[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CABi2SkWeTCZ+vfLLvgNe+M98N0Dnyzd+SyhF3Bx8rM5YPMuFhg@mail.gmail.com>
Date: Tue, 11 Feb 2025 19:40:16 -0800
From: Jeff Xu <jeffxu@...omium.org>
To: Randy Dunlap <rdunlap@...radead.org>
Cc: akpm@...ux-foundation.org, keescook@...omium.org, jannh@...gle.com,
torvalds@...ux-foundation.org, vbabka@...e.cz, lorenzo.stoakes@...cle.com,
Liam.Howlett@...cle.com, adhemerval.zanella@...aro.org, oleg@...hat.com,
avagin@...il.com, benjamin@...solutions.net, linux-kernel@...r.kernel.org,
linux-hardening@...r.kernel.org, linux-mm@...ck.org, jorgelo@...omium.org,
sroettger@...gle.com, hch@....de, ojeda@...nel.org,
thomas.weissschuh@...utronix.de, adobriyan@...il.com,
johannes@...solutions.net, pedro.falcato@...il.com, hca@...ux.ibm.com,
willy@...radead.org, anna-maria@...utronix.de, mark.rutland@....com,
linus.walleij@...aro.org, Jason@...c4.com, deller@....de, davem@...emloft.net,
peterx@...hat.com, f.fainelli@...il.com, gerg@...nel.org,
dave.hansen@...ux.intel.com, mingo@...nel.org, ardb@...nel.org,
mhocko@...e.com, 42.hyeyoo@...il.com, peterz@...radead.org, ardb@...gle.com,
enh@...gle.com, rientjes@...gle.com, groeck@...omium.org, mpe@...erman.id.au,
aleksandr.mikhalitsyn@...onical.com, mike.rapoport@...il.com
Subject: Re: [RFC PATCH v5 1/7] mseal, system mappings: kernel config and
header change
On Tue, Feb 11, 2025 at 7:31 PM Randy Dunlap <rdunlap@...radead.org> wrote:
>
>
>
> On 2/11/25 7:21 PM, jeffxu@...omium.org wrote:
> > From: Jeff Xu <jeffxu@...omium.org>
> >
>
> > ---
> > include/linux/userprocess.h | 18 ++++++++++++++++++
> > init/Kconfig | 18 ++++++++++++++++++
> > security/Kconfig | 18 ++++++++++++++++++
> > 3 files changed, 54 insertions(+)
> > create mode 100644 include/linux/userprocess.h
> >
>
> > diff --git a/init/Kconfig b/init/Kconfig
> > index d0d021b3fa3b..892d2bcdf397 100644
> > --- a/init/Kconfig
> > +++ b/init/Kconfig
> > @@ -1882,6 +1882,24 @@ config ARCH_HAS_MEMBARRIER_CALLBACKS
> > config ARCH_HAS_MEMBARRIER_SYNC_CORE
> > bool
> >
> > +config ARCH_HAS_MSEAL_SYSTEM_MAPPINGS
> > + bool
> > + help
> > + Control MSEAL_SYSTEM_MAPPINGS access based on architecture.
> > +
> > + A 64-bit kernel is required for the memory sealing feature.
> > + No specific hardware features from the CPU are needed.
> > +
> > + To enable this feature, the architecture needs to update their
> > + speical mappings calls to include the sealing flag and confirm
>
> special
>
Ack, will fix.
Thanks !
-Jeff
> > + that it doesn't unmap/remap system mappings during the life
> > + time of the process. After the architecture enables this, a
> > + distribution can set CONFIG_MSEAL_SYSTEM_MAPPING to manage access
> > + to the feature.
> > +
> > + For complete descriptions of memory sealing, please see
> > + Documentation/userspace-api/mseal.rst
> > +
> > config HAVE_PERF_EVENTS
> > bool
> > help
>
>
> --
> ~Randy
>
Powered by blists - more mailing lists