kernel-hardening.lists.openwall.com archive mirror
 help / color / mirror / Atom feed
From: Igor Stoppa <igor.stoppa@gmail.com>
To: Tycho Andersen <tycho@tycho.ws>
Cc: Julian Stecklina <jsteckli@amazon.de>,
	kernel-hardening@lists.openwall.com,
	Liran Alon <liran.alon@oracle.com>,
	Jonathan Adams <jwadams@google.com>,
	David Woodhouse <dwmw2@infradead.org>
Subject: Re: [RFC PATCH 0/6] Process-local memory allocations
Date: Wed, 21 Nov 2018 20:12:32 +0200	[thread overview]
Message-ID: <4ce56f3c-225f-4985-7000-0fcf2f9ab5fd@gmail.com> (raw)
In-Reply-To: <20181121174821.GA3313@cisco>



On 21/11/2018 19:48, Tycho Andersen wrote:
> On Wed, Nov 21, 2018 at 07:18:17PM +0200, Igor Stoppa wrote:
>> Hi,
>>
>> On 21/11/2018 01:26, Tycho Andersen wrote:

[...]

>>> This seems similar in spirit to prmem:
>>> https://lore.kernel.org/lkml/20181023213504.28905-2-igor.stoppa@huawei.com/T/#u
>>>
>>> Basically, we have some special memory that we want to leave unmapped
>>> (read only) most of the time, but map it (writable) sometimes. I
>>> wonder if we should merge the APIs in to one
>>>
>>> spmemalloc(size, flags, PRLOCAL)
>>>
>>> type thing? Could we share some infrastructure then?
>>
>> For what I can understand from the intro only, this seems to focus on
>> "local" information, related to processes, while prmem was mostly aimed, at
>> least at this stage, at system-level features, like LSM or SELinux.
>> Those have probably little value, for protection from reading.
>> And they are used quite often, typically on a critical path.
>> The main thing is to prevent rogue writes, but reads are not a problem.
>> Hiding/unhiding them even from read operations might not be so useful.
>>
>> However other components, like the kernel keyring, are used less frequently
>> and might be worth protecting them even from read operations.
> 
> Right, the goals are different, but the idea is basically the same. We
> allocate memory in some "special" way. I'm just wondering if we'll be
> adding more of these special ways in the future, and if it's worth
> synchronizing the APIs so that it's easy for people to use.

Yes, I agree. I do not see much use for this "locality" in most of the 
use cases that I have looked into, apart from maybe the kernel keyring,
but it might be possible to add a "scope" property to a memory pool, if 
it is associated to some very specific code.

Doing it for system-level components, however, might introduce too big 
an overhead. In these cases, the scope would stay global.

But I really need to see the code, before I can say more.

--
igor

  reply	other threads:[~2018-11-21 18:12 UTC|newest]

Thread overview: 10+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <cover.1542722764.git.jsteckli@amazon.de>
2018-11-20 23:26 ` [RFC PATCH 0/6] Process-local memory allocations Tycho Andersen
2018-11-21 17:18   ` Igor Stoppa
2018-11-21 17:48     ` Tycho Andersen
2018-11-21 18:12       ` Igor Stoppa [this message]
     [not found]       ` <1542904826.6344.1.camel@amazon.de>
2018-11-23 16:24         ` Igor Stoppa
2018-11-23 17:04           ` Solar Designer
2018-11-23 17:23             ` Solar Designer
2018-12-13 14:28   ` Julian Stecklina
2018-12-14  2:09     ` Tycho Andersen
2018-12-19 23:00     ` Igor Stoppa

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=4ce56f3c-225f-4985-7000-0fcf2f9ab5fd@gmail.com \
    --to=igor.stoppa@gmail.com \
    --cc=dwmw2@infradead.org \
    --cc=jsteckli@amazon.de \
    --cc=jwadams@google.com \
    --cc=kernel-hardening@lists.openwall.com \
    --cc=liran.alon@oracle.com \
    --cc=tycho@tycho.ws \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).