From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id E2D1CCDB465 for ; Thu, 19 Oct 2023 08:00:51 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 5CC828D0193; Thu, 19 Oct 2023 04:00:51 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 5544F8D0110; Thu, 19 Oct 2023 04:00:51 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 3CDCF8D0193; Thu, 19 Oct 2023 04:00:51 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id 2919F8D0110 for ; Thu, 19 Oct 2023 04:00:51 -0400 (EDT) Received: from smtpin03.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay05.hostedemail.com (Postfix) with ESMTP id EBF07411B4 for ; Thu, 19 Oct 2023 08:00:50 +0000 (UTC) X-FDA: 81361464660.03.E53E40A Received: from mail-ej1-f42.google.com (mail-ej1-f42.google.com [209.85.218.42]) by imf27.hostedemail.com (Postfix) with ESMTP id 2DF984001D for ; Thu, 19 Oct 2023 08:00:48 +0000 (UTC) Authentication-Results: imf27.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b=liVIuR3Y; dmarc=pass (policy=reject) header.from=google.com; spf=pass (imf27.hostedemail.com: domain of sroettger@google.com designates 209.85.218.42 as permitted sender) smtp.mailfrom=sroettger@google.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1697702449; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=Jnz5KqmHZersx80WuX+WPSIdXUZAnRdwRfo2wcqpYWI=; b=EWmBg7vOppKMVze9ZBiSf+PKuK2LbK46Y4mvmMIXKbc31oTi4KUVU5OvKqK+ceJeADmbNy OgYraxdwPSGH90IQariTt0uyy9qQ60m4u70dnC4NUT83alW9liA8zVFGEotRITvEWpyD+u wOrFpBiuWO2spK7boYNYUAtIoZyw9i0= ARC-Authentication-Results: i=1; imf27.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b=liVIuR3Y; dmarc=pass (policy=reject) header.from=google.com; spf=pass (imf27.hostedemail.com: domain of sroettger@google.com designates 209.85.218.42 as permitted sender) smtp.mailfrom=sroettger@google.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1697702449; a=rsa-sha256; cv=none; b=biji0Qd8NrD30BcOuFCPdJKWY17uLpkud0FhYfAF9/7tcqsdJhcMkveS5XQM25oNBsSFel +ps0t/8Bcy8gHmcikmCvvt+lGg+9vOz0xOYnUizMwPDtL8C4QpQcn/C/6ESdEspAfZCVH4 foH1bKNkF2gHQst0aYaHGUqoZMQY+10= Received: by mail-ej1-f42.google.com with SMTP id a640c23a62f3a-98377c5d53eso1182642366b.0 for ; Thu, 19 Oct 2023 01:00:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1697702447; x=1698307247; darn=kvack.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=Jnz5KqmHZersx80WuX+WPSIdXUZAnRdwRfo2wcqpYWI=; b=liVIuR3YC6xIZa3vjXnnxg4XkuuPkJ1dnAK5OfLzJZk4G61BmpCHLZe1/5nPnQQ8Lg NgT42hQh3eIwppJEKpVERavNqXGvTNksLYZN4KnswdABdNY6PSnii3nxwS2eLvPyOFcT zyoWzMZBG8Nho44FbfZMkN/CSm32nY9b3uPli8A4lp8iu07QzEwjEaDsKEhoKqC9cTw0 ydnpppdZbRl/IcHZn0msm6x841YUH5/slYJ/qCfBUH6d2TCftUBhAUPdc8KNJ8dpLEx7 lh1mwduoEQuublsP4e3PO7mQ31DBuu9UFX246D4YLCjVdsI1zzpq6sb7rdQ1Mtby5TvT oqyw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1697702447; x=1698307247; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=Jnz5KqmHZersx80WuX+WPSIdXUZAnRdwRfo2wcqpYWI=; b=ZHwUZHXJbfCdEvem+aSYTa33W3ezqWK2mZy5TyaxsOKkV3vQRaOB299WgujEWK0bCa SW8wWU77OybhBLCe3rZk67JLiRXWpTOHKt+8HJA8pDkbaCaDXS2WpMbHSTxcbuqXu860 Gw3fL1UDCzOw+Kx+yKbSywzaz5MiNRP3Bxf28XuhoVyvyiDTjHGWMWyoNmDZ5DP8j8M+ d8QcH4DSL9wDSoxMsGYxww+Ab+yRkwqzHIFr0UePfQ0lEgvO+MB7Ba3SJP3zbvuWjWjv drC6Zc1FBGwJd/We1V8yK9fcrRnY1pBakWlf12Fo+vwRF/hQOW+eLLFUktGG15nkHJA4 /GSg== X-Gm-Message-State: AOJu0YycJ2+Apq1x2E29DgEzdQ1KrYYm2AMh9Jpob6YbW4x4TWu71RoL sEg6L/57AHGlJvH5DwEGRxVHNMyktgjp3vwCNY+ElQ== X-Google-Smtp-Source: AGHT+IGvvBAOXddF5owRwRHOfUfE25ctm4Piy/qlWCUDwS2bRynHrk5Ji3mZ1+oA2JFNfhdLg+9pNtGTmYzliW9xAww= X-Received: by 2002:a17:907:786:b0:9be:834a:f80b with SMTP id xd6-20020a170907078600b009be834af80bmr1206934ejb.75.1697702447293; Thu, 19 Oct 2023 01:00:47 -0700 (PDT) MIME-Version: 1.0 References: <20231016143828.647848-1-jeffxu@chromium.org> <55960.1697566804@cvs.openbsd.org> In-Reply-To: From: =?UTF-8?Q?Stephen_R=C3=B6ttger?= Date: Thu, 19 Oct 2023 10:00:33 +0200 Message-ID: Subject: Re: [RFC PATCH v1 0/8] Introduce mseal() syscall To: Linus Torvalds Cc: Theo de Raadt , Jeff Xu , jeffxu@chromium.org, akpm@linux-foundation.org, keescook@chromium.org, jorgelo@chromium.org, groeck@chromium.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-mm@kvack.org, jannh@google.com, surenb@google.com, alex.sierra@amd.com, apopple@nvidia.com, aneesh.kumar@linux.ibm.com, axelrasmussen@google.com, ben@decadent.org.uk, catalin.marinas@arm.com, david@redhat.com, dwmw@amazon.co.uk, ying.huang@intel.com, hughd@google.com, joey.gouly@arm.com, corbet@lwn.net, wangkefeng.wang@huawei.com, Liam.Howlett@oracle.com, lstoakes@gmail.com, willy@infradead.org, mawupeng1@huawei.com, linmiaohe@huawei.com, namit@vmware.com, peterx@redhat.com, peterz@infradead.org, ryan.roberts@arm.com, shr@devkernel.io, vbabka@suse.cz, xiujianfeng@huawei.com, yu.ma@intel.com, zhangpeng362@huawei.com, dave.hansen@intel.com, luto@kernel.org, linux-hardening@vger.kernel.org Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha-256; boundary="00000000000056cec906080d2753" X-Rspamd-Queue-Id: 2DF984001D X-Rspam-User: X-Rspamd-Server: rspam04 X-Stat-Signature: q9xzk93eqqr9z3cwr63m6w47fp3b8cpm X-HE-Tag: 1697702448-313583 X-HE-Meta: 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 VS2RZIeX UFAjf+2N0BHhrBH9esRoLgXcVU9oOHcdQaQWRVq61krLf3Gk7ztuRvpHrxqwXLN6L2W5xKsGI3OIOyTm3m7DZ4FuaM6/nykzrMlG5v0F7VwJm06hQJKIMUPFW2zD3A8sNydRq/n7KA3x9gzU1WgYLAtPIK622xqBEOLiV0U1r0noSd+CVDvHjPJrOyyP2ZJmzqowjbNlcCKb6jIiHgE6qHdXOLrorTFdo5z2nOKYgTquu8YXqyxe3K5LlfD0HXTeg8WCd4qaqrKyI8ddiFjOBkYBww9JmnrfZhhUDc7F2Wnq7RtuoSwoP2EXQopBRJmLnssDXRtRwb6KwDH0B9TPLtDvebxxTP7U1jSs3hrH1LhZnQtGgHXT8Bwah9EqyJhCTnPgotG3WQuT5hdw5ucJxJQDtCAJor2yMOpUe X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: --00000000000056cec906080d2753 Content-Type: text/plain; charset="UTF-8" > I do like us starting with just "mimmutable()", since it already > exists. Particularly if chrome already knows how to use it. > > Maybe add a flag field (require it to be zero initially) just to allow > any future expansion. Maybe the chrome team has *wanted* to have some > finer granularity thing and currently doesn't use mimmutable() in some > case? Yes, we do have a use case in Chrome to split the sealing into unmap and mprotect which will allow us to seal additional pages that we can't seal with pure mimmutable(). For example, we have pkey-tagged RWX memory that we want to seal. Since the memory is already RWX and the pkey controls write access, we don't care about permission changes but sometimes we do need to mprotect data only pages. But the munmap sealing will provide protection against implicit changes of the pkey in this case which would happen if a page gets unmapped and another mapped in its place. --00000000000056cec906080d2753 Content-Type: application/pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" Content-Description: S/MIME Cryptographic Signature MIIPoQYJKoZIhvcNAQcCoIIPkjCCD44CAQExDzANBglghkgBZQMEAgEFADALBgkqhkiG9w0BBwGg ggz7MIIEtjCCA56gAwIBAgIQeAMYYHb81ngUVR0WyMTzqzANBgkqhkiG9w0BAQsFADBMMSAwHgYD VQQLExdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSMzETMBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UE AxMKR2xvYmFsU2lnbjAeFw0yMDA3MjgwMDAwMDBaFw0yOTAzMTgwMDAwMDBaMFQxCzAJBgNVBAYT AkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMSowKAYDVQQDEyFHbG9iYWxTaWduIEF0bGFz IFIzIFNNSU1FIENBIDIwMjAwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCvLe9xPU9W dpiHLAvX7kFnaFZPuJLey7LYaMO8P/xSngB9IN73mVc7YiLov12Fekdtn5kL8PjmDBEvTYmWsuQS 6VBo3vdlqqXZ0M9eMkjcKqijrmDRleudEoPDzTumwQ18VB/3I+vbN039HIaRQ5x+NHGiPHVfk6Rx c6KAbYceyeqqfuJEcq23vhTdium/Bf5hHqYUhuJwnBQ+dAUcFndUKMJrth6lHeoifkbw2bv81zxJ I9cvIy516+oUekqiSFGfzAqByv41OrgLV4fLGCDH3yRh1tj7EtV3l2TngqtrDLUs5R+sWIItPa/4 AJXB1Q3nGNl2tNjVpcSn0uJ7aFPbAgMBAAGjggGKMIIBhjAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0l BBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMEMBIGA1UdEwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFHzM CmjXouseLHIb0c1dlW+N+/JjMB8GA1UdIwQYMBaAFI/wS3+oLkUkrk1Q+mOai97i3Ru8MHsGCCsG AQUFBwEBBG8wbTAuBggrBgEFBQcwAYYiaHR0cDovL29jc3AyLmdsb2JhbHNpZ24uY29tL3Jvb3Ry MzA7BggrBgEFBQcwAoYvaHR0cDovL3NlY3VyZS5nbG9iYWxzaWduLmNvbS9jYWNlcnQvcm9vdC1y My5jcnQwNgYDVR0fBC8wLTAroCmgJ4YlaHR0cDovL2NybC5nbG9iYWxzaWduLmNvbS9yb290LXIz LmNybDBMBgNVHSAERTBDMEEGCSsGAQQBoDIBKDA0MDIGCCsGAQUFBwIBFiZodHRwczovL3d3dy5n bG9iYWxzaWduLmNvbS9yZXBvc2l0b3J5LzANBgkqhkiG9w0BAQsFAAOCAQEANyYcO+9JZYyqQt41 TMwvFWAw3vLoLOQIfIn48/yea/ekOcParTb0mbhsvVSZ6sGn+txYAZb33wIb1f4wK4xQ7+RUYBfI TuTPL7olF9hDpojC2F6Eu8nuEf1XD9qNI8zFd4kfjg4rb+AME0L81WaCL/WhP2kDCnRU4jm6TryB CHhZqtxkIvXGPGHjwJJazJBnX5NayIce4fGuUEJ7HkuCthVZ3Rws0UyHSAXesT/0tXATND4mNr1X El6adiSQy619ybVERnRi5aDe1PTwE+qNiotEEaeujz1a/+yYaaTY+k+qJcVxi7tbyQ0hi0UB3myM A/z2HmGEwO8hx7hDjKmKbDCCA18wggJHoAMCAQICCwQAAAAAASFYUwiiMA0GCSqGSIb3DQEBCwUA MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIzMRMwEQYDVQQKEwpHbG9iYWxTaWdu MRMwEQYDVQQDEwpHbG9iYWxTaWduMB4XDTA5MDMxODEwMDAwMFoXDTI5MDMxODEwMDAwMFowTDEg MB4GA1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjMxEzARBgNVBAoTCkdsb2JhbFNpZ24xEzAR BgNVBAMTCkdsb2JhbFNpZ24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDMJXaQeQZ4 Ihb1wIO2hMoonv0FdhHFrYhy/EYCQ8eyip0EXyTLLkvhYIJG4VKrDIFHcGzdZNHr9SyjD4I9DCuu l9e2FIYQebs7E4B3jAjhSdJqYi8fXvqWaN+JJ5U4nwbXPsnLJlkNc96wyOkmDoMVxu9bi9IEYMpJ pij2aTv2y8gokeWdimFXN6x0FNx04Druci8unPvQu7/1PQDhBjPogiuuU6Y6FnOM3UEOIDrAtKeh 6bJPkC4yYOlXy7kEkmho5TgmYHWyn3f/kRTvriBJ/K1AFUjRAjFhGV64l++td7dkmnq/X8ET75ti +w1s4FRpFqkD2m7pg5NxdsZphYIXAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8E BTADAQH/MB0GA1UdDgQWBBSP8Et/qC5FJK5NUPpjmove4t0bvDANBgkqhkiG9w0BAQsFAAOCAQEA S0DbwFCq/sgM7/eWVEVJu5YACUGssxOGhigHM8pr5nS5ugAtrqQK0/Xx8Q+Kv3NnSoPHRHt44K9u bG8DKY4zOUXDjuS5V2yq/BKW7FPGLeQkbLmUY/vcU2hnVj6DuM81IcPJaP7O2sJTqsyQiunwXUaM ld16WCgaLx3ezQA3QY/tRG3XUyiXfvNnBB4V14qWtNPeTCekTBtzc3b0F5nCH3oO4y0IrQocLP88 q1UOD5F+NuvDV0m+4S4tfGCLw0FREyOdzvcya5QBqJnnLDMfOjsl0oZAzjsshnjJYS8Uuu7bVW/f hO4FCU29KNhyztNiUGUe65KXgzHZs7XKR1g/XzCCBNowggPCoAMCAQICEAFp/vXw/R/y8Lw9a544 0YEwDQYJKoZIhvcNAQELBQAwVDELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYt c2ExKjAoBgNVBAMTIUdsb2JhbFNpZ24gQXRsYXMgUjMgU01JTUUgQ0EgMjAyMDAeFw0yMzA4MDMx NDAzNDFaFw0yNDAxMzAxNDAzNDFaMCUxIzAhBgkqhkiG9w0BCQEWFHNyb2V0dGdlckBnb29nbGUu Y29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzZBSWG7xnoaWcP4VRUAeztPXUgNd 4NVClkgOotwFn0FApauaJXUitczPQ2w4m1sPPA48zEhzTwXMSwtz6Wv7R1H9Dg1QywapO8P96WlF pG7WYEC++EJCxTk76P0djj2QNygfgvl150GkwmND15qMN8XgBgs0YMLse26UtQDC9Oz+QkMYWVal GZfXs2f/WRb1WNkLIB9JfeGE35OXFsuhrwiyfxaF3IYQNJP3OxSuYccnJUTwEKB4OqHuxdwNfvHG BsgT+rklyUPEcOT/jS9EGatv79VPLXtr21rzz4/no0sJf074YB0jjCVqlpKfQW2rYncOAI7tO/Vc ReJB/+2+iwIDAQABo4IB1TCCAdEwHwYDVR0RBBgwFoEUc3JvZXR0Z2VyQGdvb2dsZS5jb20wDgYD VR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMEBggrBgEFBQcDAjAdBgNVHQ4EFgQUwQlr miiwZhqbFo3H+sN+36dVsCIwTAYDVR0gBEUwQzBBBgkrBgEEAaAyASgwNDAyBggrBgEFBQcCARYm aHR0cHM6Ly93d3cuZ2xvYmFsc2lnbi5jb20vcmVwb3NpdG9yeS8wDAYDVR0TAQH/BAIwADCBmgYI KwYBBQUHAQEEgY0wgYowPgYIKwYBBQUHMAGGMmh0dHA6Ly9vY3NwLmdsb2JhbHNpZ24uY29tL2Nh L2dzYXRsYXNyM3NtaW1lY2EyMDIwMEgGCCsGAQUFBzAChjxodHRwOi8vc2VjdXJlLmdsb2JhbHNp Z24uY29tL2NhY2VydC9nc2F0bGFzcjNzbWltZWNhMjAyMC5jcnQwHwYDVR0jBBgwFoAUfMwKaNei 6x4schvRzV2Vb4378mMwRgYDVR0fBD8wPTA7oDmgN4Y1aHR0cDovL2NybC5nbG9iYWxzaWduLmNv bS9jYS9nc2F0bGFzcjNzbWltZWNhMjAyMC5jcmwwDQYJKoZIhvcNAQELBQADggEBABDOrwE7xhhZ KPffKFRtuggfC0sfh0EHmrCzCXlyiQFmTpjm73me7rw+ibiPUnohQxkeqC9KvwDd/gF7OAY3un01 f8y5iEmwoymOLIzkTKIMHDp6qOul60jFrAWe8EQMuBMEc9TQbOiXB4jFgLuDZX7AspyVvnmLA5sw msq0yrGgxTsEeZniQpdOP/qZNS2TJmvNH8a8HuQfHH/pd20lRWfTEuhSRN8cTkKihK7iO8wjCmrp EXefUessFdMqMUSfGI6rUaZTfU0SRfdrVHW4IE8onI30/UVurbGlFiugNF3LbDMXdqzs2/eTsLiD 8Dv1+pt7SJqI4zNhzZFOpvBPVIkxggJqMIICZgIBATBoMFQxCzAJBgNVBAYTAkJFMRkwFwYDVQQK ExBHbG9iYWxTaWduIG52LXNhMSowKAYDVQQDEyFHbG9iYWxTaWduIEF0bGFzIFIzIFNNSU1FIENB IDIwMjACEAFp/vXw/R/y8Lw9a5440YEwDQYJYIZIAWUDBAIBBQCggdQwLwYJKoZIhvcNAQkEMSIE IPi898HIh9BIwdhETZ7/O7Dh3D+SsJLi3hgcuaXknxYwMBgGCSqGSIb3DQEJAzELBgkqhkiG9w0B BwEwHAYJKoZIhvcNAQkFMQ8XDTIzMTAxOTA4MDA0N1owaQYJKoZIhvcNAQkPMVwwWjALBglghkgB ZQMEASowCwYJYIZIAWUDBAEWMAsGCWCGSAFlAwQBAjAKBggqhkiG9w0DBzALBgkqhkiG9w0BAQow CwYJKoZIhvcNAQEHMAsGCWCGSAFlAwQCATANBgkqhkiG9w0BAQEFAASCAQAZGA2Cd/UjtzNhs4zX p3eag/xW+BTUBF/ITizZRukko4vAy6z8c/uelsd47857pBOkhqW2SCgQ6A7YJOdqXi/IxYv1y+MH 74cRBtTnZ3i2Qj/2oL0gXtuwLGWP2b8PwKnSigUOj6c06i8viH2pYF5QQkt9kJCYg7/BADl0VrCO KA0sChavPZ7DT2V7JwCH/i0okvfPuL3rGakweTdvuKK6VYUZJu+8MGoOp+Ybhtw574270ii8oC2a Dm/k/wQ+F0d38Tpfb9yxZoxzfOINM7H3ctc3gIXfjlSD90uAwcoriw5717lbvmHHQmfFH6Ny6kES y1ckI+KJBbzuPvnS6r8K --00000000000056cec906080d2753--