Comments

132 Comments

no kernel traces like 6.12.12 but security lockdown is still disabled

cat /sys/kernel/security/lockdown 
[none] integrity confidentiality

boot kernel with kernel args 'lockdown=integrity'

karma

works

LGTM. tested with sdl2-compat and vkQuake

same traces were logged here as well. The kernel testsuite did not fail though.

$ cat /sys/kernel/security/lockdown 
[none] integrity confidentiality
Feb 03 16:10:56 kernel: ------------[ cut here ]------------
Feb 03 16:10:56 kernel: WARNING: CPU: 0 PID: 0 at kernel/static_call_inline.c:153 __static_call_update+0x18c/0x1f0
Feb 03 16:10:56 kernel: Modules linked in:
Feb 03 16:10:56 kernel: CPU: 0 UID: 0 PID: 0 Comm: swapper Not tainted 6.12.12-200.fc41.x86_64 #1
Feb 03 16:10:56 kernel: RIP: 0010:__static_call_update+0x18c/0x1f0
Feb 03 16:10:56 kernel: Code: 80 3d 4b 77 88 02 00 0f 85 7b ff ff ff 4c 89 f6 48 c7 c7 70 28 e7 a4 c6 05 34 77 88 02 01 e8 9b 69 d8 ff 0f 0b e9 5e ff ff ff <0f> 0b 48 c7 c7 
40 62 a0 a5 e8 46 14 eb 00 48 8b 44 24 28 65 48 2b
Feb 03 16:10:56 kernel: RSP: 0000:ffffffffa5803e28 EFLAGS: 00010046 ORIG_RAX: 0000000000000000
Feb 03 16:10:56 kernel: RAX: 0000000000000000 RBX: ffffffffa4229658 RCX: 0000000059b7e3e9
Feb 03 16:10:56 kernel: RDX: 0000000000000000 RSI: ffffffffa6774a70 RDI: ffffffffa5872100
Feb 03 16:10:56 kernel: RBP: ffffffffa5aa9d30 R08: 00000000ff59b7e3 R09: 2038303a32303a39
Feb 03 16:10:56 kernel: R10: 3220435455203830 R11: 3a32303a39312031 R12: ffffffffa46d4150
Feb 03 16:10:56 kernel: R13: 0000000000000002 R14: ffffffffa37c4e40 R15: 00000000322f5000
Feb 03 16:10:56 kernel: FS:  0000000000000000(0000) GS:ffffffffa6291000(0000) knlGS:0000000000000000
Feb 03 16:10:56 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Feb 03 16:10:56 kernel: CR2: ffff88802d0ef000 CR3: 00000004953a4000 CR4: 00000000000000f0
Feb 03 16:10:56 kernel: Call Trace:
Feb 03 16:10:56 kernel:  <TASK>
Feb 03 16:10:56 kernel:  ? __static_call_update+0x18c/0x1f0
Feb 03 16:10:56 kernel:  ? __warn.cold+0x93/0xfa
Feb 03 16:10:56 kernel:  ? __static_call_update+0x18c/0x1f0
Feb 03 16:10:56 kernel:  ? report_bug+0xff/0x140
Feb 03 16:10:56 kernel:  ? __pfx_lockdown_is_locked_down+0x10/0x10
Feb 03 16:10:56 kernel:  ? early_fixup_exception+0x5d/0xb0
Feb 03 16:10:56 kernel:  ? __SCT__lsm_static_call_bpf_token_capable_9+0x8/0x8
Feb 03 16:10:56 kernel:  ? early_idt_handler_common+0x2f/0x3a
Feb 03 16:10:56 kernel:  ? __pfx_lockdown_is_locked_down+0x10/0x10
Feb 03 16:10:56 kernel:  ? __SCT__lsm_static_call_bpf_token_capable_9+0x8/0x8
Feb 03 16:10:56 kernel:  ? __static_call_update+0x18c/0x1f0
Feb 03 16:10:56 kernel:  ? __static_call_update+0x7e/0x1f0
Feb 03 16:10:56 kernel:  ? __pfx_lockdown_is_locked_down+0x10/0x10
Feb 03 16:10:56 kernel:  ? security_add_hooks+0xb8/0x120
Feb 03 16:10:56 kernel:  ? lockdown_lsm_init+0x21/0x30
Feb 03 16:10:56 kernel:  ? initialize_lsm+0x34/0x60
Feb 03 16:10:56 kernel:  ? early_security_init+0x3d/0x50
Feb 03 16:10:56 kernel:  ? start_kernel+0x66/0xa00
Feb 03 16:10:56 kernel:  ? x86_64_start_reservations+0x24/0x30
Feb 03 16:10:56 kernel:  ? x86_64_start_kernel+0xed/0xf0
Feb 03 16:10:56 kernel:  ? common_startup_64+0x13e/0x141
Feb 03 16:10:56 kernel:  </TASK>
Feb 03 16:10:56 kernel: ---[ end trace 0000000000000000 ]---
Feb 03 16:10:56 kernel: ------------[ cut here ]------------
Feb 03 16:10:56 kernel: static_key_enable_cpuslocked(): static key 'security_hook_active_locked_down_0+0x0/0x10' used before call to jump_label_init()
Feb 03 16:10:56 kernel: WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:199 static_key_enable_cpuslocked+0x8c/0x90
Feb 03 16:10:56 kernel: Modules linked in:
Feb 03 16:10:56 kernel: CPU: 0 UID: 0 PID: 0 Comm: swapper Tainted: G        W          6.12.12-200.fc41.x86_64 #1
Feb 03 16:10:56 kernel: Tainted: [W]=WARN
Feb 03 16:10:56 kernel: RIP: 0010:static_key_enable_cpuslocked+0x8c/0x90
Feb 03 16:10:56 kernel: Code: ff c7 03 01 00 00 00 48 c7 c7 e0 8d a0 a5 5b e9 2a fb e8 00 48 89 fa 48 c7 c6 e0 70 67 a4 48 c7 c7 78 2d e7 a4 e8 54 50 d6 ff <0f> 0b eb 86 90 
90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f
Feb 03 16:10:56 kernel: RSP: 0000:ffffffffa5803e70 EFLAGS: 00010086 ORIG_RAX: 0000000000000000
Feb 03 16:10:56 kernel: RAX: 0000000000000000 RBX: ffffffffa69285e0 RCX: 000000000000007e
Feb 03 16:10:56 kernel: RDX: 000000000000007e RSI: 00000000ffffe02a RDI: ffffffffa5803d20
Feb 03 16:10:56 kernel: RBP: ffffffffa4f68498 R08: 0000000020646573 R09: 0000000000000000
Feb 03 16:10:56 kernel: R10: 6a206f74206c6c61 R11: 0000000000000000 R12: ffffffffa46d4150
Feb 03 16:10:56 kernel: R13: 0000000000000002 R14: 0000000000000001 R15: 00000000322f5000
Feb 03 16:10:56 kernel: FS:  0000000000000000(0000) GS:ffffffffa6291000(0000) knlGS:0000000000000000
Feb 03 16:10:56 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Feb 03 16:10:56 kernel: CR2: ffff88802d0ef000 CR3: 00000004953a4000 CR4: 00000000000000f0
Feb 03 16:10:56 kernel: Call Trace:
Feb 03 16:10:56 kernel:  <TASK>
Feb 03 16:10:56 kernel:  ? static_key_enable_cpuslocked+0x8c/0x90
Feb 03 16:10:56 kernel:  ? __warn.cold+0x93/0xfa
Feb 03 16:10:56 kernel:  ? static_key_enable_cpuslocked+0x8c/0x90
Feb 03 16:10:56 kernel:  ? report_bug+0xff/0x140
Feb 03 16:10:56 kernel:  ? early_fixup_exception+0x5d/0xb0
Feb 03 16:10:56 kernel:  ? early_idt_handler_common+0x2f/0x3a
Feb 03 16:10:56 kernel:  ? static_key_enable_cpuslocked+0x8c/0x90
Feb 03 16:10:56 kernel:  ? static_key_enable+0x1a/0x20
Feb 03 16:10:56 kernel:  ? security_add_hooks+0xc9/0x120
Feb 03 16:10:56 kernel:  ? lockdown_lsm_init+0x21/0x30
Feb 03 16:10:56 kernel:  ? initialize_lsm+0x34/0x60
Feb 03 16:10:56 kernel:  ? early_security_init+0x3d/0x50
Feb 03 16:10:56 kernel:  ? start_kernel+0x66/0xa00
Feb 03 16:10:56 kernel:  ? x86_64_start_reservations+0x24/0x30
Feb 03 16:10:56 kernel:  ? x86_64_start_kernel+0xed/0xf0
Feb 03 16:10:56 kernel:  ? common_startup_64+0x13e/0x141
Feb 03 16:10:56 kernel:  </TASK>
Feb 03 16:10:56 kernel: ---[ end trace 0000000000000000 ]---
Feb 03 16:10:56 kernel: ------------[ cut here ]------------
Feb 03 16:10:56 kernel: static_key_enable_cpuslocked(): static key 'security_hook_active_lock_kernel_down_0+0x0/0x10' used before call to jump_label_init()
Feb 03 16:10:56 kernel: WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:199 static_key_enable_cpuslocked+0x8c/0x90
Feb 03 16:10:56 kernel: Modules linked in:
Feb 03 16:10:56 kernel: CPU: 0 UID: 0 PID: 0 Comm: swapper Tainted: G        W          6.12.12-200.fc41.x86_64 #1
Feb 03 16:10:56 kernel: Tainted: [W]=WARN
Feb 03 16:10:56 kernel: RIP: 0010:static_key_enable_cpuslocked+0x8c/0x90
Feb 03 16:10:56 kernel: Code: ff c7 03 01 00 00 00 48 c7 c7 e0 8d a0 a5 5b e9 2a fb e8 00 48 89 fa 48 c7 c6 e0 70 67 a4 48 c7 c7 78 2d e7 a4 e8 54 50 d6 ff <0f> 0b eb 86 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f
Feb 03 16:10:56 kernel: RSP: 0000:ffffffffa5803e70 EFLAGS: 00010086 ORIG_RAX: 0000000000000000
Feb 03 16:10:56 kernel: RAX: 0000000000000000 RBX: ffffffffa6928540 RCX: 00000000000000ed
Feb 03 16:10:56 kernel: RDX: 0000000000000083 RSI: 00000000ffffe04f RDI: ffffffffa5803d20
Feb 03 16:10:56 kernel: RBP: ffffffffa4f684b0 R08: 0000000020646573 R09: 0000000000000000
Feb 03 16:10:56 kernel: R10: 6a206f74206c6c61 R11: 0000000000000000 R12: ffffffffa46d4150
Feb 03 16:10:56 kernel: R13: 0000000000000002 R14: 0000000000000002 R15: 00000000322f5000
Feb 03 16:10:56 kernel: FS:  0000000000000000(0000) GS:ffffffffa6291000(0000) knlGS:0000000000000000
Feb 03 16:10:56 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Feb 03 16:10:56 kernel: CR2: ffff88802d0ef000 CR3: 00000004953a4000 CR4: 00000000000000f0
Feb 03 16:10:56 kernel: Call Trace:
Feb 03 16:10:56 kernel:  <TASK>
Feb 03 16:10:56 kernel:  ? static_key_enable_cpuslocked+0x8c/0x90
Feb 03 16:10:56 kernel:  ? __warn.cold+0x93/0xfa
Feb 03 16:10:56 kernel:  ? static_key_enable_cpuslocked+0x8c/0x90
Feb 03 16:10:56 kernel:  ? report_bug+0xff/0x140
Feb 03 16:10:56 kernel:  ? early_fixup_exception+0x5d/0xb0
Feb 03 16:10:56 kernel:  ? early_idt_handler_common+0x2f/0x3a
Feb 03 16:10:56 kernel:  ? static_key_enable_cpuslocked+0x8c/0x90
Feb 03 16:10:56 kernel:  ? static_key_enable+0x1a/0x20
Feb 03 16:10:56 kernel:  ? security_add_hooks+0xc9/0x120
Feb 03 16:10:56 kernel:  ? lockdown_lsm_init+0x21/0x30
Feb 03 16:10:56 kernel:  ? initialize_lsm+0x34/0x60
Feb 03 16:10:56 kernel:  ? early_security_init+0x3d/0x50
Feb 03 16:10:56 kernel:  ? start_kernel+0x66/0xa00
Feb 03 16:10:56 kernel:  ? x86_64_start_reservations+0x24/0x30
Feb 03 16:10:56 kernel:  ? x86_64_start_kernel+0xed/0xf0
Feb 03 16:10:56 kernel:  ? common_startup_64+0x13e/0x141
Feb 03 16:10:56 kernel:  </TASK>
Feb 03 16:10:56 kernel: ---[ end trace 0000000000000000 ]---

BZ#2339186 SDL3-3.2.0 is available

this breaks GDM on virtualbox when '3D Acceleration' is enabled! For some reason sddm (KDE) does work though

sorry this should go to MESA not SDL2 pls ignore

this breaks GDM on virtualbox when '3D Acceleration' is enabled!
For some reason sddm (KDE) does work though