https://bugs.kde.org/show_bug.cgi?id=505228
Mark Wielaard <m...@klomp.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|ASSIGNED |RESOLVED Resolution|--- |FIXED --- Comment #5 from Mark Wielaard <m...@klomp.org> --- Looks good. Thanks. Pushed as: commit 9775bc496e4b6f80dec993e5d147356ebbe29fe3 Author: Martin Cermak <mcer...@redhat.com> Date: Tue Jun 17 13:51:48 2025 +0200 Wrap linux specific mseal syscall mseal takes address, size and flags. Flags are reserved for future use. Modern CPUs support memory permissions such as RW and NX bits. The mseal syscall takes address and size parameters to additionally protect memory mapping against modifications. FTR: https://docs.kernel.org/userspace-api/mseal.html Declare a sys_mseal wrapper in priv_syswrap-linux.h and hook it for {amd64,arm,arm64,mips64,nanomips,ppc32,ppc64,riscv64,s390x,x86}-linux using LINX_ with PRE handler in syswrap-linux.c https://bugs.kde.org/show_bug.cgi?id=505228 -- You are receiving this mail because: You are watching all bug changes.