Message ID | 20211213223331.135412-1-keescook@chromium.org (mailing list archive) |
---|---|
Headers | show |
Series | Enable strict compile-time memcpy() fortify checks | expand |
On Mon, Dec 13, 2021 at 02:33:14PM -0800, Kees Cook wrote: > Hi, > > This is "phase 2" (of several phases) to hardening the kernel against > memcpy-based buffer overflows. With nearly all compile-time fixes > landed, the next step is to turn on the warning globally to keep future > compile-time issues from happening, and let us take the step towards > run-time checking (and towards a new API for flexible array structures). > > This series is based on latest linux-next, and several patches here > have already been taken by subsystem maintainers but haven't appeared > in linux-next yet, and are noted below. I took the RDMA patches to the rdma tree: > RDMA/mlx5: Use memset_after() to zero struct mlx5_ib_mr > iw_cxgb4: Use memset_startat() for cpl_t5_pass_accept_rpl > IB/mthca: Use memset_startat() for clearing mpt_entry I needed rc5 to come out before I could take the mlx5 patch Thanks, Jason
On Mon, 13 Dec 2021 14:33:14 -0800, Kees Cook wrote: > This is "phase 2" (of several phases) to hardening the kernel against > memcpy-based buffer overflows. With nearly all compile-time fixes > landed, the next step is to turn on the warning globally to keep future > compile-time issues from happening, and let us take the step towards > run-time checking (and towards a new API for flexible array structures). > > This series is based on latest linux-next, and several patches here > have already been taken by subsystem maintainers but haven't appeared > in linux-next yet, and are noted below. > > [...] Applied to 5.17/scsi-queue, thanks! [15/17] scsi: lpfc: Use struct_group() to initialize struct lpfc_cgn_info https://git.kernel.org/mkp/scsi/c/532adda9f405