Re: [PATCH v4 1/1] exec: seal system mappings

2024-11-25 Thread Matthew Wilcox
On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > +/* > + * Kernel cmdline override for CONFIG_SEAL_SYSTEM_MAPPINGS > + */ > +enum seal_system_mappings_type { > + SEAL_SYSTEM_MAPPINGS_DISABLED, > + SEAL_SYSTEM_MAPPINGS_ENABLED > +}; > + > +static enum seal_system_mappin

[PATCH v4 0/1] Seal system mappings

2024-11-25 Thread jeffxu
From: Jeff Xu Seal vdso, vvar, sigpage, uprobes and vsyscall. Those mappings are readonly or executable only, sealing can protect them from ever changing or unmapped during the life time of the process. For complete descriptions of memory sealing, please see mseal.rst [1]. System mappings such

[PATCH v4 1/1] exec: seal system mappings

2024-11-25 Thread jeffxu
From: Jeff Xu Seal vdso, vvar, sigpage, uprobes and vsyscall. Those mappings are readonly or executable only, sealing can protect them from ever changing or unmapped during the life time of the process. For complete descriptions of memory sealing, please see mseal.rst [1]. System mappings such

Re: [PATCH] net: mac80211: cfg: Initialize cnt before accessing elem

2024-11-25 Thread Gustavo A. R. Silva
On 23/11/24 11:08, Haoyu Li wrote: With the new __counted_by annocation in cfg80211_rnr_elems, the "cnt" struct member must be set before accessing the "elem" array. Failing to do so will trigger a runtime warning when enabling CONFIG_UBSAN_BOUNDS and CONFIG_FORTIFY_SOURCE. Nice catch. :)

Re: korg-clang-19-lkftconfig-hardening: TI x15 board - PC is at edma_probe (drivers/dma/ti/edma.c

2024-11-25 Thread Nathan Chancellor
Hi Naresh, + Kees and linux-hardening, since this is a hardening configuration. On Mon, Nov 25, 2024 at 07:34:22PM +0530, Naresh Kamboju wrote: > The arm TI x15 board boot has failed with the Linux next, mainline > and the Linux stable. Please find boot log and build links. > > The boot failed w

Re: [RFC 0/1] swiotlb: Mitigate potential DoS caused by BUG_ON()

2024-11-25 Thread Robin Murphy
On 2024-11-22 8:33 pm, Brian Johannesmeyer wrote: On Fri, Nov 22, 2024 at 12:13 PM Brian Johannesmeyer wrote: We identified a security issue in the swiotlb unmapping operation, stemming from the way some drivers save streaming DMA addresses. This issue can potentially be exploited by a malicio

Re: [PATCH] ovl: Check for NULL OVL_E() results

2024-11-25 Thread kernel test robot
available at: https://download.01.org/0day-ci/archive/20241125/202411251652.ecbb3c7e-...@intel.com kern :warn : [ 407.439702] [ cut here ] user :notice: [ 407.448057] fanotify06.c:134: TPASS: group 0 got event: mask 2 pid=5267 fd=13 kern :warn : [ 407.448607] WARNI