lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20260112073039.1185-1-fushuai.wang@linux.dev>
Date: Mon, 12 Jan 2026 15:30:33 +0800
From: Fushuai Wang <fushuai.wang@...ux.dev>
To: tglx@...nel.org,
	peterz@...radead.org,
	mathieu.desnoyers@...icios.com,
	akpm@...ux-foundation.org,
	aliceryhl@...gle.com,
	yury.norov@...il.com,
	vmalik@...hat.com,
	kees@...nel.org,
	dave.hansen@...ux.intel.com,
	luto@...nel.org,
	mingo@...hat.com,
	bp@...en8.de,
	hpa@...or.com,
	rostedt@...dmis.org,
	mhiramat@...nel.org,
	brauner@...nel.org,
	jack@...e.cz,
	cyphar@...har.com
Cc: linux-kernel@...r.kernel.org,
	x86@...nel.org,
	linux-trace-kernel@...r.kernel.org,
	wangfushuai@...du.com
Subject: [PATCH v2 0/6] uaccess: Introduce copy_from_user_nul helper

From: Fushuai Wang <wangfushuai@...du.com>

Hi all,

This patch series introduces a new helper function, copy_from_user_nul,
to simplify cases where a buffer copied from userspace needs to be
NUL-terminated. In many places, after using copy_from_user, we manually
add a NUL byte to the end of the buffer to prevent string overflows and
ensure safe string handling.

The new helper performs both the copy and the NUL-termination in one
step, reducing repetitive code and the chance of errors.

v1 -> v2: Rewrite commit message and add some actual code improvements

--WANG

Fushuai Wang (6):
  uaccess: Add copy_from_user_nul helper
  x86/tlb: Use copy_from_user_nul() instead of copy_from_user()
  tracing: Use copy_from_user_nul() instead of copy_from_user()
  userns: Use copy_from_user_nul() instead of copy_from_user()
  time: Use copy_from_user_nul() instead of copy_from_user()
  kstrtox: Use copy_from_user_nul() instead of copy_from_user()

 arch/x86/mm/tlb.c         |  3 +--
 include/linux/uaccess.h   | 19 +++++++++++++++++++
 kernel/time/test_udelay.c |  3 +--
 kernel/trace/trace.c      |  3 +--
 kernel/user_namespace.c   |  3 +--
 lib/kstrtox.c             |  6 ++----
 6 files changed, 25 insertions(+), 12 deletions(-)

-- 
2.36.1


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ