lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20231212211606.make.155-kees@kernel.org> Date: Tue, 12 Dec 2023 13:17:37 -0800 From: Kees Cook <keescook@...omium.org> To: Greg Kroah-Hartman <gregkh@...uxfoundation.org> Cc: Kees Cook <keescook@...omium.org>, Tejun Heo <tj@...nel.org>, Azeem Shaikh <azeemshaikh38@...il.com>, Zefan Li <lizefan.x@...edance.com>, Johannes Weiner <hannes@...xchg.org>, Waiman Long <longman@...hat.com>, Christophe JAILLET <christophe.jaillet@...adoo.fr>, linux-kernel@...r.kernel.org, cgroups@...r.kernel.org, bpf@...r.kernel.org, linux-hardening@...r.kernel.org Subject: [PATCH v3 0/3] kernfs: Convert from strlcpy() to strscpy() Hi, One of the last users of strlcpy() is kernfs, which has some complex calling hierarchies that needed to be carefully examined. This series refactors the strlcpy() calls into strscpy() calls, and bubbles up all changes in return value checking for callers. Future work in kernfs and sysfs will see the replacement of open-coded string handling with the seq_buf API, but we need to do one thing at a time. Thanks! -kees v3: don't need to account for scnprintf() returning negative (christophe.jaillet) v2: https://lore.kernel.org/all/20231130200937.it.424-kees@kernel.org/ v1: https://lore.kernel.org/linux-hardening/20231116191718.work.246-kees@kernel.org/ Kees Cook (3): kernfs: Convert kernfs_walk_ns() from strlcpy() to strscpy() kernfs: Convert kernfs_name_locked() from strlcpy() to strscpy() kernfs: Convert kernfs_path_from_node_locked() from strlcpy() to strscpy() fs/kernfs/dir.c | 50 +++++++++++++++++++-------------------- kernel/cgroup/cgroup-v1.c | 2 +- kernel/cgroup/cgroup.c | 4 ++-- kernel/cgroup/cpuset.c | 2 +- 4 files changed, 29 insertions(+), 29 deletions(-) -- 2.34.1
Powered by blists - more mailing lists