linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [GIT PULL] hardening fixes for v6.17-rc1
@ 2025-07-30  0:29 Kees Cook
  2025-07-30  5:06 ` pr-tracker-bot
  0 siblings, 1 reply; 2+ messages in thread
From: Kees Cook @ 2025-07-30  0:29 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: linux-kernel, Gustavo A. R. Silva, Hans de Goede, Kees Cook,
	kernel test robot, Marco Elver, Nathan Chancellor,
	syzbot+5245cb609175fb6e8122, zepta

Hi Linus,

Please pull these hardening fixes for v6.17-rc1. Notably, this contains
the fix for for the GCC __init mess I created with the kstack_erase
annotations.

Thanks!

-Kees

The following changes since commit 32e42ab9fc88a884435c27527a433f61c4d2b61b:

  sched/task_stack: Add missing const qualifier to end_of_stack() (2025-07-26 14:28:35 -0700)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git tags/hardening-v6.17-rc1-fix1

for you to fetch changes up to f627b51aaa041cba715b59026cf2d9cb1476c7ed:

  compiler_types: Provide __no_kstack_erase to disable coverage only on Clang (2025-07-29 17:19:35 -0700)

----------------------------------------------------------------
hardening fixes for v6.17-rc1

- staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int()
  I was asked to carry this fix, so here it is. :)

- fortify: Fix incorrect reporting of read buffer size

- kstack_erase: Fix missed export of renamed KSTACK_ERASE_CFLAGS

- compiler_types: Provide __no_kstack_erase to disable coverage only on Clang

----------------------------------------------------------------
Kees Cook (4):
      staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int()
      kstack_erase: Fix missed export of renamed KSTACK_ERASE_CFLAGS
      fortify: Fix incorrect reporting of read buffer size
      compiler_types: Provide __no_kstack_erase to disable coverage only on Clang

 scripts/Makefile.kstack_erase                             | 2 +-
 arch/x86/include/asm/init.h                               | 2 +-
 include/linux/compiler-clang.h                            | 3 +++
 include/linux/compiler_types.h                            | 4 ++++
 include/linux/fortify-string.h                            | 2 +-
 include/linux/init.h                                      | 2 +-
 drivers/staging/media/atomisp/pci/atomisp_gmin_platform.c | 9 +++++----
 7 files changed, 16 insertions(+), 8 deletions(-)

-- 
Kees Cook

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: [GIT PULL] hardening fixes for v6.17-rc1
  2025-07-30  0:29 [GIT PULL] hardening fixes for v6.17-rc1 Kees Cook
@ 2025-07-30  5:06 ` pr-tracker-bot
  0 siblings, 0 replies; 2+ messages in thread
From: pr-tracker-bot @ 2025-07-30  5:06 UTC (permalink / raw)
  To: Kees Cook
  Cc: Linus Torvalds, linux-kernel, Gustavo A. R. Silva, Hans de Goede,
	Kees Cook, kernel test robot, Marco Elver, Nathan Chancellor,
	syzbot+5245cb609175fb6e8122, zepta

The pull request you sent on Tue, 29 Jul 2025 17:29:41 -0700:

> https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git tags/hardening-v6.17-rc1-fix1

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/a26321ee4c935a63c29ed6518f27e38826b36e68

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2025-07-30  5:06 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-07-30  0:29 [GIT PULL] hardening fixes for v6.17-rc1 Kees Cook
2025-07-30  5:06 ` pr-tracker-bot

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).