On Tue, Jan 9, 2024 at 11:47 AM Kees Cook wrote:
>
> On Tue, Jan 09, 2024 at 03:45:38PM +, jef...@chromium.org wrote:
> > This patchset proposes a new mseal() syscall for the Linux kernel.
>
> Thanks for continuing to work on this! Given Linus's general approval
> on the v4, I think this
On Tue, Jan 09, 2024 at 03:45:38PM +, jef...@chromium.org wrote:
> This patchset proposes a new mseal() syscall for the Linux kernel.
Thanks for continuing to work on this! Given Linus's general approval
on the v4, I think this series can also drop the "RFC" part -- this code
is looking to
From: Jeff Xu
This patchset proposes a new mseal() syscall for the Linux kernel.
In a nutshell, mseal() protects the VMAs of a given virtual memory
range against modifications, such as changes to their permission bits.
Modern CPUs support memory permissions, such as the read/write (RW)
and