LWN.net (RSS Feed) on Nostr: [$] An update on sealed system mappings Jeff Xu has been working on <a ...
[$] An update on sealed system mappings
Jeff Xu has been working on
<a href="https://lwn.net/ml/all/20241125202021.3684919-1-jeffxu@google.com/"; rel="nofollow">
a patch set</a> that makes certain mappings in a process's address space
impossible to change, sealing them against tampering. This has some potential
security benefits — mainly, making
sure that someone cannot relocate the
<a href="https://lwn.net/Articles/446528/"; rel="nofollow">vsyscall and
vDSO mappings</a> — but some kernel developers haven't
been impressed with the patches.
While the core functionality (sealing the mappings) is sound, some of the
supporting code for enabling and disabling the new feature caused concern by
going against the normal design for such things. Reviewers also questioned
how this feature would interact with checkpointing and with sandboxing.
https://lwn.net/Articles/1006375/
Jeff Xu has been working on
<a href="https://lwn.net/ml/all/20241125202021.3684919-1-jeffxu@google.com/"; rel="nofollow">
a patch set</a> that makes certain mappings in a process's address space
impossible to change, sealing them against tampering. This has some potential
security benefits — mainly, making
sure that someone cannot relocate the
<a href="https://lwn.net/Articles/446528/"; rel="nofollow">vsyscall and
vDSO mappings</a> — but some kernel developers haven't
been impressed with the patches.
While the core functionality (sealing the mappings) is sound, some of the
supporting code for enabling and disabling the new feature caused concern by
going against the normal design for such things. Reviewers also questioned
how this feature would interact with checkpointing and with sandboxing.
https://lwn.net/Articles/1006375/