-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enforce MTE protection for writeable file-backed mappings without tmpfs #469
Comments
Labeled as higher-priority since this is likely what's blocking enabling the |
Running binaries from tmpfs (I moved the
|
Seems like unmapping then remapping segments should work. In our case we should strace QEMU since that may also affect what/whether we need to do this. |
Do you get the same thing when qemu-aarch64 is also in |
After resolving some stack alignment issues caused by SCTLR_EL1 bits SA and SA0 being set (see PR #495) I managed to run the minimal test on an arch linux chroot on an MTE-enabled pixel. When running the test binary from disk |
I think it might still be preferable to re-map these pages rather than requiring running from a tmpfs, as doing so either requires finding a mounted tmpfs filesystem or having root privileges to mount one, and then the binary has to be copied there before running. Is it very much harder to re-map pages? |
This may not require any changes if running binaries from a tmpfs solves the problem, but we should verify that that's true. See this comment on #314 for details
The text was updated successfully, but these errors were encountered: