Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-13 Thread Jeff Xu
On Mon, Jan 6, 2025 at 5:12 PM Kees Cook wrote: > > On Fri, Jan 03, 2025 at 09:38:10PM +, Lorenzo Stoakes wrote: > > On Tue, Dec 17, 2024 at 02:18:53PM -0800, Kees Cook wrote: > > > On Mon, Nov 25, 2024 at 08:20:21PM +, jef...@chromium.org wrote: > > > > Seal vdso, vvar, sigpage, uprobes a

Re: [PATCH v2 linux-next 0/2] lib/string_choices: Sorting function order

2025-01-13 Thread Andy Shevchenko
On Tue, Nov 19, 2024 at 07:47:17AM +0530, R Sundar wrote: > This patch series rearrange misplaced functions in sorted order and add > str_locked_unlocked() helper. Kees, anything preventing us to apply the first patch from the series? -- With Best Regards, Andy Shevchenko

Re: [RFC PATCH v2 00/15] pkeys-based page table hardening

2025-01-13 Thread Kevin Brodsky
On 09/01/2025 17:30, Dave Hansen wrote: > One of the sticker things in the x86 attempt to do the same thing was > context switching, both between normal tasks and in/out of exceptions > and interrupts. > > The easiest place this manifested for us was code chunk like this: > > kpkeys_set_level

Re: [PATCH v4 1/1] exec: seal system mappings

2025-01-13 Thread Matthew Wilcox
On Mon, Jan 13, 2025 at 01:26:59PM -0800, Jeff Xu wrote: > This patch is intended for ChromeOS and Android and is > feature-complete from their perspective. "I have everything I need from the Google point of view, so I will push this feature into upstream". No, thanks.

[DISCUSSION] vsprintf: the current state of restricted pointers (%pK)

2025-01-13 Thread Thomas Weißschuh
Hi everybody, as you know, leaking raw kernel pointers to the user is problematic as they can be used to break KASLR. Therefore back in 2011 the %pK format specifier was added [0], printing certain pointers zeroed out or raw depending on the usage context. Then in 2017 even the default %p format w