[GIT,PULL] kernel hardening fixes for v6.2-rc6

Message ID 202301271058.9A715143C@keescook
State New
Headers
Series [GIT,PULL] kernel hardening fixes for v6.2-rc6 |

Pull-request

https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git tags/hardening-v6.2-rc6

Message

Kees Cook Jan. 27, 2023, 6:59 p.m. UTC
  Hi Linus,

Please pull this small set of kernel hardening fixes for v6.2-rc6 that
haven't gone via other trees.

Thanks!

-Kees

The following changes since commit 42633ed852deadc14d44660ad71e2f6640239120:

  kbuild: Fix CFI hash randomization with KASAN (2023-01-13 15:22:03 -0800)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git tags/hardening-v6.2-rc6

for you to fetch changes up to be0d8f48ad97f5b775b0af3310343f676dbf318a:

  bcache: Silence memcpy() run-time false positive warnings (2023-01-25 12:24:50 -0800)

----------------------------------------------------------------
hardening fixes for v6.2-rc6

- Split slow memcpy tests into MEMCPY_SLOW_KUNIT_TEST

- Reorganize gcc-plugin includes for GCC 13

- Silence bcache memcpy run-time false positive warnings

----------------------------------------------------------------
Kees Cook (3):
      kunit: memcpy: Split slow memcpy tests into MEMCPY_SLOW_KUNIT_TEST
      gcc-plugins: Reorganize gimple includes for GCC 13
      bcache: Silence memcpy() run-time false positive warnings

 drivers/md/bcache/bcache_ondisk.h | 3 ++-
 drivers/md/bcache/journal.c       | 3 ++-
 lib/Kconfig.debug                 | 9 +++++++++
 lib/memcpy_kunit.c                | 2 ++
 scripts/gcc-plugins/gcc-common.h  | 4 ++--
 5 files changed, 17 insertions(+), 4 deletions(-)
  

Comments

pr-tracker-bot@kernel.org Jan. 28, 2023, 12:20 a.m. UTC | #1
The pull request you sent on Fri, 27 Jan 2023 10:59:38 -0800:

> https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git tags/hardening-v6.2-rc6

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/28cca23da7240df597240a492a7a7d4ce990026b

Thank you!