Received: by 10.213.65.68 with SMTP id h4csp1929822imn; Thu, 29 Mar 2018 13:52:05 -0700 (PDT) X-Google-Smtp-Source: AIpwx49sMs9VLtEhyj9YKLtBJgGuRrrq5jqLZg1qxqru5Da408XPR3y7fb2SUXeWsZfDmfMkGoUD X-Received: by 10.98.29.145 with SMTP id d139mr7489767pfd.165.1522356725028; Thu, 29 Mar 2018 13:52:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522356725; cv=none; d=google.com; s=arc-20160816; b=RmzzMremHrLr752ITlYd00rSnBs4wTFVtpkMNHJgSM92XwxYGy45687JB6aGWPk8uJ eWpcp0mkhxH1btgRo++Ml0VvCVW9zYmNmIfkn2HyHVUJXqjZ52dISDF6cYD7Ctb66GkA knehM4mPoW1stFN/XQ1AEggE9xBOWKpwCYr/toJaLwWy36OK6iyHLZsVDH49MUrFGGdD P8m/QMOOqOPqHPv/k7GCtsEWOQylyy1jYprpBxRAIev0I+u/NvlXtEDv8dIPWTOXtVZh l32LBYmbxlF99gWrakzoJ4RbmeRAIxrhuch+FIx6+SHbGfFqGlueLKbrH4Adc14DLZQ6 9m2Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date:arc-authentication-results; bh=IgcTJgPTJUzeX7rvNrg7AYyLuyC8PqR2xFSgvhRRDRQ=; b=rhAjJxo/aypCB3BcSHXMxh7z+nlZrHVYaLM33boT6C/kaJjhJrrr+unTpswf4a6THS AkdX8H0UTn6y9LzrUHgD9fnBcGsrzM0WJ8Do4X22brLknRP+5E7QhKzaO+xixO5QnEoj EGI5FcsJy89kbPC2/ZSVNP8yM2GA8h6uYgJvMnvQUTJou89IAJtxckRypl9HkiTX/ovm n1qDxkid5dOrS//4tIS/EXDdpOmdJSyGLtFO1njtXC7rKNnG7Tr3avtSfeguT4nxFmqa hFluclgl4XDFWSEYiWLehWAoKY+GDD6JzYAuONQjmp/2T0aqit0dh3XuBvYzx3pF9FUk az6A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x4-v6si6478750plv.81.2018.03.29.13.51.49; Thu, 29 Mar 2018 13:52:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751906AbeC2Uuk (ORCPT + 99 others); Thu, 29 Mar 2018 16:50:40 -0400 Received: from ms.lwn.net ([45.79.88.28]:53456 "EHLO ms.lwn.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751070AbeC2Uui (ORCPT ); Thu, 29 Mar 2018 16:50:38 -0400 Received: from lwn.net (localhost [127.0.0.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ms.lwn.net (Postfix) with ESMTPSA id BC789AAA; Thu, 29 Mar 2018 20:50:37 +0000 (UTC) Date: Thu, 29 Mar 2018 14:50:36 -0600 From: Jonathan Corbet To: Igor Stoppa Cc: Igor Stoppa , willy@infradead.org, keescook@chromium.org, mhocko@kernel.org, david@fromorbit.com, rppt@linux.vnet.ibm.com, labbott@redhat.com, linux-security-module@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, kernel-hardening@lists.openwall.com Subject: Re: [RFC PATCH v21 0/6] mm: security: ro protection for dynamic data Message-ID: <20180329145036.00155b1e@lwn.net> In-Reply-To: <5b2a6d5d-5e33-614b-c362-c02a99509def@gmail.com> References: <20180327153742.17328-1-igor.stoppa@huawei.com> <20180327105509.62ec0d4d@lwn.net> <5b2a6d5d-5e33-614b-c362-c02a99509def@gmail.com> Organization: LWN.net MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 30 Mar 2018 00:25:22 +0400 Igor Stoppa wrote: > On 27/03/18 20:55, Jonathan Corbet wrote: > > On Tue, 27 Mar 2018 18:37:36 +0300 > > Igor Stoppa wrote: > > > >> This patch-set introduces the possibility of protecting memory that has > >> been allocated dynamically. > > > > One thing that jumps out at me as I look at the patch set is: you do not > > include any users of this functionality. Where do you expect this > > allocator to be used? Actually seeing the API in action would be a useful > > addition, I think. > > Yes, this is very true. > Initially I had in mind to use LSM hooks as easy example, but sadly they > seem to be in an almost constant flux. > > My real use case is to secure both those and the SELinux policy DB. > I have said this few times, but it didn't seem to be worth mentioning in > the cover letter. In general, it is quite hard to merge a new API without users to go along with it. Among other things, that's how reviewers can see how well the API works in real-world use. I am certainly not the one who will make the decision on whether this goes in, but I suspect that whoever *does* make that decision would prefer to see some users. Thanks, jon