Received: by 2002:a89:d88:0:b0:1fa:5c73:8e2d with SMTP id eb8csp224402lqb; Thu, 23 May 2024 16:38:07 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCUF2fRD9uTU2yiWttHZuJQNaMUjw+bLlHPrRJTHtTDPb7y10q1rgZVYFyF3lWOBGIcD5ukm13Htv564Ibq8D8GaR1pE2AfR9yWxBIPdbw== X-Google-Smtp-Source: AGHT+IFNaglqZOI5DqbVQxrj/lQsRfIUbKigFeqjGdqvlrR9oYdsmdCxJOBId9U3Ri6RkiAATPeZ X-Received: by 2002:a0d:cb84:0:b0:61a:c19f:fc4c with SMTP id 00721157ae682-62a08d5d24emr6358317b3.3.1716507486735; Thu, 23 May 2024 16:38:06 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1716507486; cv=pass; d=google.com; s=arc-20160816; b=Qg2ATfsDPstmYSDZ7FqyLe17kTMRR9hdqF/ErAfH3y2nvrUJVr898Q3afF9ahGmsec PR4XvlTV2PkXOdp0rGO5j+r2X5/K1Vfn4hUWRCjgyL6hummh9o8sCn6hx0HdwkFSbp65 bnEffNJHRDe04di0da1zsCR0PI7onz/vFMG4deeL7NmJwA4hOPlo9nHgdCNIHPJa20va DfGwiF80M4MlgnCJjQwIy44KgcoP2RhoZUDbp6NugUo4+nIATRyBxCQx3PzD5g7FqKf0 3NJ5w/tJvjbEDBkw3X4wVCTzHZdpRnNhHzXR4jFJ5u1n4/XGKYeLS2yABQmfo6jZxoIG c27w== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-disposition:mime-version:list-unsubscribe:list-subscribe :list-id:precedence:message-id:subject:cc:to:from:date :dkim-signature; bh=i5p16vmI0HEdT8v1Ioid4J1CsPTLKqm29ENKWLAvzvY=; fh=IDAgPbKgf/iaXoWNoA+CrdzA724QQUn+ponjk5q2po8=; b=QtBP6cXhcOiKsz1cHqFAjs7uMdBC7QT0OzOrR/ZWiPr3THzWnD+EIEv4FhgoNxMYQ0 2mAoIWkLJmIBJ++o5+2r0hCv2LftPxQtJfvRIN43yN2OGh2ty/+qV3azmxaiFJE4HyR2 Mi61SkAO2YsgqOgkf00REoslhDCeIGgGzWc7g0nKE8yTxIrmdgXV5myDLATffkdXzMPZ 026XNkH/2UOOG8+a6WVwlujoJwQKz381ujefLSoczO9ax4VuiKUF3PLarKzpzO7GF24E CrREiim2w0WmmAWwCbZa0mZeHCgYxSrxJogwkWjTk4TZK5Q0BHANrj2px8trZkTzvKDo zEHg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=NtZhfVkN; arc=pass (i=1 spf=pass spfdomain=chromium.org dkim=pass dkdomain=chromium.org dmarc=pass fromdomain=chromium.org); spf=pass (google.com: domain of linux-kernel+bounces-188123-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-188123-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id 6a1803df08f44-6ac06f525f7si4090076d6.85.2024.05.23.16.38.06 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 23 May 2024 16:38:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-188123-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=NtZhfVkN; arc=pass (i=1 spf=pass spfdomain=chromium.org dkim=pass dkdomain=chromium.org dmarc=pass fromdomain=chromium.org); spf=pass (google.com: domain of linux-kernel+bounces-188123-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-188123-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 6A8CD1C21A2E for ; Thu, 23 May 2024 23:38:06 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id E7610128830; Thu, 23 May 2024 23:38:00 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=chromium.org header.i=@chromium.org header.b="NtZhfVkN" Received: from mail-pf1-f179.google.com (mail-pf1-f179.google.com [209.85.210.179]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 96E5BB662 for ; Thu, 23 May 2024 23:37:58 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.210.179 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716507480; cv=none; b=Ax4PgprJHm8S46cLdG6F0rgKthJyNfKb4edwUPcWPy+Od0czYfcfI5pyg2r+Br8gnlNCVH7QKtXmdGydCVMO7MPjqaN/SOQFLhfgRhs+w7YpNImPNNZxiv3nBbJk539/C+YbKV+zMc1UWKW82BXjHnlbhX/tpjilsBURPVkyl98= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716507480; c=relaxed/simple; bh=UXKFPEgBt1shyLFWACYfhbcAuinf7zOUpp60xD/sk/c=; h=Date:From:To:Cc:Subject:Message-ID:MIME-Version:Content-Type: Content-Disposition; b=kB4CHnnaQ+ORhrMxguc4zfvATNKyzQDzsk8VhqeiDigw6/woS5oU3pGij7Nb5HWpz5+ohX9xfoDxybl8eJuwjzT8d3F3uEBNt5Bd1KYxDfe35z9YYSHjl+qMs84wAMfwEe96G83rC4xl4KNU+H2WJF6xlLpxEPNZGRlAuxGA69g= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=chromium.org; spf=pass smtp.mailfrom=chromium.org; dkim=pass (1024-bit key) header.d=chromium.org header.i=@chromium.org header.b=NtZhfVkN; arc=none smtp.client-ip=209.85.210.179 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=chromium.org Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=chromium.org Received: by mail-pf1-f179.google.com with SMTP id d2e1a72fcca58-6f8eba8dcfcso292374b3a.3 for ; Thu, 23 May 2024 16:37:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; t=1716507478; x=1717112278; darn=vger.kernel.org; h=content-disposition:mime-version:message-id:subject:cc:to:from:date :from:to:cc:subject:date:message-id:reply-to; bh=i5p16vmI0HEdT8v1Ioid4J1CsPTLKqm29ENKWLAvzvY=; b=NtZhfVkN6ymZLGdmAW5G94hMQBo9NjEAQwM/w7QNeeNsZFMUeEVhbiuryNcz1KkL0w 5luOqIrnBu1kJ+QrCJ8lVpHnFnuw7EcL2KpMcsF3EbMzbJSekwClBJatLHhaQxbfllKf 2cAVuEJJCO+FDz6xpqyYsUEpriWnbSro3uVXs= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1716507478; x=1717112278; h=content-disposition:mime-version:message-id:subject:cc:to:from:date :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=i5p16vmI0HEdT8v1Ioid4J1CsPTLKqm29ENKWLAvzvY=; b=qjwzOEzqEGBNpyTNqDWwF5rAqA8k5oP0vYb7tVrKu4zDC2G5H/DvB7v66JsDHes1Yd a4VgpoDKurfZdve8f4GKA1s9eoYXgLzUPvECGI+kHsqU2c5q5zVCTRcanJ2TJ1+yDdlU 9KczNweLNJOlnvpI33eywKdfrFZdbzeo9B7YHjrUKHi6y4Xb3TQ3RuESRKtBpFTtn+dk bWGKOBOS+npTQalv3DZJzEKbv5/4WwRMCH31C0Jh9v+MFbxkUp+TWpOwgYcSSPevqUbe IhXUx5AX91e0vv6TTGqLAGga1m4q9MmoGUHUbjLp2WoUoa8jzg44A5sHOF976ca340y5 dLjg== X-Gm-Message-State: AOJu0YxEODASt5pWX3Q1jpPlEMlVdKL71G4bF24TriWFiCpbc5k5e5RN 0+mViLpoQ6VYHc+hF/CPAgh2ZUKD7BqaZwoUPNwz6fA7ywY4xt63rLlaPH+OcQ== X-Received: by 2002:a05:6a21:99a4:b0:1a9:c4ca:dc74 with SMTP id adf61e73a8af0-1b212ce1f54mr1210005637.5.1716507477857; Thu, 23 May 2024 16:37:57 -0700 (PDT) Received: from www.outflux.net ([198.0.35.241]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-6f8fc36c608sm155393b3a.92.2024.05.23.16.37.57 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 23 May 2024 16:37:57 -0700 (PDT) Date: Thu, 23 May 2024 16:37:56 -0700 From: Kees Cook To: Linus Torvalds Cc: linux-kernel@vger.kernel.org, Dmitry Torokhov , Douglas Anderson , Kees Cook , Masahiro Yamada , Nathan Chancellor , Stephen Boyd Subject: [GIT PULL] hardening fixes for v6.10-rc1 Message-ID: <202405231637.664DFA26FA@keescook> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Hi Linus, Please pull these hardening fixes for v6.10-rc1-fixes. Thanks! -Kees The following changes since commit 6d305cbef1aa01b9714e01e35f3d5c28544cf04d: uapi: stddef.h: Provide UAPI macros for __counted_by_{le, be} (2024-05-08 00:42:25 -0700) are available in the Git repository at: https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git tags/hardening-v6.10-rc1-fixes for you to fetch changes up to ae1a863bcdbd6ea2abc93519a82ab5d715d5dcbc: kunit/fortify: Fix memcmp() test to be amplitude agnostic (2024-05-18 13:46:10 -0700) ---------------------------------------------------------------- hardening fixes for v6.10-rc1 - loadpin: Prevent SECURITY_LOADPIN_ENFORCE=y without module decompression (Stephen Boyd) - ubsan: Restore dependency on ARCH_HAS_UBSAN - kunit/fortify: Fix memcmp() test to be amplitude agnostic ---------------------------------------------------------------- Kees Cook (2): ubsan: Restore dependency on ARCH_HAS_UBSAN kunit/fortify: Fix memcmp() test to be amplitude agnostic Stephen Boyd (1): loadpin: Prevent SECURITY_LOADPIN_ENFORCE=y without module decompression lib/Kconfig.ubsan | 1 + lib/fortify_kunit.c | 2 +- security/loadpin/Kconfig | 3 +++ 3 files changed, 5 insertions(+), 1 deletion(-) -- Kees Cook