architectural variations for vdso/vvar also

Re: [PATCH v4 1/1] exec: seal system mappings

2025-02-04 Thread Johannes Berg
On Fri, 2025-01-03 at 15:48 -0500, Liam R. Howlett wrote: > > So we have at least two userspace uses that this will breaks: checkpoint > restore and now gVisor, but who knows what else? I believe we previously pointed out it might also break running the ARCH=um kernel: https://lore.kernel.org/al

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-23 Thread Matthew Wilcox
On Thu, Jan 23, 2025 at 04:50:46PM -0500, enh wrote: > yeah, at this point i should (a) drag in +cferris who may have actual > experience of this and (b) admit that iirc i've never personally seen > _evidence_ of this, just claims. most famously in the chrome source... > if you `grep -r /proc/.*/ma

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-23 Thread enh
On Thu, Jan 23, 2025 at 3:40 AM Vlastimil Babka wrote: > > On 1/22/25 23:29, enh wrote: > > On Wed, Jan 22, 2025 at 12:24 PM Liam R. Howlett > > wrote: > >> > >> > >> We are making changes in this area. Can you elaborate on the 'awkward' > >> part? The locking or the tearing of data? > >> > >>

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-23 Thread Vlastimil Babka
On 1/22/25 23:29, enh wrote: > On Wed, Jan 22, 2025 at 12:24 PM Liam R. Howlett > wrote: >> >> >> We are making changes in this area. Can you elaborate on the 'awkward' >> part? The locking or the tearing of data? >> >> The way you state the page, it makes me think it's the tearing that is >> th

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-22 Thread enh
On Wed, Jan 22, 2025 at 12:24 PM Liam R. Howlett wrote: > > * enh [250121 10:38]: > > On Fri, Jan 17, 2025 at 5:08 PM Liam R. Howlett > > wrote: > > > > > > * enh [250117 14:35]: > > > ... > > > > > > > > > > > as a maintainer of a different linux libc, i've long wanted a "tell me > > > > ever

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-22 Thread Liam R. Howlett
* enh [250121 10:38]: > On Fri, Jan 17, 2025 at 5:08 PM Liam R. Howlett > wrote: > > > > * enh [250117 14:35]: > > ... > > > > > > > > as a maintainer of a different linux libc, i've long wanted a "tell me > > > everything there is to know about this vma" syscall rather than having > > > to par

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-21 Thread enh
On Fri, Jan 17, 2025 at 5:08 PM Liam R. Howlett wrote: > > * enh [250117 14:35]: > ... > > > > > as a maintainer of a different linux libc, i've long wanted a "tell me > > everything there is to know about this vma" syscall rather than having > > to parse /proc/maps... > > > > You mean an ioctl()

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-17 Thread Liam R. Howlett
* enh [250117 14:35]: ... > > as a maintainer of a different linux libc, i've long wanted a "tell me > everything there is to know about this vma" syscall rather than having > to parse /proc/maps... > You mean an ioctl()-based API to query VMAs from /proc//maps? Andrii had something like that

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-17 Thread Jeff Xu
On Fri, Jan 17, 2025 at 11:35 AM enh wrote: > > On Fri, Jan 17, 2025 at 1:20 PM Jeff Xu wrote: > > > > On Thu, Jan 16, 2025 at 9:18 AM Pedro Falcato > > wrote: > > > > > > On Thu, Jan 16, 2025 at 5:02 PM Benjamin Berg > > > wrote: > > > > > > > > Hi Lorenzo, > > > > > > > > On Thu, 2025-01-16

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-17 Thread enh
On Fri, Jan 17, 2025 at 1:20 PM Jeff Xu wrote: > > On Thu, Jan 16, 2025 at 9:18 AM Pedro Falcato wrote: > > > > On Thu, Jan 16, 2025 at 5:02 PM Benjamin Berg > > wrote: > > > > > > Hi Lorenzo, > > > > > > On Thu, 2025-01-16 at 15:48 +, Lorenzo Stoakes wrote: > > > > On Wed, Jan 15, 2025 at

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-17 Thread Jeff Xu
On Thu, Jan 16, 2025 at 9:18 AM Pedro Falcato wrote: > > On Thu, Jan 16, 2025 at 5:02 PM Benjamin Berg > wrote: > > > > Hi Lorenzo, > > > > On Thu, 2025-01-16 at 15:48 +, Lorenzo Stoakes wrote: > > > On Wed, Jan 15, 2025 at 12:20:59PM -0800, Jeff Xu wrote: > > > > On Wed, Jan 15, 2025 at 11:

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-17 Thread Jeff Xu
On Thu, Jan 16, 2025 at 7:49 AM Lorenzo Stoakes wrote: > > On Wed, Jan 15, 2025 at 12:20:59PM -0800, Jeff Xu wrote: > > Hi Lorenzo > > > > On Wed, Jan 15, 2025 at 11:46 AM Lorenzo Stoakes > > wrote: > > > > > > Jeff, > > > > > > My name is Lorenzo, not Lorenze. > > > > > I apologize. > > No worri

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-17 Thread Heiko Carstens
Hi Kees, On Thu, Jan 16, 2025 at 11:40:37AM -0800, Kees Cook wrote: > On Thu, Jan 16, 2025 at 06:26:55AM +0100, Christoph Hellwig wrote: > > On Wed, Jan 15, 2025 at 03:52:23PM -0800, Kees Cook wrote: > > > > You seem to be saying you're pushing an internal feature on upstream and > > > > only care

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-16 Thread Kees Cook
On Thu, Jan 16, 2025 at 03:34:40PM +, Lorenzo Stoakes wrote: > This was originally addressed with config flags, but then boot options were > provided which completely overrode this. > [...] > Again, I have no objection to a version of this series which explicitly > disallows known-broken scenar

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-16 Thread Kees Cook
On Thu, Jan 16, 2025 at 06:26:55AM +0100, Christoph Hellwig wrote: > On Wed, Jan 15, 2025 at 03:52:23PM -0800, Kees Cook wrote: > > > You seem to be saying you're pushing an internal feature on upstream and > > > only care about internal use cases, this is not how upstream works, as > > > Matthew a

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-16 Thread Pedro Falcato
On Thu, Jan 16, 2025 at 5:02 PM Benjamin Berg wrote: > > Hi Lorenzo, > > On Thu, 2025-01-16 at 15:48 +, Lorenzo Stoakes wrote: > > On Wed, Jan 15, 2025 at 12:20:59PM -0800, Jeff Xu wrote: > > > On Wed, Jan 15, 2025 at 11:46 AM Lorenzo Stoakes > > > wrote: > > > > [SNIP] > > > > > > > I've mad

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-16 Thread Lorenzo Stoakes
On Thu, Jan 16, 2025 at 06:01:47PM +0100, Benjamin Berg wrote: > Hi Lorenzo, > > On Thu, 2025-01-16 at 15:48 +, Lorenzo Stoakes wrote: > > On Wed, Jan 15, 2025 at 12:20:59PM -0800, Jeff Xu wrote: > > > On Wed, Jan 15, 2025 at 11:46 AM Lorenzo Stoakes > > > wrote: > > > > [SNIP] > > > > > > > I

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-16 Thread Benjamin Berg
Hi Lorenzo, On Thu, 2025-01-16 at 15:48 +, Lorenzo Stoakes wrote: > On Wed, Jan 15, 2025 at 12:20:59PM -0800, Jeff Xu wrote: > > On Wed, Jan 15, 2025 at 11:46 AM Lorenzo Stoakes > > wrote: > > [SNIP] > > > > > I've made it abundantly clear that this (NACKed) series cannot allow the > > > ke

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-16 Thread Lorenzo Stoakes
On Wed, Jan 15, 2025 at 12:20:59PM -0800, Jeff Xu wrote: > Hi Lorenzo > > On Wed, Jan 15, 2025 at 11:46 AM Lorenzo Stoakes > wrote: > > > > Jeff, > > > > My name is Lorenzo, not Lorenze. > > > I apologize. No worries, sorry I realise it was probably a typo! But just in case you didn't realise :P

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-16 Thread Lorenzo Stoakes
Kees, I reply inline below but the TL;DR is - I'm fine with an incremental approach, my requirements for arch support are sensible and doable and I'll _give a R-b tag_ if such a version is submitted. :) This isn't a discreet means of me trying to reject the whole idea, if I felt that way I'd just

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-15 Thread Christoph Hellwig
On Wed, Jan 15, 2025 at 03:52:23PM -0800, Kees Cook wrote: > > You seem to be saying you're pushing an internal feature on upstream and > > only care about internal use cases, this is not how upstream works, as > > Matthew alludes to. > > Internal? No. Chrome OS and Android. Linux runs more Androi

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-15 Thread Kees Cook
On Wed, Jan 15, 2025 at 07:46:00PM +, Lorenzo Stoakes wrote: > You are now suggesting disabling the !CRIU requirement. Which violates my > _requirements_ (not optional features). Why not make this simply incremental? The feature isn't intended to work with CRIU. Why don't we get the feature in

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-15 Thread Jeff Xu
Hi Lorenzo On Wed, Jan 15, 2025 at 11:46 AM Lorenzo Stoakes wrote: > > Jeff, > > My name is Lorenzo, not Lorenze. > I apologize. > I've made it abundantly clear that this (NACKed) series cannot allow the > kernel to be in a broken state even if a user sets flags to do so. > > This is because use

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-15 Thread Lorenzo Stoakes
Jeff, My name is Lorenzo, not Lorenze. I've made it abundantly clear that this (NACKed) series cannot allow the kernel to be in a broken state even if a user sets flags to do so. This is because users might lack context to make this decision and incorrectly do so, and now we ship a known-broken

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-15 Thread Jeff Xu
On Mon, Jan 13, 2025 at 1:26 PM Jeff Xu wrote: > > On Mon, Jan 6, 2025 at 5:12 PM Kees Cook wrote: > > > > On Fri, Jan 03, 2025 at 09:38:10PM +, Lorenzo Stoakes wrote: > > > On Tue, Dec 17, 2024 at 02:18:53PM -0800, Kees Cook wrote: > > > > On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chr

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-13 Thread Matthew Wilcox
On Mon, Jan 13, 2025 at 01:26:59PM -0800, Jeff Xu wrote: > This patch is intended for ChromeOS and Android and is > feature-complete from their perspective. "I have everything I need from the Google point of view, so I will push this feature into upstream". No, thanks.

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-13 Thread Jeff Xu
On Mon, Jan 6, 2025 at 5:12 PM Kees Cook wrote: > > On Fri, Jan 03, 2025 at 09:38:10PM +, Lorenzo Stoakes wrote: > > On Tue, Dec 17, 2024 at 02:18:53PM -0800, Kees Cook wrote: > > > On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > > > > Seal vdso, vvar, sigpage, uprobes a

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-06 Thread Kees Cook
On Fri, Jan 03, 2025 at 03:48:23PM -0500, Liam R. Howlett wrote: > So we have at least two userspace uses that this will breaks: checkpoint > restore and now gVisor, but who knows what else? How many config > options before we decide this can't be just on by default? See my reply to Lorenzo, but

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-06 Thread Kees Cook
On Fri, Jan 03, 2025 at 09:38:10PM +, Lorenzo Stoakes wrote: > On Tue, Dec 17, 2024 at 02:18:53PM -0800, Kees Cook wrote: > > On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > > > Seal vdso, vvar, sigpage, uprobes and vsyscall. > > > > > > Those mappings are readonly or exe

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-03 Thread Lorenzo Stoakes
On Tue, Dec 17, 2024 at 02:18:53PM -0800, Kees Cook wrote: > On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > > Seal vdso, vvar, sigpage, uprobes and vsyscall. > > > > Those mappings are readonly or executable only, sealing can protect > > them from ever changing or unmapped d

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-03 Thread Liam R. Howlett
* Kees Cook [241217 17:19]: > On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > > Seal vdso, vvar, sigpage, uprobes and vsyscall. > > > > Those mappings are readonly or executable only, sealing can protect > > them from ever changing or unmapped during the life time of the pr

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-02 Thread Andrei Vagin
On Tue, Dec 17, 2024 at 2:18 PM Kees Cook wrote: > > Also from discussions it sounds like there may need to be even finer-gain > control, likely via prctl, for dealing with the CRIU case. The proposal > is to provide an opt-out prctl with CAP_CHECKPOINT_RESTORE? I think this > is reasonable a

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-17 Thread Kees Cook
On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > Seal vdso, vvar, sigpage, uprobes and vsyscall. > > Those mappings are readonly or executable only, sealing can protect > them from ever changing or unmapped during the life time of the process. > For complete descriptions of m

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-16 Thread Jeff Xu
Hi Liam On Mon, Dec 16, 2024 at 10:56 AM Liam R. Howlett wrote: > > * Jeff Xu [241216 13:35]: > > ... > > > > > > > I like the idea and I think the opt-out solution should work for CRIU. > > > CRIU will be able to call this prctl and re-execute itself. > > > > > Great! Let's iterate on the opt-o

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-16 Thread Jeff Xu
Hi Andrei On Thu, Dec 12, 2024 at 10:33 PM Andrei Vagin wrote: > > On Wed, Dec 11, 2024 at 2:47 PM Jeff Xu wrote: > > > > Hi Andrei > > > > Thanks for your email. > > I was hoping to get some feedback from CRIU devs, and happy to see you > > reaching out.. > > > ... > > I have been thinking of o

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-16 Thread Liam R. Howlett
* Jeff Xu [241216 13:35]: ... > > > > I like the idea and I think the opt-out solution should work for CRIU. > > CRIU will be able to call this prctl and re-execute itself. > > > Great! Let's iterate on the opt-out solution then. > This patch set has been NACK'ed. Please rework your solution

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-12 Thread Andrei Vagin
On Wed, Dec 11, 2024 at 2:47 PM Jeff Xu wrote: > > Hi Andrei > > Thanks for your email. > I was hoping to get some feedback from CRIU devs, and happy to see you > reaching out.. > ... > I have been thinking of other alternatives, but those would require > more understanding on CRIU use cases. > On

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-11 Thread Jeff Xu
Hi Andrei Thanks for your email. I was hoping to get some feedback from CRIU devs, and happy to see you reaching out.. On Mon, Dec 9, 2024 at 8:12 PM Andrei Vagin wrote: > > On Mon, Nov 25, 2024 at 12:49 PM wrote: > > > > From: Jeff Xu > > > > Seal vdso, vvar, sigpage, uprobes and vsyscall. >

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-09 Thread Andrei Vagin
On Mon, Nov 25, 2024 at 12:49 PM wrote: > > From: Jeff Xu > > Seal vdso, vvar, sigpage, uprobes and vsyscall. > > Those mappings are readonly or executable only, sealing can protect > them from ever changing or unmapped during the life time of the process. > For complete descriptions of memory se

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-04 Thread Jeff Xu
On Wed, Dec 4, 2024 at 6:04 AM Benjamin Berg wrote: > > Hi, > > On Mon, 2024-11-25 at 20:20 +, jef...@chromium.org wrote: > > From: Jeff Xu > > > > Seal vdso, vvar, sigpage, uprobes and vsyscall. > > > > Those mappings are readonly or executable only, sealing can protect > > them from ever ch

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-04 Thread Benjamin Berg
Hi, On Wed, 2024-12-04 at 09:43 -0800, Jeff Xu wrote: > On Wed, Dec 4, 2024 at 6:04 AM Benjamin Berg > wrote: > > On Mon, 2024-11-25 at 20:20 +, jef...@chromium.org wrote: > > > From: Jeff Xu > > > > > > Seal vdso, vvar, sigpage, uprobes and vsyscall. > > > > > > Those mappings are readon

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-04 Thread Benjamin Berg
Hi, On Mon, 2024-11-25 at 20:20 +, jef...@chromium.org wrote: > From: Jeff Xu > > Seal vdso, vvar, sigpage, uprobes and vsyscall. > > Those mappings are readonly or executable only, sealing can protect > them from ever changing or unmapped during the life time of the process. > For complete

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-03 Thread Lorenzo Stoakes
NACK. Unfortunately past experience indicates that engaging in a back-and-forth is not productive. Please re-read what I've said and properly address the very serious concerns raised. This series is unacceptable in its current form as it allows untested architectures and known broken configurati

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-03 Thread Jeff Xu
On Mon, Dec 2, 2024 at 11:35 PM Lorenzo Stoakes wrote: > > On Mon, Dec 02, 2024 at 12:38:27PM -0800, Jeff Xu wrote: > > On Mon, Dec 2, 2024 at 10:29 AM Lorenzo Stoakes > > wrote: > > > > > > On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > > > > From: Jeff Xu > > > > > > >

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-02 Thread Lorenzo Stoakes
On Mon, Dec 02, 2024 at 12:38:27PM -0800, Jeff Xu wrote: > On Mon, Dec 2, 2024 at 10:29 AM Lorenzo Stoakes > wrote: > > > > On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > > > From: Jeff Xu > > > > > > Seal vdso, vvar, sigpage, uprobes and vsyscall. > > > > > > Those mappin

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-02 Thread Jeff Xu
On Mon, Nov 25, 2024 at 12:40 PM Matthew Wilcox wrote: > > On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > > +/* > > + * Kernel cmdline override for CONFIG_SEAL_SYSTEM_MAPPINGS > > + */ > > +enum seal_system_mappings_type { > > + SEAL_SYSTEM_MAPPINGS_DISABLED, > > +

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-02 Thread Jeff Xu
On Mon, Dec 2, 2024 at 10:29 AM Lorenzo Stoakes wrote: > > On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > > From: Jeff Xu > > > > Seal vdso, vvar, sigpage, uprobes and vsyscall. > > > > Those mappings are readonly or executable only, sealing can protect > > them from ever

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-02 Thread Lorenzo Stoakes
On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > From: Jeff Xu > > Seal vdso, vvar, sigpage, uprobes and vsyscall. > > Those mappings are readonly or executable only, sealing can protect > them from ever changing or unmapped during the life time of the process. > For complete

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-02 Thread Jeff Xu
On Mon, Dec 2, 2024 at 9:57 AM Lorenzo Stoakes wrote: > > On Mon, Dec 02, 2024 at 09:22:33AM -0800, Jeff Xu wrote: > > On Mon, Nov 25, 2024 at 12:40 PM Matthew Wilcox wrote: > > > > > > On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > > > > +/* > > > > + * Kernel cmdline ove

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-02 Thread Jeff Xu
On Mon, Dec 2, 2024 at 9:22 AM Jeff Xu wrote: > > On Mon, Nov 25, 2024 at 12:40 PM Matthew Wilcox wrote: > > > > On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > > > +/* > > > + * Kernel cmdline override for CONFIG_SEAL_SYSTEM_MAPPINGS > > > + */ > > > +enum seal_system_mapp

Re: [PATCH v4 1/1] exec: seal system mappings

2024-12-02 Thread Lorenzo Stoakes
On Mon, Dec 02, 2024 at 09:22:33AM -0800, Jeff Xu wrote: > On Mon, Nov 25, 2024 at 12:40 PM Matthew Wilcox wrote: > > > > On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > > > +/* > > > + * Kernel cmdline override for CONFIG_SEAL_SYSTEM_MAPPINGS > > > + */ > > > +enum seal_sys

Re: [PATCH v4 1/1] exec: seal system mappings

2024-11-25 Thread Matthew Wilcox
On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > +/* > + * Kernel cmdline override for CONFIG_SEAL_SYSTEM_MAPPINGS > + */ > +enum seal_system_mappings_type { > + SEAL_SYSTEM_MAPPINGS_DISABLED, > + SEAL_SYSTEM_MAPPINGS_ENABLED > +}; > + > +static enum seal_system_mappin