[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <202203311127.503A3110@keescook>
Date: Thu, 31 Mar 2022 11:35:40 -0700
From: Kees Cook <keescook@...omium.org>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: linux-kernel@...r.kernel.org,
Andrew Morton <akpm@...ux-foundation.org>,
Christoph Hellwig <hch@....de>,
David Hildenbrand <david@...hat.com>,
Hari Bathini <hbathini@...ux.ibm.com>,
Kees Cook <keescook@...omium.org>,
linux-arm-kernel@...ts.infradead.org,
Logan Gunthorpe <logang@...tatee.com>,
Martin Oliveira <martin.oliveira@...eticom.com>,
"Matthew Wilcox (Oracle)" <willy@...radead.org>,
Mike Kravetz <mike.kravetz@...cle.com>,
Minchan Kim <minchan@...nel.org>,
Russell King <linux@...linux.org.uk>,
Stephen Rothwell <sfr@...b.auug.org.au>,
Zi Yan <ziy@...dia.com>
Subject: [GIT PULL] hardening fixes for v5.18-rc1
Hi Linus,
Please pull these hardening fixes for v5.18-rc1. This addresses an
-Warray-bounds warning found under a few ARM defconfigs, and disables
long-broken CONFIG_HARDENED_USERCOPY_PAGESPAN.
Thanks!
-Kees
The following changes since commit afcf5441b9ff22ac57244cd45ff102ebc2e32d1a:
arm64: Add gcc Shadow Call Stack support (2022-03-10 09:22:09 -0800)
are available in the Git repository at:
https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git tags/hardening-v5.18-rc1-fix1
for you to fetch changes up to 229a08a4f4e4f9949801cc39b6480ddc9c487183:
ARM/dma-mapping: Remove CMA code when not built with CMA (2022-03-31 11:19:25 -0700)
----------------------------------------------------------------
hardening updates for v5.18-rc1-fix1
- Disable CONFIG_HARDENED_USERCOPY_PAGESPAN
- DMA: remove CMA code when not buiding CMA
----------------------------------------------------------------
Kees Cook (2):
usercopy: Disable CONFIG_HARDENED_USERCOPY_PAGESPAN
ARM/dma-mapping: Remove CMA code when not built with CMA
arch/arm/mm/dma-mapping.c | 2 ++
arch/arm/mm/mm.h | 4 ++++
include/linux/cma.h | 4 ----
security/Kconfig | 2 +-
4 files changed, 7 insertions(+), 5 deletions(-)
--
Kees Cook
Powered by blists - more mailing lists