From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3B298CDB482 for ; Thu, 19 Oct 2023 08:28:52 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id BAEBD8D0195; Thu, 19 Oct 2023 04:28:51 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id B36948D0019; Thu, 19 Oct 2023 04:28:51 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 9FEF88D0195; Thu, 19 Oct 2023 04:28:51 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id 8CEDB8D0019 for ; Thu, 19 Oct 2023 04:28:51 -0400 (EDT) Received: from smtpin19.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay02.hostedemail.com (Postfix) with ESMTP id 550C81211AC for ; Thu, 19 Oct 2023 08:28:51 +0000 (UTC) X-FDA: 81361535262.19.565A455 Received: from mail-ej1-f43.google.com (mail-ej1-f43.google.com [209.85.218.43]) by imf26.hostedemail.com (Postfix) with ESMTP id 8645414000F for ; Thu, 19 Oct 2023 08:28:49 +0000 (UTC) Authentication-Results: imf26.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b=4fISbLO3; spf=pass (imf26.hostedemail.com: domain of sroettger@google.com designates 209.85.218.43 as permitted sender) smtp.mailfrom=sroettger@google.com; dmarc=pass (policy=reject) header.from=google.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1697704129; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=dWbHb6s4d7l1XqBjBVPsT5zwR7Rud84oyl/EbqDsdMU=; b=D/vdVs9nsO2T9Fef7rt0Tnn00srL1D2U54Ww1ArA3O6UbnXH+RdThEL37kCdTm4ynaXXNq 1O97X67IAv97J9ct7KPe9spF293yFP5zbtmgsW0veUJMqfIzqjY7cFxrxeqK5cHKqf6H9L oxO/x6bSGGEf3tgqMHtWNeMNeCS70iw= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1697704129; a=rsa-sha256; cv=none; b=Oc6jRWLuC/8JJrXc020STmDwfOLlFvCOLtePw3OVmcyxy7qv/Qy33wS1lnyAy1lloE9TPV 06CmxrVn+FBn5HL0d8Oa3dleC70dUYepoby0CHhtMOH+i7CCX7SK+5wMvDILYPoZmirvuP hdSYelUmQidWk5D7Z30x2Id8pLLyyKg= ARC-Authentication-Results: i=1; imf26.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b=4fISbLO3; spf=pass (imf26.hostedemail.com: domain of sroettger@google.com designates 209.85.218.43 as permitted sender) smtp.mailfrom=sroettger@google.com; dmarc=pass (policy=reject) header.from=google.com Received: by mail-ej1-f43.google.com with SMTP id a640c23a62f3a-9ba081173a3so1263840066b.1 for ; Thu, 19 Oct 2023 01:28:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1697704128; x=1698308928; darn=kvack.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=dWbHb6s4d7l1XqBjBVPsT5zwR7Rud84oyl/EbqDsdMU=; b=4fISbLO3OlWowKmVvk2KjgfXSMC8EcP70orB7LsPdPcbU7nrLeiRE8lqmbkWYqu4t9 uOLRj3a7w0By/JHPinbs2fiv+nG4tmdIVdNjh0yIDjKlejDtXzgaoWfUC3pGRoCT0x0u M8duBYE1NtgaJ2/+IOzHGMe/j0F+VdD539ox9kEdOaTms7KhFvqEaT5TcwmrlfQZYzUN fcYnKDyyH90Vpa6oxW+DH4O69Kx+q4rVKMYe9jyBO6Cn/RX4E0Q4NSp8Gfd/coMZExpT wVcTghY6Vw/w9CcYyrUPDKupZvtLe51hJ96V1oEBCLklq+k6C9twRKGJFcfhuHQkeLBG n5Jg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1697704128; x=1698308928; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=dWbHb6s4d7l1XqBjBVPsT5zwR7Rud84oyl/EbqDsdMU=; b=nI4oojMBR+ttXwYsTw85sDNUKtdGbrO7czZ/irpvim6o23SfMFJux4GTC61TxiObDS xSnnxdSN5pkNaQU2KMapGgatVhnuaswoifMgqZamNElscP5lA58jQQfk6hDAnCNDZ8HI 5yERsfkkDl5rwhnoNMPD8ED/yFagodn88L3+10nDPQmd98nmxChMhHUriNWyyAybGrbv hz2/h7b6MSzR8LnZtY3cb6O5yvbcwEsKX6lFgQ/liaAbC4NrWdD6K3C6qWHd4NEnZB+E iynE1E98SC7sBS1XIKJ+BbMQqAykERKwLDC/giZKVawVCixRCdNE4/wp1EgCPV8zCSz+ GoEw== X-Gm-Message-State: AOJu0YzhdDRNqQuMJ2eyMNXsTLd6pQXMj56qAUVkR8L2l3YkuknQvo2W 1sME+eRJ7AUmEsikxdwtwD0uQFDA9FNxtPwHC/zVVw== X-Google-Smtp-Source: AGHT+IH7E2FmlBTzpRteQDk+hDLSK7kOdRA2fpg7JZn3vIczrsCBy6izaVZ3GrO0E1/IgeAz22mjsQeaPCnhTYZyymw= X-Received: by 2002:a17:907:7e94:b0:9bf:10f3:e435 with SMTP id qb20-20020a1709077e9400b009bf10f3e435mr1350365ejc.1.1697704127553; Thu, 19 Oct 2023 01:28:47 -0700 (PDT) MIME-Version: 1.0 References: <20231016143828.647848-1-jeffxu@chromium.org> <55960.1697566804@cvs.openbsd.org> <95482.1697587015@cvs.openbsd.org> <7071.1697661373@cvs.openbsd.org> In-Reply-To: <7071.1697661373@cvs.openbsd.org> From: =?UTF-8?Q?Stephen_R=C3=B6ttger?= Date: Thu, 19 Oct 2023 10:28:32 +0200 Message-ID: Subject: Re: [RFC PATCH v1 0/8] Introduce mseal() syscall To: Theo de Raadt Cc: Jeff Xu , Matthew Wilcox , Linus Torvalds , jeffxu@chromium.org, akpm@linux-foundation.org, keescook@chromium.org, jorgelo@chromium.org, groeck@chromium.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-mm@kvack.org, jannh@google.com, surenb@google.com, alex.sierra@amd.com, apopple@nvidia.com, aneesh.kumar@linux.ibm.com, axelrasmussen@google.com, ben@decadent.org.uk, catalin.marinas@arm.com, david@redhat.com, dwmw@amazon.co.uk, ying.huang@intel.com, hughd@google.com, joey.gouly@arm.com, corbet@lwn.net, wangkefeng.wang@huawei.com, Liam.Howlett@oracle.com, lstoakes@gmail.com, mawupeng1@huawei.com, linmiaohe@huawei.com, namit@vmware.com, peterx@redhat.com, peterz@infradead.org, ryan.roberts@arm.com, shr@devkernel.io, vbabka@suse.cz, xiujianfeng@huawei.com, yu.ma@intel.com, zhangpeng362@huawei.com, dave.hansen@intel.com, luto@kernel.org, linux-hardening@vger.kernel.org Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha-256; boundary="0000000000007e1a9e06080d8b29" X-Rspamd-Queue-Id: 8645414000F X-Rspam-User: X-Stat-Signature: t6j6wawogb66838mparnuqqeggxb5x6f X-Rspamd-Server: rspam03 X-HE-Tag: 1697704129-434080 X-HE-Meta: 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 2CGe0Mo+ Dr9jfIyKqWtX9hiKqWRO1/v3lbFAcB0FZiLcjJ+0urDg+UMJmhng0/FvzWoHjwr5kZvCfKytDW4wEX9bsNMjlMMs/EyOedP9jPZ28Y4JGHDn3aJPWHRhZh7HXeGAh7Nu6d202RiTyZZo/CuXJq+QN1c1roCHtssBnhOK9msNCZASvLCfV4x2STHbD8YJwzkHnMB+T7WLylc1w+ZrRqivzwZ8hnfamHpPVxERUrYofmfw7BrBN/WU7rJj5wJ5j4v0ea3/pGAKAlzVT1eY9ygND0MDbKRknWhk2GWdb1NLW89TdI0+nWyOUBm5npMseKD21PC2otMjgBL/aOT5evLcdFYMiO+8d40ZFVRXL2wkG9v5DRnUBTwl3cxSwdVnRJRfT+uRgBLG6fGST1yk= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: --0000000000007e1a9e06080d8b29 Content-Type: text/plain; charset="UTF-8" > > IMO: The approaches mimmutable() and mseal() took are different, but > > we all want to seal the memory from attackers and make the linux > > application safer. > > I think you are building mseal for chrome, and chrome alone. > > I do not think this will work out for the rest of the application space > because > > 1) it is too complicated > 2) experience with mimmutable() says that applications don't do any of it > themselves, it is all in execve(), libc initialization, and ld.so. > You don't strike me as an execve, libc, or ld.so developer. We do want to build this in a way that it can be applied automatically by ld.so and we appreciate all your feedback on this. The intention of splitting the sealing by syscall was to provide flexibility while still allowing ld.so to seal all operations. But it's clear from the feedback that both the fine grained split and the per-syscall approach are not the right way to go. Does Linus' proposal to just split munmap / mprotect sealing address your complexity concerns? ld.so would always use both flags which should then behave similar to mimmutable(). --0000000000007e1a9e06080d8b29 Content-Type: application/pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" Content-Description: S/MIME Cryptographic Signature MIIPoQYJKoZIhvcNAQcCoIIPkjCCD44CAQExDzANBglghkgBZQMEAgEFADALBgkqhkiG9w0BBwGg ggz7MIIEtjCCA56gAwIBAgIQeAMYYHb81ngUVR0WyMTzqzANBgkqhkiG9w0BAQsFADBMMSAwHgYD VQQLExdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSMzETMBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UE AxMKR2xvYmFsU2lnbjAeFw0yMDA3MjgwMDAwMDBaFw0yOTAzMTgwMDAwMDBaMFQxCzAJBgNVBAYT AkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMSowKAYDVQQDEyFHbG9iYWxTaWduIEF0bGFz IFIzIFNNSU1FIENBIDIwMjAwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCvLe9xPU9W dpiHLAvX7kFnaFZPuJLey7LYaMO8P/xSngB9IN73mVc7YiLov12Fekdtn5kL8PjmDBEvTYmWsuQS 6VBo3vdlqqXZ0M9eMkjcKqijrmDRleudEoPDzTumwQ18VB/3I+vbN039HIaRQ5x+NHGiPHVfk6Rx c6KAbYceyeqqfuJEcq23vhTdium/Bf5hHqYUhuJwnBQ+dAUcFndUKMJrth6lHeoifkbw2bv81zxJ I9cvIy516+oUekqiSFGfzAqByv41OrgLV4fLGCDH3yRh1tj7EtV3l2TngqtrDLUs5R+sWIItPa/4 AJXB1Q3nGNl2tNjVpcSn0uJ7aFPbAgMBAAGjggGKMIIBhjAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0l BBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMEMBIGA1UdEwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFHzM CmjXouseLHIb0c1dlW+N+/JjMB8GA1UdIwQYMBaAFI/wS3+oLkUkrk1Q+mOai97i3Ru8MHsGCCsG AQUFBwEBBG8wbTAuBggrBgEFBQcwAYYiaHR0cDovL29jc3AyLmdsb2JhbHNpZ24uY29tL3Jvb3Ry MzA7BggrBgEFBQcwAoYvaHR0cDovL3NlY3VyZS5nbG9iYWxzaWduLmNvbS9jYWNlcnQvcm9vdC1y My5jcnQwNgYDVR0fBC8wLTAroCmgJ4YlaHR0cDovL2NybC5nbG9iYWxzaWduLmNvbS9yb290LXIz LmNybDBMBgNVHSAERTBDMEEGCSsGAQQBoDIBKDA0MDIGCCsGAQUFBwIBFiZodHRwczovL3d3dy5n bG9iYWxzaWduLmNvbS9yZXBvc2l0b3J5LzANBgkqhkiG9w0BAQsFAAOCAQEANyYcO+9JZYyqQt41 TMwvFWAw3vLoLOQIfIn48/yea/ekOcParTb0mbhsvVSZ6sGn+txYAZb33wIb1f4wK4xQ7+RUYBfI TuTPL7olF9hDpojC2F6Eu8nuEf1XD9qNI8zFd4kfjg4rb+AME0L81WaCL/WhP2kDCnRU4jm6TryB CHhZqtxkIvXGPGHjwJJazJBnX5NayIce4fGuUEJ7HkuCthVZ3Rws0UyHSAXesT/0tXATND4mNr1X El6adiSQy619ybVERnRi5aDe1PTwE+qNiotEEaeujz1a/+yYaaTY+k+qJcVxi7tbyQ0hi0UB3myM A/z2HmGEwO8hx7hDjKmKbDCCA18wggJHoAMCAQICCwQAAAAAASFYUwiiMA0GCSqGSIb3DQEBCwUA MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIzMRMwEQYDVQQKEwpHbG9iYWxTaWdu MRMwEQYDVQQDEwpHbG9iYWxTaWduMB4XDTA5MDMxODEwMDAwMFoXDTI5MDMxODEwMDAwMFowTDEg MB4GA1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjMxEzARBgNVBAoTCkdsb2JhbFNpZ24xEzAR BgNVBAMTCkdsb2JhbFNpZ24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDMJXaQeQZ4 Ihb1wIO2hMoonv0FdhHFrYhy/EYCQ8eyip0EXyTLLkvhYIJG4VKrDIFHcGzdZNHr9SyjD4I9DCuu l9e2FIYQebs7E4B3jAjhSdJqYi8fXvqWaN+JJ5U4nwbXPsnLJlkNc96wyOkmDoMVxu9bi9IEYMpJ pij2aTv2y8gokeWdimFXN6x0FNx04Druci8unPvQu7/1PQDhBjPogiuuU6Y6FnOM3UEOIDrAtKeh 6bJPkC4yYOlXy7kEkmho5TgmYHWyn3f/kRTvriBJ/K1AFUjRAjFhGV64l++td7dkmnq/X8ET75ti +w1s4FRpFqkD2m7pg5NxdsZphYIXAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8E BTADAQH/MB0GA1UdDgQWBBSP8Et/qC5FJK5NUPpjmove4t0bvDANBgkqhkiG9w0BAQsFAAOCAQEA S0DbwFCq/sgM7/eWVEVJu5YACUGssxOGhigHM8pr5nS5ugAtrqQK0/Xx8Q+Kv3NnSoPHRHt44K9u bG8DKY4zOUXDjuS5V2yq/BKW7FPGLeQkbLmUY/vcU2hnVj6DuM81IcPJaP7O2sJTqsyQiunwXUaM ld16WCgaLx3ezQA3QY/tRG3XUyiXfvNnBB4V14qWtNPeTCekTBtzc3b0F5nCH3oO4y0IrQocLP88 q1UOD5F+NuvDV0m+4S4tfGCLw0FREyOdzvcya5QBqJnnLDMfOjsl0oZAzjsshnjJYS8Uuu7bVW/f hO4FCU29KNhyztNiUGUe65KXgzHZs7XKR1g/XzCCBNowggPCoAMCAQICEAFp/vXw/R/y8Lw9a544 0YEwDQYJKoZIhvcNAQELBQAwVDELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYt c2ExKjAoBgNVBAMTIUdsb2JhbFNpZ24gQXRsYXMgUjMgU01JTUUgQ0EgMjAyMDAeFw0yMzA4MDMx NDAzNDFaFw0yNDAxMzAxNDAzNDFaMCUxIzAhBgkqhkiG9w0BCQEWFHNyb2V0dGdlckBnb29nbGUu Y29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzZBSWG7xnoaWcP4VRUAeztPXUgNd 4NVClkgOotwFn0FApauaJXUitczPQ2w4m1sPPA48zEhzTwXMSwtz6Wv7R1H9Dg1QywapO8P96WlF pG7WYEC++EJCxTk76P0djj2QNygfgvl150GkwmND15qMN8XgBgs0YMLse26UtQDC9Oz+QkMYWVal GZfXs2f/WRb1WNkLIB9JfeGE35OXFsuhrwiyfxaF3IYQNJP3OxSuYccnJUTwEKB4OqHuxdwNfvHG BsgT+rklyUPEcOT/jS9EGatv79VPLXtr21rzz4/no0sJf074YB0jjCVqlpKfQW2rYncOAI7tO/Vc ReJB/+2+iwIDAQABo4IB1TCCAdEwHwYDVR0RBBgwFoEUc3JvZXR0Z2VyQGdvb2dsZS5jb20wDgYD VR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMEBggrBgEFBQcDAjAdBgNVHQ4EFgQUwQlr miiwZhqbFo3H+sN+36dVsCIwTAYDVR0gBEUwQzBBBgkrBgEEAaAyASgwNDAyBggrBgEFBQcCARYm aHR0cHM6Ly93d3cuZ2xvYmFsc2lnbi5jb20vcmVwb3NpdG9yeS8wDAYDVR0TAQH/BAIwADCBmgYI KwYBBQUHAQEEgY0wgYowPgYIKwYBBQUHMAGGMmh0dHA6Ly9vY3NwLmdsb2JhbHNpZ24uY29tL2Nh L2dzYXRsYXNyM3NtaW1lY2EyMDIwMEgGCCsGAQUFBzAChjxodHRwOi8vc2VjdXJlLmdsb2JhbHNp Z24uY29tL2NhY2VydC9nc2F0bGFzcjNzbWltZWNhMjAyMC5jcnQwHwYDVR0jBBgwFoAUfMwKaNei 6x4schvRzV2Vb4378mMwRgYDVR0fBD8wPTA7oDmgN4Y1aHR0cDovL2NybC5nbG9iYWxzaWduLmNv bS9jYS9nc2F0bGFzcjNzbWltZWNhMjAyMC5jcmwwDQYJKoZIhvcNAQELBQADggEBABDOrwE7xhhZ KPffKFRtuggfC0sfh0EHmrCzCXlyiQFmTpjm73me7rw+ibiPUnohQxkeqC9KvwDd/gF7OAY3un01 f8y5iEmwoymOLIzkTKIMHDp6qOul60jFrAWe8EQMuBMEc9TQbOiXB4jFgLuDZX7AspyVvnmLA5sw msq0yrGgxTsEeZniQpdOP/qZNS2TJmvNH8a8HuQfHH/pd20lRWfTEuhSRN8cTkKihK7iO8wjCmrp EXefUessFdMqMUSfGI6rUaZTfU0SRfdrVHW4IE8onI30/UVurbGlFiugNF3LbDMXdqzs2/eTsLiD 8Dv1+pt7SJqI4zNhzZFOpvBPVIkxggJqMIICZgIBATBoMFQxCzAJBgNVBAYTAkJFMRkwFwYDVQQK ExBHbG9iYWxTaWduIG52LXNhMSowKAYDVQQDEyFHbG9iYWxTaWduIEF0bGFzIFIzIFNNSU1FIENB IDIwMjACEAFp/vXw/R/y8Lw9a5440YEwDQYJYIZIAWUDBAIBBQCggdQwLwYJKoZIhvcNAQkEMSIE IPHNM1FLRZJiedGV78LWIbLcfhG44YthXIWK+1QlQlPyMBgGCSqGSIb3DQEJAzELBgkqhkiG9w0B BwEwHAYJKoZIhvcNAQkFMQ8XDTIzMTAxOTA4Mjg0OFowaQYJKoZIhvcNAQkPMVwwWjALBglghkgB ZQMEASowCwYJYIZIAWUDBAEWMAsGCWCGSAFlAwQBAjAKBggqhkiG9w0DBzALBgkqhkiG9w0BAQow CwYJKoZIhvcNAQEHMAsGCWCGSAFlAwQCATANBgkqhkiG9w0BAQEFAASCAQClgRkBURnQbzqSbTnU T7G/1KuIehcwYLsoU5DQD7ft8qGZJSJeywY20n6aEYRrkGXXvXQtzKPFRyZeW/yY7fCKR7vH7KQn v5W5UlbY4C/JNiLRQ3ET8sGcdowV+0SJOxZozLKCH2tcMry7L8+0+O4Vm/zTxlq67ISc6O6ieRg3 JhOqXkH71KV4tx/RITrBrVKtAZucJxJMNvfWWXAjuY29a3XEkFnfIVs1GHxNBKNMk1bSGNrBWOxv ufUq/0Yszi4X/VgSRKHRSUyCQeeK76dWZ+u0t2qcSTFBD7dEHFMT8ZofzEI6TB0xTLIYcVvplyis Rxsy+CLwqIHgibltIWG/ --0000000000007e1a9e06080d8b29--