From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2A512C47258 for ; Wed, 31 Jan 2024 17:49:31 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 7DD4B8D0002; Wed, 31 Jan 2024 12:49:30 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 78D9F8D0001; Wed, 31 Jan 2024 12:49:30 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 655628D0002; Wed, 31 Jan 2024 12:49:30 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id 534188D0001 for ; Wed, 31 Jan 2024 12:49:30 -0500 (EST) Received: from smtpin01.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay04.hostedemail.com (Postfix) with ESMTP id 2D5691A0D67 for ; Wed, 31 Jan 2024 17:49:30 +0000 (UTC) X-FDA: 81740343300.01.A7467BB Received: from mail-oi1-f170.google.com (mail-oi1-f170.google.com [209.85.167.170]) by imf16.hostedemail.com (Postfix) with ESMTP id 67B1E180014 for ; Wed, 31 Jan 2024 17:49:28 +0000 (UTC) Authentication-Results: imf16.hostedemail.com; dkim=pass header.d=chromium.org header.s=google header.b=jBt6Qx0Q; dmarc=pass (policy=none) header.from=chromium.org; spf=pass (imf16.hostedemail.com: domain of jeffxu@chromium.org designates 209.85.167.170 as permitted sender) smtp.mailfrom=jeffxu@chromium.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1706723368; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=E6RF6oHOyisdh7IJgSnB/tHRIU7aiX32oELeK+JlnUw=; b=ioh76hAwElDvD2gas273geqMiNH6bQ5L9n62emESHYaxwD2/+BwIq6jRykxovCtqwEvXqh YetD+E8TZ60Hq81eEYYS2cs5IYeqTXpz0A+UIDijAuw6sbjxdSWloZEc6GCjwW69Frs7dF Qr4dKTVUr1f4LoluDYaBh9X0xByY8sM= ARC-Authentication-Results: i=1; imf16.hostedemail.com; dkim=pass header.d=chromium.org header.s=google header.b=jBt6Qx0Q; dmarc=pass (policy=none) header.from=chromium.org; spf=pass (imf16.hostedemail.com: domain of jeffxu@chromium.org designates 209.85.167.170 as permitted sender) smtp.mailfrom=jeffxu@chromium.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1706723368; a=rsa-sha256; cv=none; b=Z4W4Eu4wATxzWHpF0bGG90RXbCtV43xhmtdjgoaZpXc6jye4hzlh5VUlYiNhKryeIKfdhF I8iPuI+bjBd/0EjySimzmgK1VTJeYmghzq0RwiuInqmyjoC9bQT5+hU0bso2l4kuptKHch /wXzJZrbnP3q8mdrTJvVqbBv5Ldoces= Received: by mail-oi1-f170.google.com with SMTP id 5614622812f47-3bd5c4cffefso56567b6e.1 for ; Wed, 31 Jan 2024 09:49:28 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; t=1706723367; x=1707328167; darn=kvack.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=E6RF6oHOyisdh7IJgSnB/tHRIU7aiX32oELeK+JlnUw=; b=jBt6Qx0QKSXCR+rBe3Cd9NUm4HSxfw1e1K8xmXurRpXdjXJpxlZ7O2xcQfNEFJmSLA cNBONg8GDHHqETqAyT35VfQL2M9qUxAB3X+STpXf0+kin/4VPRzW85NphPASTzXZc5Zq MrjFsCEzrhH879gCmY4//BfvH7vRdf418NbtM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1706723367; x=1707328167; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=E6RF6oHOyisdh7IJgSnB/tHRIU7aiX32oELeK+JlnUw=; b=YlCNWNK+TKGPL8Sc97+jW5PV/Rg/hvZy/Y1uMosQ/pbzuHoeCocbr0H/YCT/v4jBqB ygvh+FjQQITUrkYX6plmq7WlJYMf6qVhrR3qbmfx7CJ8O1+7UjeYIkjwvvCeRjZWGeP5 G6FMU6Tn4j1Ny//xpbnPzYFcD0ePRbiOupLUO6Qrbq3YuCVNZu41eO7YkijjdImo4SiL YjiJPUUgby3emQzgZGfhjUMChrJZRgEkGA0uc50xivJKQz9rPcGxXhXUp1+dqoh6Y64h SypqpfpUi29bTWSvdZ3XyIkRQYbYW2piVb7hy9ztVx+p8tW0B2uijvoVwl/pGO+n+yz+ nQlA== X-Gm-Message-State: AOJu0YyOFTcShAgTmQd0iWmExJyqhlSITvSw1OuCJmyenbI0xf5ArnaY 7zervULBN/L0Gag9D27A0WupjIdIm06srSg00WPhhz30IY6nb1YNCY64YSGu/jZ9aWr+9UALdQr sDj1k4Q0zx09ctCXF0jSv5RFK4nOuIclxFmcC X-Google-Smtp-Source: AGHT+IHnJRdqnxvCutvLC4CPZ65xhd3+S1jtMi5yO+DNT4ZqNiGF46C9Z/p9lddl/TYEn8l461KQ37DNu63A69cIhuY= X-Received: by 2002:a05:6871:5a9a:b0:218:888f:54c7 with SMTP id oo26-20020a0568715a9a00b00218888f54c7mr2620332oac.47.1706723367499; Wed, 31 Jan 2024 09:49:27 -0800 (PST) MIME-Version: 1.0 References: <20240122152905.2220849-1-jeffxu@chromium.org> <87a5ong41h.fsf@meer.lwn.net> In-Reply-To: <87a5ong41h.fsf@meer.lwn.net> From: Jeff Xu Date: Wed, 31 Jan 2024 09:49:15 -0800 Message-ID: Subject: Re: [PATCH v7 0/4] Introduce mseal() To: Jonathan Corbet Cc: akpm@linux-foundation.org, keescook@chromium.org, jannh@google.com, sroettger@google.com, willy@infradead.org, gregkh@linuxfoundation.org, torvalds@linux-foundation.org, usama.anjum@collabora.com, rdunlap@infradead.org, jeffxu@google.com, jorgelo@chromium.org, groeck@chromium.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-mm@kvack.org, pedro.falcato@gmail.com, dave.hansen@intel.com, linux-hardening@vger.kernel.org, deraadt@openbsd.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Rspamd-Queue-Id: 67B1E180014 X-Rspam-User: X-Rspamd-Server: rspam05 X-Stat-Signature: gumpsmwr74paxfhe83z1ncu5rptgiwws X-HE-Tag: 1706723368-659523 X-HE-Meta: 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 zjKhB4iE YjF2GWAvq/J42uu+uJ8PD4CmmOBsKnntNn3ad0pcaT8cF7Xv7z/Cdss/1aQoe5/64vCB24WSxze/lYDSJO2Ka5HqP2eOupngPx7FRVqKcJmFPISpXvDH6iHysQxXp0/U5eBgH/2796tfnBFCUilBtPHOrJiGnIoLG9UPRqbgFiormmDk6Wzam/v10Cr09Gqkahu0/ZhMw+eYIzqEVr76sUJS06Z5bQvetp5+a2QdEd+4v2lxuSstvbagB8VAJ/VaykHkSocC6FOX+mmttQ7dpjFv9XpMbdfklva0TopI1vxx6Qt99dlbIu9vmVgNW+Y8zr+Pyh6l89CocyjnlGD914jCrJ6ywYb5f116MAh9775Fmm+myz1h8bQe3tR9rpcHKsMQJ46TbXtXlEmdSBPmxmqVW+/n1uTPRPTAU X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On Mon, Jan 29, 2024 at 2:37=E2=80=AFPM Jonathan Corbet wr= ote: > > jeffxu@chromium.org writes: > > > Although the initial version of this patch series is targeting the > > Chrome browser as its first user, it became evident during upstream > > discussions that we would also want to ensure that the patch set > > eventually is a complete solution for memory sealing and compatible > > with other use cases. The specific scenario currently in mind is > > glibc's use case of loading and sealing ELF executables. To this end, > > Stephen is working on a change to glibc to add sealing support to the > > dynamic linker, which will seal all non-writable segments at startup. > > Once this work is completed, all applications will be able to > > automatically benefit from these new protections. > > Is this work posted somewhere? Having a second - and more generally > useful - user for this API would do a lot to show that the design is, in > fact, right and useful beyond the Chrome browser. > Stephen conducted a PoC last year, it will be published once it is complete= . We're super excited about introducing this as a general safety measure for all of Linux! Thanks -Jeff > Thanks, > > jon