Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp976332ybt; Wed, 17 Jun 2020 19:40:27 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx+g/C2H105LMEtY1Imd5n/kYSNop4j1bNVH5I5xBkpJAVLlxDbkvufTjsI3cUGJU0FPXGn X-Received: by 2002:a17:907:402e:: with SMTP id nr22mr1874401ejb.239.1592448027182; Wed, 17 Jun 2020 19:40:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592448027; cv=none; d=google.com; s=arc-20160816; b=MTmpclWKuaHDf+cgpR6TNJV6IvH9BAr7fkmuDkbhatdMmS/4YlzEIT5kfSkzV4wL9U kHtQOqozdvFA610R3/uh9qwIWjVQLD36c8MqZeJSsb52pe5qy7ntX6jHrVC/2eD+dEtR +1wHPb0sB5JR92jEQrEO4QGP4cDW+aOtqKAmyjS9TQ5U2XPO91QgBwlmaYyOBeZwk7p2 YQQaZ2TUSDIrMPGg4Cng8RTRi6PuvX1GunQ1N4ejnMsTzyE+80aF3EjfF0s57qKU/G1Y H1ZCrAMB5OjEYJPO9D9/Ltln9aZLMI6o8F66cISJMXWAa9nRDG4p/P9hv0SuziO8VTJn nMQQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Lmsy9KsriUb438ISLbjkEiSgc7yi1cTM9vpduZ0Qoz0=; b=iWefHbiFuQ+AvwiAWToMUjeVe02gwMlO9mkZ/ogrrRQEcYr+JPPaAWtiWg1kiXjgPw TstnRNMe1/uPiTxq4jj9RTttc9+5IgCuDd+DQqOvA4hOG1ZF6f7BB0DvsT2+gq/l4qQl Q+EGUcj+waqJs4/2VKF115z8VejJyzNEplQnW9lHgLh0CSD4Un0bB8sEE6W+nUCf8Ec6 5LVYm7mFa+meRuHwKi4af01D3g9upIx3RfpfYnLPMqf0hWNtOIOSKXVA/rQ1Ena57eSq IZO4BnjA5O26oVOZWSXAtjGCM+8l3ZxtIhfhdehWO5VM4yJ/y9vk/jfZtnUJvcQ1csW+ QZUg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=sdI9z0YB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d7si1012823edr.520.2020.06.17.19.40.05; Wed, 17 Jun 2020 19:40:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=sdI9z0YB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387754AbgFRCg2 (ORCPT + 99 others); Wed, 17 Jun 2020 22:36:28 -0400 Received: from mail.kernel.org ([198.145.29.99]:43422 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729241AbgFRBN5 (ORCPT ); Wed, 17 Jun 2020 21:13:57 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EBE9221974; Thu, 18 Jun 2020 01:13:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1592442836; bh=0hZx3zP10Ds1j10gCx37S3rT5JDXBnvUZQIeZ4Q/Jbo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=sdI9z0YBf/+zOneeLxr+G5IJ9Pof+A0vVAiY92f8fdXDCcoQ0sKtdLS7pE5c6XiqE PhjkkYA4D/XCRn47l/YeB+9zFC9TUX1ZOB7xXdaOSg8djyOxxyhWAHD3i8QhOG4sdg hSEPqxvFBYpyMV/xGNqjOHV26Ui23S83cUm+klTw= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Siddharth Gupta , Masahiro Yamada , Sasha Levin Subject: [PATCH AUTOSEL 5.7 270/388] scripts: headers_install: Exit with error on config leak Date: Wed, 17 Jun 2020 21:06:07 -0400 Message-Id: <20200618010805.600873-270-sashal@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200618010805.600873-1-sashal@kernel.org> References: <20200618010805.600873-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Siddharth Gupta [ Upstream commit 5967577231f9b19acd5a59485e9075964065bbe3 ] Misuse of CONFIG_* in UAPI headers should result in an error. These config options can be set in userspace by the user application which includes these headers to control the APIs and structures being used in a kernel which supports multiple targets. Signed-off-by: Siddharth Gupta Signed-off-by: Masahiro Yamada Signed-off-by: Sasha Levin --- scripts/headers_install.sh | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/scripts/headers_install.sh b/scripts/headers_install.sh index a07668a5c36b..94a833597a88 100755 --- a/scripts/headers_install.sh +++ b/scripts/headers_install.sh @@ -64,7 +64,7 @@ configs=$(sed -e ' d ' $OUTFILE) -# The entries in the following list are not warned. +# The entries in the following list do not result in an error. # Please do not add a new entry. This list is only for existing ones. # The list will be reduced gradually, and deleted eventually. (hopefully) # @@ -98,18 +98,19 @@ include/uapi/linux/raw.h:CONFIG_MAX_RAW_DEVS for c in $configs do - warn=1 + leak_error=1 for ignore in $config_leak_ignores do if echo "$INFILE:$c" | grep -q "$ignore$"; then - warn= + leak_error= break fi done - if [ "$warn" = 1 ]; then - echo "warning: $INFILE: leak $c to user-space" >&2 + if [ "$leak_error" = 1 ]; then + echo "error: $INFILE: leak $c to user-space" >&2 + exit 1 fi done -- 2.25.1