lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 27 Apr 2018 10:45:27 -0700
From:   Dave Hansen <>
Cc:, Dave Hansen <>,,,,,,,,
Subject: [PATCH 0/9] [v3] x86, pkeys: two protection keys bug fixes

Hi x86 maintainers,

This set is basically unchanged from the last post.  There was
some previous discussion about other ways to fix this with the ppc
folks (Ram Pai), but we've concluded that this x86-specific fix is
fine.  I think Ram had a different fix for ppc.

Changes from v2:
 * Clarified commit message in patch 1/9 taking some feedback from

Changes from v1:
 * Added Fixes: and cc'd stable.  No code changes.


This fixes two bugs, and adds selftests to make sure they stay fixed:

1. pkey 0 was not usable via mprotect_pkey() because it had never
   been explicitly allocated.
2. mprotect(PROT_EXEC) memory could sometimes be left with the
   implicit exec-only protection key assigned.

I already posted #1 previously.  I'm including them both here because
I don't think it's been picked up in case folks want to pull these
all in a single bundle.

Cc: Ram Pai <>
Cc: Thomas Gleixner <>
Cc: Dave Hansen <>
Cc: Michael Ellermen <>
Cc: Ingo Molnar <>
Cc: Andrew Morton <>p
Cc: Shuah Khan <>
Cc: Shakeel Butt <>

Powered by blists - more mailing lists