From: Ard Biesheuvel <ardb@kernel.org>
To: Shijie Huang <shijie@amperemail.onmicrosoft.com>
Cc: Huang Shijie <shijie@os.amperecomputing.com>,
catalin.marinas@arm.com, will@kernel.org,
anshuman.khandual@arm.com, corbet@lwn.net,
patches@amperecomputing.com, cl@linux.com,
akpm@linux-foundation.org, thuth@redhat.com,
rostedt@goodmis.org, xiongwei.song@windriver.com,
inux-doc@vger.kernel.org, linux-kernel@vger.kernel.org,
linux-arm-kernel@lists.infradead.org
Subject: Re: [PATCH v4 1/2 fix] arm64: refactor the rodata=xxx
Date: Fri, 13 Dec 2024 09:26:14 +0100 [thread overview]
Message-ID: <CAMj1kXHXeiPiksuOabp-NXu0ORmmP1Jd1wZPmgAi09jsjaDAsQ@mail.gmail.com> (raw)
In-Reply-To: <be0d7423-ca33-416d-a410-3ff303493261@amperemail.onmicrosoft.com>
On Fri, 13 Dec 2024 at 09:23, Shijie Huang
<shijie@amperemail.onmicrosoft.com> wrote:
>
> Hi Ard,
>
> On 2024/12/13 15:30, Ard Biesheuvel wrote:
> > Hello Huang Shije,
> >
> > On Fri, 13 Dec 2024 at 06:32, Huang Shijie
> > <shijie@os.amperecomputing.com> wrote:
> >> As per admin guide documentation, "rodata=on" should be the default on
> >> platforms. Documentation/admin-guide/kernel-parameters.txt describes
> >> these options as
> >>
> >> rodata= [KNL,EARLY]
> >> on Mark read-only kernel memory as read-only (default).
> >> off Leave read-only kernel memory writable for debugging.
> >> full Mark read-only kernel memory and aliases as read-only
> >> [arm64]
> >>
> >> But on arm64 platform, "rodata=full" is the default instead. This patch
> >> implements the following changes.
> >>
> >> - Make "rodata=on" behaviour same as the original "rodata=full"
> >> - Make "rodata=noalias" (new) behaviour same as the original "rodata=on"
> >> - Drop the original "rodata=full"
> >> - Add comment for arch_parse_debug_rodata()
> >> - Update kernel-parameters.txt as required
> >>
> >> After this patch, the "rodata=on" will be the default on arm64 platform
> >> as well.
> >>
> >> Signed-off-by: Huang Shijie <shijie@os.amperecomputing.com>
> >> ---
> >> Add more descriptions for "noalias":
> >> It is not a security feature yet.
> > Why did you add that?
> The following is the current status of "rodata=noalias" by checking the
> kernel page table in my machine:
>
> 1) the kernel code keeps read-only in both the "vmalloc area" and
> the "linear area".
>
> 2) But there is a read-only memory range which is read-only in
> "vmalloc area", but its linear alias is read-write in the "linear area".
>
>
> Maybe the "security" is not a proper word.
>
There is nothing wrong with the word 'security' as long as you are
clear about the fact that rodata=noalias decreases it.
>
> >
> > How do you envisage 'noalias' becoming a security feature? The point
>
> for the case 2) above, if its linear alias is also mapped as read-only,
>
> can we think it is safe as the original "rodata=full"?
>
No, it is not. Why would we bother with rodata=full (which is costly
in terms of TLB pressure) if rodata=noalias is equally safe?
next prev parent reply other threads:[~2024-12-13 8:27 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-12-12 8:24 [PATCH v4 0/2] arm64: refactor the rodata=xxx Huang Shijie
2024-12-12 8:24 ` [PATCH v4 1/2] " Huang Shijie
2024-12-13 5:30 ` [PATCH v4 1/2 fix] " Huang Shijie
2024-12-13 7:30 ` Ard Biesheuvel
2024-12-13 8:22 ` Shijie Huang
2024-12-13 8:26 ` Ard Biesheuvel [this message]
2024-12-13 8:46 ` Shijie Huang
2024-12-17 7:17 ` [PATCH v4 1/2 fix-v2 ] " Huang Shijie
2025-06-27 15:44 ` Will Deacon
2025-06-30 1:40 ` Shijie Huang
2024-12-12 8:24 ` [PATCH v4 2/2] arm64/Kconfig: Remove CONFIG_RODATA_FULL_DEFAULT_ENABLED Huang Shijie
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=CAMj1kXHXeiPiksuOabp-NXu0ORmmP1Jd1wZPmgAi09jsjaDAsQ@mail.gmail.com \
--to=ardb@kernel.org \
--cc=akpm@linux-foundation.org \
--cc=anshuman.khandual@arm.com \
--cc=catalin.marinas@arm.com \
--cc=cl@linux.com \
--cc=corbet@lwn.net \
--cc=inux-doc@vger.kernel.org \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=linux-kernel@vger.kernel.org \
--cc=patches@amperecomputing.com \
--cc=rostedt@goodmis.org \
--cc=shijie@amperemail.onmicrosoft.com \
--cc=shijie@os.amperecomputing.com \
--cc=thuth@redhat.com \
--cc=will@kernel.org \
--cc=xiongwei.song@windriver.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).