Linux has a new(ish) syscall you should know about.
mseal ("memory sealing") locks memory regions against modification. Many shellcode techniques are blocked since executable permissions can’t be added to sealed memory.
Here’s how it works:
mseal adds a VM_SEALED flag to memory regions, stopping attackers from using syscalls like mprotect and munmap to alter permissions or remap memory.
This hardens against common exploits by ensuring protected memory stays intact during runtime.
The syscall proved...controversial.
(read the linux mailing list on the subject, it's a doozy)
Linus criticized mseal's implementation as “nonsensical” for its inconsistent application of sealing rules across memory operations. Thankfully, they eventually came to a consensus.
mseal is now available in kernel 6.10+
To use it, apps need to seal sensitive memory regions via direct syscall invocation.
It's not an automatic process, but it's an interesting new tool that I hope to see more of, especially in highly targeted applications like web browsers
• • •
Missing some Tweet in this thread? You can try to
force a refresh
NTIRE is the coolest conference you’ve never heard of.
Deleting motion blur? Sure.
Night Vision? No problem.
Every year, labs compete on categories like hyperspectral restoration, satellite image enhancement, even raindrop removal (think car sensors)! Some highlights ->
Low-light enhancement is always popular.
Retinexformer, shown here got 2nd place in the 2024 contest.
A *TINY* transformer-based model, it runs in about 0.5 seconds for a 6K image on a single 3090. Only 1.6M parameters (<2MB weights at INT8)!
Maybe motion blur removal is more your thing.
UAVs are often used to examine wind turbine blades for early failure warning. Movement of drone + rotational velocity pose a challenge.
Here’s the 2021 winner DeblurGANv2, taking ~0.19s of processing per image.