Email or username:

Password:

Forgot your password?
4 posts total
Thorsten Leemhuis (acct. 1/4)

The mseal() syscall was merged for #Linux 6.10: git.kernel.org/torvalds/c/0b32

It's a way to prevent changes to portions of the virtual address space – and quite similar to #OpenBSD's mimmutable() syscall.

For details see the docs (git.kernel.org/pub/scm/linux/k) or two @LWN articles (lwn.net/Articles/948129/ and lwn.net/Articles/958438/)

#LinuxKernel #kernel

The mseal() syscall was merged for #Linux 6.10: git.kernel.org/torvalds/c/0b32

It's a way to prevent changes to portions of the virtual address space – and quite similar to #OpenBSD's mimmutable() syscall.

For details see the docs (git.kernel.org/pub/scm/linux/k) or two @LWN articles (lwn.net/Articles/948129/ and lwn.net/Articles/958438/)

Thorsten Leemhuis (acct. 1/4)

#QEMU 9.0.0 is out:

qemu.org/2024/04/23/qemu-9-0-0

wiki.qemu.org/ChangeLog/9.0

"'block: virtio-blk now supports multiqueue where different queues of a single disk can be processed by different I/O threads

migration: support for “mapped-ram” capability allowing for more efficient VM snapshots, improved support for zero-page detection, and checkpoint-restart support for VFIO

ARM: architectural feature support for ECV, NV, and NV2

ARM: board support for […] raspi4b (Raspberry Pi 4 Model B)"'

#QEMU 9.0.0 is out:

qemu.org/2024/04/23/qemu-9-0-0

wiki.qemu.org/ChangeLog/9.0

"'block: virtio-blk now supports multiqueue where different queues of a single disk can be processed by different I/O threads

migration: support for “mapped-ram” capability allowing for more efficient VM snapshots, improved support for zero-page detection, and checkpoint-restart support for VFIO

Thorsten Leemhuis (acct. 1/4)

The #ext4 data corruption issue[1] in #Linux #kernel v6.1.64 and v6.1.65 that was fixed with #LinuxKernel 6.1.66[2] apparently hit #Debian 12.3 bookworm point release[3]. Fixes are in the works, but preparing them will take a bit[4].

[1] lore.kernel.org/stable/2023120

Bill Statler
If I'm understanding the kernel change logs, this bug also affects kernel 5.15 versions earlier than 5.15.142. And it doesn't affect verisons 6.5 or later. (I hope a knowledgable person will double-check me on this.)
Thorsten Leemhuis (acct. 1/4)

In case you wondered why Linus recently fiddled with the user mode stack expansion code in mainline[1], here is your explanation:

CVE-2023-3269. #LinuxKernel privilege escalation vulnerability – openwall.com/lists/oss-securit

"#StackRot is a #Linux #kernel vulnerability found in the memory management subsystem [of 6.1 - 6.4], it affects almost all configurations and requires minimal capabilities to trigger"

[1] git.kernel.org/torvalds/c/9471 , which was followed by several fix-up patches in the past week

In case you wondered why Linus recently fiddled with the user mode stack expansion code in mainline[1], here is your explanation:

CVE-2023-3269. #LinuxKernel privilege escalation vulnerability – openwall.com/lists/oss-securit

"#StackRot is a #Linux #kernel vulnerability found in the memory management subsystem [of 6.1 - 6.4], it affects almost all configurations and requires minimal capabilities to trigger"

Go Up