lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20220920192202.190793-1-keescook@chromium.org> Date: Tue, 20 Sep 2022 12:21:58 -0700 From: Kees Cook <keescook@...omium.org> To: linux-hardening@...r.kernel.org Cc: Kees Cook <keescook@...omium.org>, Siddhesh Poyarekar <siddhesh@...plt.org>, Nathan Chancellor <nathan@...nel.org>, Nick Desaulniers <ndesaulniers@...gle.com>, Arnd Bergmann <arnd@...db.de>, Juergen Gross <jgross@...e.com>, Boris Ostrovsky <boris.ostrovsky@...cle.com>, Tom Rix <trix@...hat.com>, Miguel Ojeda <ojeda@...nel.org>, linux-kernel@...r.kernel.org, llvm@...ts.linux.dev Subject: [PATCH 0/4] fortify: Use __builtin_dynamic_object_size() when available Hi, This adjusts CONFIG_FORTIFY_SOURCE's coverage to include greater runtime size checking from GCC and Clang's __builtin_dynamic_object_size(), which the compilers can track either via code flow or from __alloc_size() hints. Thanks, -Kees Kees Cook (4): x86/entry: Work around Clang __bdos() bug fortify: Explicitly check bounds are compile-time constants fortify: Convert to struct vs member helpers fortify: Use __builtin_dynamic_object_size() when available arch/x86/xen/enlighten_pv.c | 3 +- drivers/misc/lkdtm/heap.c | 1 + include/linux/compiler_attributes.h | 5 ++ include/linux/fortify-string.h | 125 ++++++++++++++++------------ 4 files changed, 81 insertions(+), 53 deletions(-) -- 2.34.1
Powered by blists - more mailing lists