From patchwork Mon Jan 8 18:20:13 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Kees Cook X-Patchwork-Id: 13513804 Received: from mail-pl1-f175.google.com (mail-pl1-f175.google.com [209.85.214.175]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E2B9E54BD0 for ; Mon, 8 Jan 2024 18:20:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=chromium.org Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=chromium.org Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=chromium.org header.i=@chromium.org header.b="bllMikhw" Received: by mail-pl1-f175.google.com with SMTP id d9443c01a7336-1d3e8a51e6bso16940915ad.3 for ; Mon, 08 Jan 2024 10:20:14 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; t=1704738014; x=1705342814; darn=vger.kernel.org; h=content-disposition:mime-version:message-id:subject:cc:to:from:date :from:to:cc:subject:date:message-id:reply-to; bh=MqDz4oNfh2B5BR/R2EPy7vlFbl/dDn7Jawuse3WFwvo=; b=bllMikhwnjXw9qktxz4YuUWo3qwbDoFs3t/lVGHkqklTFIEYTaKxD0GCcAyAoOu3T2 4uuWz54cSyrNUbwSeBB5Un/TSUcBOa4oSuN6ljO0ydDWyJmnlgCUXioFJfFh0eE0f1ye FQJrShhwQFaBJJjVFL3EbvMeGVbWXHBA+Bth4= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704738014; x=1705342814; h=content-disposition:mime-version:message-id:subject:cc:to:from:date :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=MqDz4oNfh2B5BR/R2EPy7vlFbl/dDn7Jawuse3WFwvo=; b=C7loIurxpHolbADzNpgyRZj9VhB5CMHXU8ErADeYdg235TbAOCiFukW5ftj10bYH1e RLn4lH1+zFh3bMYSHm5bakjzLnhQxaV9TU58/SyDmofQZpRfo24sBRZ7hGzfT63Yj8+q /nv24E1IuptgCeIR4ccsCfOLwGZi82q9LhOv9/8jK6WBkKoVl7sEdT/Lj2JsV8j0E4e2 rJNAnYJscauoOmHLrZCUKb75UfwVC3Xanv5KuC77P8HeTL+9HENhCJQKIdGQmMrofv+L Qed+5r2+hy9ON7NpxoSuk33GVnz2W54g2Ob+UevH+4175E6xDRs+/mGaV4cm/T5FnnjN mTXg== X-Gm-Message-State: AOJu0YzMbYtY6X59DsArB8jg5Y5DYUEwbAgwg2HV6Jvu9X8wHwU5HiJl m5f2YPrph01pG/z9m915KHnzt3QSX8rr X-Google-Smtp-Source: AGHT+IFxNO0lEcwVoYJ2PS0WIsN/wyi14uuN4veTMd6NRnkjGW0P6RQp8XvrWrO8PioGVkNCuYdP4A== X-Received: by 2002:a17:902:684f:b0:1d5:4dbf:6045 with SMTP id f15-20020a170902684f00b001d54dbf6045mr517599pln.86.1704738014214; Mon, 08 Jan 2024 10:20:14 -0800 (PST) Received: from www.outflux.net (198-0-35-241-static.hfc.comcastbusiness.net. [198.0.35.241]) by smtp.gmail.com with ESMTPSA id d23-20020a170902729700b001d54b86774dsm205146pll.67.2024.01.08.10.20.13 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 08 Jan 2024 10:20:13 -0800 (PST) Date: Mon, 8 Jan 2024 10:20:13 -0800 From: Kees Cook To: Linus Torvalds Cc: linux-kernel@vger.kernel.org, Alexander Potapenko , Anders Larsen , Andrew Morton , Andy Shevchenko , Anna Schumaker , Arnd Bergmann , Azeem Shaikh , Christophe JAILLET , Chuck Lever , Dai Ngo , "David S. Miller" , Dmitry Vyukov , Eric Dumazet , Geliang Tang , Greg Kroah-Hartman , Gurucharan G , "Gustavo A. R. Silva" , Jakub Kicinski , Jeff Layton , Jesse Brandeburg , Justin Stitt , kasan-dev@googlegroups.com, Kees Cook , linux-hardening@vger.kernel.org, linux-nfs@vger.kernel.org, linux-trace-kernel@vger.kernel.org, Luis Chamberlain , Marco Elver , "Masami Hiramatsu (Google)" , Neil Brown , netdev@vger.kernel.org, Olga Kornievskaia , Paolo Abeni , Ronald Monthero , Shiraz Saleem , Stephen Boyd , "Steven Rostedt (Google)" , Thomas Gleixner , Tom Talpey , Tony Nguyen , Trond Myklebust , Valentin Schneider , Xu Panda Subject: [GIT PULL] hardening updates for v6.8-rc1 Message-ID: <202401081012.7571CBB@keescook> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Disposition: inline Hi Linus, Please pull these hardening updates for v6.8-rc1. There will be a second pull request coming at the end of the rc1 window, as we can now finally remove the "strlcpy" API entirely from the kernel. However, that depends on other trees landing first. As always, my tree has been in -next the whole time, and anything touching other subsystems was either explicitly Acked by those maintainers or they were sufficiently trivial and went ignored so I picked them up. Thanks! -Kees The following changes since commit 98b1cc82c4affc16f5598d4fa14b1858671b2263: Linux 6.7-rc2 (2023-11-19 15:02:14 -0800) are available in the Git repository at: https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git tags/hardening-v6.8-rc1 for you to fetch changes up to a75b3809dce2ad006ebf7fa641f49881fa0d79d7: qnx4: Use get_directory_fname() in qnx4_match() (2023-12-13 11:19:18 -0800) ---------------------------------------------------------------- hardening updates for v6.8-rc1 - Introduce the param_unknown_fn type and other clean ups (Andy Shevchenko) - Various __counted_by annotations (Christophe JAILLET, Gustavo A. R. Silva, Kees Cook) - Add KFENCE test to LKDTM (Stephen Boyd) - Various strncpy() refactorings (Justin Stitt) - Fix qnx4 to avoid writing into the smaller of two overlapping buffers - Various strlcpy() refactorings ---------------------------------------------------------------- Andy Shevchenko (5): params: Introduce the param_unknown_fn type params: Do not go over the limit when getting the string length params: Use size_add() for kmalloc() params: Sort headers params: Fix multi-line comment style Christophe JAILLET (1): VMCI: Annotate struct vmci_handle_arr with __counted_by Gustavo A. R. Silva (2): afs: Add __counted_by for struct afs_acl and use struct_size() atags_proc: Add __counted_by for struct buffer and use struct_size() Justin Stitt (5): HID: uhid: replace deprecated strncpy with strscpy drm/modes: replace deprecated strncpy with strscpy_pad nvme-fabrics: replace deprecated strncpy with strscpy nvdimm/btt: replace deprecated strncpy with strscpy nvme-fc: replace deprecated strncpy with strscpy Kees Cook (6): SUNRPC: Replace strlcpy() with strscpy() samples: Replace strlcpy() with strscpy() i40e: Annotate struct i40e_qvlist_info with __counted_by tracing/uprobe: Replace strlcpy() with strscpy() qnx4: Extract dir entry filename processing into helper qnx4: Use get_directory_fname() in qnx4_match() Stephen Boyd (1): lkdtm: Add kfence read after free crash type arch/arm/kernel/atags_proc.c | 4 +- drivers/gpu/drm/drm_modes.c | 6 +-- drivers/hid/uhid.c | 15 ++++---- drivers/misc/lkdtm/heap.c | 60 ++++++++++++++++++++++++++++++ drivers/misc/vmw_vmci/vmci_handle_array.h | 2 +- drivers/nvdimm/btt.c | 2 +- drivers/nvme/host/fabrics.c | 4 +- drivers/nvme/host/fc.c | 8 ++-- fs/afs/internal.h | 2 +- fs/afs/xattr.c | 2 +- fs/qnx4/dir.c | 52 ++++---------------------- fs/qnx4/namei.c | 29 ++++++--------- fs/qnx4/qnx4.h | 60 ++++++++++++++++++++++++++++++ include/linux/kfence.h | 2 + include/linux/moduleparam.h | 6 +-- include/linux/net/intel/i40e_client.h | 2 +- kernel/params.c | 52 ++++++++++++++------------ kernel/trace/trace_uprobe.c | 2 +- net/sunrpc/clnt.c | 10 ++++- samples/trace_events/trace-events-sample.h | 2 +- samples/v4l/v4l2-pci-skeleton.c | 10 ++--- 21 files changed, 208 insertions(+), 124 deletions(-)