From patchwork Tue Oct 8 04:18:04 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jeff Xu X-Patchwork-Id: 13825621 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id D392DCED263 for ; Tue, 8 Oct 2024 04:18:12 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 4D2176B007B; Tue, 8 Oct 2024 00:18:12 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 482846B0083; Tue, 8 Oct 2024 00:18:12 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 349A26B0085; Tue, 8 Oct 2024 00:18:12 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id 1695F6B007B for ; Tue, 8 Oct 2024 00:18:12 -0400 (EDT) Received: from smtpin10.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay07.hostedemail.com (Postfix) with ESMTP id 694B01602FF for ; Tue, 8 Oct 2024 04:18:11 +0000 (UTC) X-FDA: 82649127582.10.4253A0A Received: from mail-pj1-f44.google.com (mail-pj1-f44.google.com [209.85.216.44]) by imf12.hostedemail.com (Postfix) with ESMTP id E55B940002 for ; Tue, 8 Oct 2024 04:18:09 +0000 (UTC) Authentication-Results: imf12.hostedemail.com; dkim=pass header.d=chromium.org header.s=google header.b=a1l6+aYS; spf=pass (imf12.hostedemail.com: domain of jeffxu@chromium.org designates 209.85.216.44 as permitted sender) smtp.mailfrom=jeffxu@chromium.org; dmarc=pass (policy=none) header.from=chromium.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1728360956; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=0vVQPrureiyHbwYAfJliFzmOeqMNDULWaSzE3MpLwxE=; b=AA51ytg14BT4rCQxvGh0UyAmbPEV+sLyE++9B0jGyXTBouq9lPG/TDH0gbbQLOkShuCF/t x4ypYrqpEqVEZSR6yMms18qWTSILiBwK/DI2/pI+65B6+WXcT8ywFjUieOxpcW4tQl3yO+ SlgISQ5GU/Jh9IA9MICLrrUW0xgioqE= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1728360956; a=rsa-sha256; cv=none; b=O6hs+jbPkQlv8+wd4ANG4/aQeP4HM95t68YeX9PsYZssUGJ2Q4wwKwp0c2eBWENazQ8EcM b5e+rcQ6dwMsoHBo7aK3aV8SSGzkIvyPtIQdCB3kCfsJRj/pbcH32acxplXXWIT/ETA85u aQqIImLal05jjFuZ2oNS5eYsgPxIllo= ARC-Authentication-Results: i=1; imf12.hostedemail.com; dkim=pass header.d=chromium.org header.s=google header.b=a1l6+aYS; spf=pass (imf12.hostedemail.com: domain of jeffxu@chromium.org designates 209.85.216.44 as permitted sender) smtp.mailfrom=jeffxu@chromium.org; dmarc=pass (policy=none) header.from=chromium.org Received: by mail-pj1-f44.google.com with SMTP id 98e67ed59e1d1-2e0752be2d1so639305a91.1 for ; Mon, 07 Oct 2024 21:18:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; t=1728361088; x=1728965888; darn=kvack.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=0vVQPrureiyHbwYAfJliFzmOeqMNDULWaSzE3MpLwxE=; b=a1l6+aYSWrGsvZFV7Q+kTZnY0Y+DirSanhNNUE7K5n+RBT6zcaEcfemT6goZE4PCjp HghVM69KbsPyh7ngrgjAMQiy2UQtVGrGIOQfWCw8AJJ/T1r5biofaJ9yHL5qTtKihZZ8 jwBL/Rpe8FsCjUUARu2Bmdv+34pbrQdDd/Yqw= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1728361088; x=1728965888; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=0vVQPrureiyHbwYAfJliFzmOeqMNDULWaSzE3MpLwxE=; b=ZBmcGlMCMjSRzBeVWRNGvcxn2/GJ6OegTIEGnjLIlXOC93xxRgY2JOxbfFvtnrt2EQ d8LNsc2HPaNr5mLzFsgwzaTwK5/PA9cp6WjE6MT9IdF8snrRqDcHeBBgQyvEBOCmcUFk pRZe76r38ZaDJlHQRkUuouv5sveRfC/LfvCvprFxn+FtSO5BivOF5t+8qA100eT9gGcO 3ISrMLBaY3D8pv2bYX1Ev5aLAu3JsayKDcB4HZtS/3H4WUEb5LWJPLUO978i2mDiBf1P ED8Yk7s03+S1qNb35eGbDJkPdQVmyoAE+7eCOPDlyZ/bCbHhf4nqukxIKpnJ+MfvWszO uR5w== X-Forwarded-Encrypted: i=1; AJvYcCVkfB7EOYx8ZWPLepluqwuEa0ww8bVTs3SwNsJ2N7fjgu8914AR2te6nMNL5ziQ8aFXAyG6riiDQg==@kvack.org X-Gm-Message-State: AOJu0YxA0/vadMy/Dn5nFag5r4cuYETAaI0TfVXByi70nuWMTPKoM0Jv 9rWKS3xH1TZDxGf8rinmPvFmukGXT0ttlqloff3dUno5CXnvByhx/hXDhRU0bg== X-Google-Smtp-Source: AGHT+IETmZkdIfaU3KgL1a0e2OY78XhZ0gDO7l0Fn6ylun8F9SxSWEg+1I1jGGXk76KQfXMjITSOzA== X-Received: by 2002:a17:903:2345:b0:20b:99cd:c27e with SMTP id d9443c01a7336-20bfe02ba29mr86787295ad.3.1728361088521; Mon, 07 Oct 2024 21:18:08 -0700 (PDT) Received: from localhost (56.4.82.34.bc.googleusercontent.com. [34.82.4.56]) by smtp.gmail.com with UTF8SMTPSA id 98e67ed59e1d1-2e1e85da3f0sm8049197a91.30.2024.10.07.21.18.08 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 07 Oct 2024 21:18:08 -0700 (PDT) From: jeffxu@chromium.org To: akpm@linux-foundation.org, keescook@chromium.org, corbet@lwn.net Cc: jorgelo@chromium.org, groeck@chromium.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-mm@kvack.org, jannh@google.com, sroettger@google.com, pedro.falcato@gmail.com, linux-hardening@vger.kernel.org, willy@infradead.org, gregkh@linuxfoundation.org, torvalds@linux-foundation.org, deraadt@openbsd.org, usama.anjum@collabora.com, surenb@google.com, merimus@google.com, rdunlap@infradead.org, lorenzo.stoakes@oracle.com, Liam.Howlett@oracle.com, enh@google.com, Jeff Xu Subject: [PATCH] mseal.rst additional fix Date: Tue, 8 Oct 2024 04:18:04 +0000 Message-ID: <20241008041804.1481453-1-jeffxu@chromium.org> X-Mailer: git-send-email 2.47.0.rc0.187.ge670bccf7e-goog In-Reply-To: <20241008040942.1478931-2-jeffxu@chromium.org> References: <20241008040942.1478931-2-jeffxu@chromium.org> MIME-Version: 1.0 X-Rspamd-Queue-Id: E55B940002 X-Stat-Signature: ph9rneawqg991yxfki7sd713s9guwykf X-Rspamd-Server: rspam09 X-Rspam-User: X-HE-Tag: 1728361089-77473 X-HE-Meta: U2FsdGVkX19f6qnqqZvjAEuLP1izuMEYp/ZTf+uiUUIa88tuiJALQqw8F3TMQV64OSCsxU2uIxdAv782D62VZOxq8EGRmTWZMGzd0OKHfgNk3tBesGea/yAZXrD5MZ49DgxjTIIQLR+U5Xh8Eo9mFUtNEiJl7NYhSX+xcI/3izZv4BpuCwva7CBIGI31iPvXVtBhdbqWzS+gXPy1q2cvCpwmitKMdgXQ+b2f/HJ5BlL4sm/fH1TavuVYKYRn7A5ndE5M6Pnrg37+jf7Rhvx5F/fA0zVYBYTP6MR4174KuT7v3qw5QjnttmYWPh1+aBxrA4ZLcZv4Tq3o3r+QEmHtDV9qASapglB9KujGZeW288toqp3Oj9W7mkfxGX4d49HGe6P9yDA5M/r6RiL/xkmz5MaBzYb9QAXDoZH6FNe5ztofE376ptnkJAMd8yyISEdsCk/e5M1kLKMTIfYyz9x965tS1K+Hl07Tw5vSBuD12qMl3vZW+6tF7OpFkC178Ao6AyaU5b8rr5GLFB5wnzzr2LefiyYh0TAY0TuJAsVESBQ3P4AHu03FxAfD+qeQxw44h0ruWQJrawaVbNAffhSC2gx51vgzBp2+3/tTnaAUql04dxy7XxNaOeSXFiJ8omoFfPLZwhqVm+HeRvB3ZCE8EufhPJp4oYt0yYprbtQIsQmwKqYhB84ZqLJ6SOUDS+abN0XHWT25KTqM3HJU+g1ANy/5z1kF7UnGuuW45PkIUzdukf/WokQLYTkVxNzRvKVKUxNcuItzKwooed9kCOYBDPuqgwsHfQ/Z+kNFrjo5QJInuTPs0wGmx7shzCqsqceXeq7ELJM7j2nlcEFL70kVbvciRC/Ub/mIuv+se9DHwV0GmzHCClwREfv+J5iiUZIoEa+1I07cfbEKS972mkFTNWDux00QoEToh7w8lJKda5WLLTCkP3w0cyZr+Jxpt0X4cT8GQMy/KzLbap1QGeU omm3p75e juHkzp8a+aXSmeF39OLZ/Gfwr+7UibZSsTbwTSVzqmX9h7uDfKbJGpxsstHvKFmU1z+lH4xt7+rcl35W969juuSwW+LR3OUEoEsg0naNapaF7nupiVk7Rr6nFNLjUeEOIScLQgWIHoqTu/4AhZ4OKYTzLTR/bREBXtT/cA8zlRM3PdRyQPwHN+NyaqZ4pT2Ah+toRU2coQslbVyQ+WcUBvyL3ub32yNOR6zgUuoLoTggYKGHsU4OWN0ByPAYoR5iXZ5pkDf28JyTPKNZG3483tpzzUY0oaNLaWAZUuMaFsCT0rj/p9DIrc0x9LtDksPAxPMC32a2ns+SU/5tSAc3siCfzqO4kGUUh5b9N X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: From: Jeff Xu Change "overwrite" to overwrites" Signed-off-by: Jeff Xu --- Documentation/userspace-api/mseal.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Documentation/userspace-api/mseal.rst b/Documentation/userspace-api/mseal.rst index 41102f74c5e2..54bbcce330ec 100644 --- a/Documentation/userspace-api/mseal.rst +++ b/Documentation/userspace-api/mseal.rst @@ -97,7 +97,7 @@ Blocked mm syscall for sealed mapping The first set of syscalls to block is munmap, mremap, mmap. They can either leave an empty space in the address space, therefore allowing replacement with a new mapping with new set of attributes, or can - overwrite the existing mapping with another mapping. + overwrites the existing mapping with another mapping. mprotect and pkey_mprotect are blocked because they changes the protection bits (RWX) of the mapping.