https://bugs.kde.org/show_bug.cgi?id=505228

Mark Wielaard <m...@klomp.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|ASSIGNED                    |RESOLVED
         Resolution|---                         |FIXED

--- Comment #5 from Mark Wielaard <m...@klomp.org> ---
Looks good. Thanks. Pushed as:

commit 9775bc496e4b6f80dec993e5d147356ebbe29fe3
Author: Martin Cermak <mcer...@redhat.com>
Date:   Tue Jun 17 13:51:48 2025 +0200

    Wrap linux specific mseal syscall

    mseal takes address, size and flags.  Flags are reserved for
    future use. Modern CPUs support memory permissions such as RW and
    NX bits.  The mseal syscall takes address and size parameters to
    additionally protect memory mapping against modifications.

    FTR: https://docs.kernel.org/userspace-api/mseal.html

    Declare a sys_mseal wrapper in priv_syswrap-linux.h and hook it
    for {amd64,arm,arm64,mips64,nanomips,ppc32,ppc64,riscv64,s390x,x86}-linux
    using LINX_ with PRE handler in syswrap-linux.c

    https://bugs.kde.org/show_bug.cgi?id=505228

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to