+++ /dev/null
-From 49ae1294b3a9f52f0dec083b0c0ad13b6e41388d Mon Sep 17 00:00:00 2001
-From: Sasha Levin <sashal@kernel.org>
-Date: Fri, 27 Jan 2023 20:12:19 +0000
-Subject: apparmor: fix use of strcpy in policy_unpack_test
-
-From: Rae Moar <rmoar@google.com>
-
-[ Upstream commit b54aebd4411134b525a82d663a26b2f135ecb7e8 ]
-
-Replace the use of strcpy() in build_aa_ext_struct() in
-policy_unpack_test.c with strscpy().
-
-strscpy() is the safer method to use to ensure the buffer does not
-overflow. This was found by kernel test robot:
-https://lore.kernel.org/all/202301040348.NbfVsXO0-lkp@intel.com/.
-
-Reported-by: kernel test robot <lkp@intel.com>
-
-Signed-off-by: Rae Moar <rmoar@google.com>
-Signed-off-by: John Johansen <john.johansen@canonical.com>
-Signed-off-by: Sasha Levin <sashal@kernel.org>
----
- security/apparmor/policy_unpack_test.c | 13 ++++++-------
- 1 file changed, 6 insertions(+), 7 deletions(-)
-
-diff --git a/security/apparmor/policy_unpack_test.c b/security/apparmor/policy_unpack_test.c
-index 533137f45361c..3c84981aa1f48 100644
---- a/security/apparmor/policy_unpack_test.c
-+++ b/security/apparmor/policy_unpack_test.c
-@@ -66,31 +66,30 @@ struct aa_ext *build_aa_ext_struct(struct policy_unpack_fixture *puf,
-
- *buf = AA_NAME;
- *(buf + 1) = strlen(TEST_STRING_NAME) + 1;
-- strcpy(buf + 3, TEST_STRING_NAME);
-+ strscpy(buf + 3, TEST_STRING_NAME, e->end - (void *)(buf + 3));
-
- buf = e->start + TEST_STRING_BUF_OFFSET;
- *buf = AA_STRING;
- *(buf + 1) = strlen(TEST_STRING_DATA) + 1;
-- strcpy(buf + 3, TEST_STRING_DATA);
--
-+ strscpy(buf + 3, TEST_STRING_DATA, e->end - (void *)(buf + 3));
- buf = e->start + TEST_NAMED_U32_BUF_OFFSET;
- *buf = AA_NAME;
- *(buf + 1) = strlen(TEST_U32_NAME) + 1;
-- strcpy(buf + 3, TEST_U32_NAME);
-+ strscpy(buf + 3, TEST_U32_NAME, e->end - (void *)(buf + 3));
- *(buf + 3 + strlen(TEST_U32_NAME) + 1) = AA_U32;
- *((u32 *)(buf + 3 + strlen(TEST_U32_NAME) + 2)) = TEST_U32_DATA;
-
- buf = e->start + TEST_NAMED_U64_BUF_OFFSET;
- *buf = AA_NAME;
- *(buf + 1) = strlen(TEST_U64_NAME) + 1;
-- strcpy(buf + 3, TEST_U64_NAME);
-+ strscpy(buf + 3, TEST_U64_NAME, e->end - (void *)(buf + 3));
- *(buf + 3 + strlen(TEST_U64_NAME) + 1) = AA_U64;
- *((u64 *)(buf + 3 + strlen(TEST_U64_NAME) + 2)) = TEST_U64_DATA;
-
- buf = e->start + TEST_NAMED_BLOB_BUF_OFFSET;
- *buf = AA_NAME;
- *(buf + 1) = strlen(TEST_BLOB_NAME) + 1;
-- strcpy(buf + 3, TEST_BLOB_NAME);
-+ strscpy(buf + 3, TEST_BLOB_NAME, e->end - (void *)(buf + 3));
- *(buf + 3 + strlen(TEST_BLOB_NAME) + 1) = AA_BLOB;
- *(buf + 3 + strlen(TEST_BLOB_NAME) + 2) = TEST_BLOB_DATA_SIZE;
- memcpy(buf + 3 + strlen(TEST_BLOB_NAME) + 6,
-@@ -99,7 +98,7 @@ struct aa_ext *build_aa_ext_struct(struct policy_unpack_fixture *puf,
- buf = e->start + TEST_NAMED_ARRAY_BUF_OFFSET;
- *buf = AA_NAME;
- *(buf + 1) = strlen(TEST_ARRAY_NAME) + 1;
-- strcpy(buf + 3, TEST_ARRAY_NAME);
-+ strscpy(buf + 3, TEST_ARRAY_NAME, e->end - (void *)(buf + 3));
- *(buf + 3 + strlen(TEST_ARRAY_NAME) + 1) = AA_ARRAY;
- *((u16 *)(buf + 3 + strlen(TEST_ARRAY_NAME) + 2)) = TEST_ARRAY_SIZE;
-
---
-2.40.1
-
drm-amdgpu-fix-potential-fence-use-after-free-v2.patch
alsa-hda-realtek-add-quirks-for-unis-h3c-desktop-b76.patch
alsa-hda-fix-a-possible-null-pointer-dereference-due.patch
-apparmor-fix-use-of-strcpy-in-policy_unpack_test.patch
powerpc-kasan-disable-kcov-in-kasan-code.patch
ring-buffer-do-not-swap-cpu_buffer-during-resize-pro.patch
ima-allow-fix-uml-builds.patch
+++ /dev/null
-From cd977c31a043251b9fe334afe2a2ab102689f5a0 Mon Sep 17 00:00:00 2001
-From: Sasha Levin <sashal@kernel.org>
-Date: Fri, 27 Jan 2023 20:12:19 +0000
-Subject: apparmor: fix use of strcpy in policy_unpack_test
-
-From: Rae Moar <rmoar@google.com>
-
-[ Upstream commit b54aebd4411134b525a82d663a26b2f135ecb7e8 ]
-
-Replace the use of strcpy() in build_aa_ext_struct() in
-policy_unpack_test.c with strscpy().
-
-strscpy() is the safer method to use to ensure the buffer does not
-overflow. This was found by kernel test robot:
-https://lore.kernel.org/all/202301040348.NbfVsXO0-lkp@intel.com/.
-
-Reported-by: kernel test robot <lkp@intel.com>
-
-Signed-off-by: Rae Moar <rmoar@google.com>
-Signed-off-by: John Johansen <john.johansen@canonical.com>
-Signed-off-by: Sasha Levin <sashal@kernel.org>
----
- security/apparmor/policy_unpack_test.c | 13 ++++++-------
- 1 file changed, 6 insertions(+), 7 deletions(-)
-
-diff --git a/security/apparmor/policy_unpack_test.c b/security/apparmor/policy_unpack_test.c
-index 533137f45361c..3c84981aa1f48 100644
---- a/security/apparmor/policy_unpack_test.c
-+++ b/security/apparmor/policy_unpack_test.c
-@@ -66,31 +66,30 @@ struct aa_ext *build_aa_ext_struct(struct policy_unpack_fixture *puf,
-
- *buf = AA_NAME;
- *(buf + 1) = strlen(TEST_STRING_NAME) + 1;
-- strcpy(buf + 3, TEST_STRING_NAME);
-+ strscpy(buf + 3, TEST_STRING_NAME, e->end - (void *)(buf + 3));
-
- buf = e->start + TEST_STRING_BUF_OFFSET;
- *buf = AA_STRING;
- *(buf + 1) = strlen(TEST_STRING_DATA) + 1;
-- strcpy(buf + 3, TEST_STRING_DATA);
--
-+ strscpy(buf + 3, TEST_STRING_DATA, e->end - (void *)(buf + 3));
- buf = e->start + TEST_NAMED_U32_BUF_OFFSET;
- *buf = AA_NAME;
- *(buf + 1) = strlen(TEST_U32_NAME) + 1;
-- strcpy(buf + 3, TEST_U32_NAME);
-+ strscpy(buf + 3, TEST_U32_NAME, e->end - (void *)(buf + 3));
- *(buf + 3 + strlen(TEST_U32_NAME) + 1) = AA_U32;
- *((u32 *)(buf + 3 + strlen(TEST_U32_NAME) + 2)) = TEST_U32_DATA;
-
- buf = e->start + TEST_NAMED_U64_BUF_OFFSET;
- *buf = AA_NAME;
- *(buf + 1) = strlen(TEST_U64_NAME) + 1;
-- strcpy(buf + 3, TEST_U64_NAME);
-+ strscpy(buf + 3, TEST_U64_NAME, e->end - (void *)(buf + 3));
- *(buf + 3 + strlen(TEST_U64_NAME) + 1) = AA_U64;
- *((u64 *)(buf + 3 + strlen(TEST_U64_NAME) + 2)) = TEST_U64_DATA;
-
- buf = e->start + TEST_NAMED_BLOB_BUF_OFFSET;
- *buf = AA_NAME;
- *(buf + 1) = strlen(TEST_BLOB_NAME) + 1;
-- strcpy(buf + 3, TEST_BLOB_NAME);
-+ strscpy(buf + 3, TEST_BLOB_NAME, e->end - (void *)(buf + 3));
- *(buf + 3 + strlen(TEST_BLOB_NAME) + 1) = AA_BLOB;
- *(buf + 3 + strlen(TEST_BLOB_NAME) + 2) = TEST_BLOB_DATA_SIZE;
- memcpy(buf + 3 + strlen(TEST_BLOB_NAME) + 6,
-@@ -99,7 +98,7 @@ struct aa_ext *build_aa_ext_struct(struct policy_unpack_fixture *puf,
- buf = e->start + TEST_NAMED_ARRAY_BUF_OFFSET;
- *buf = AA_NAME;
- *(buf + 1) = strlen(TEST_ARRAY_NAME) + 1;
-- strcpy(buf + 3, TEST_ARRAY_NAME);
-+ strscpy(buf + 3, TEST_ARRAY_NAME, e->end - (void *)(buf + 3));
- *(buf + 3 + strlen(TEST_ARRAY_NAME) + 1) = AA_ARRAY;
- *((u16 *)(buf + 3 + strlen(TEST_ARRAY_NAME) + 2)) = TEST_ARRAY_SIZE;
-
---
-2.40.1
-
fs-ntfs3-mark-ntfs-dirty-when-on-disk-struct-is-corr.patch
alsa-hda-realtek-add-quirks-for-unis-h3c-desktop-b76.patch
alsa-hda-fix-a-possible-null-pointer-dereference-due.patch
-apparmor-fix-use-of-strcpy-in-policy_unpack_test.patch
powerpc-kasan-disable-kcov-in-kasan-code.patch
ring-buffer-do-not-swap-cpu_buffer-during-resize-pro.patch
iio-add-addac-subdirectory.patch
+++ /dev/null
-From db21c0732460f1bab090a6477a4bbb9b8114b55a Mon Sep 17 00:00:00 2001
-From: Sasha Levin <sashal@kernel.org>
-Date: Fri, 27 Jan 2023 20:12:19 +0000
-Subject: apparmor: fix use of strcpy in policy_unpack_test
-
-From: Rae Moar <rmoar@google.com>
-
-[ Upstream commit b54aebd4411134b525a82d663a26b2f135ecb7e8 ]
-
-Replace the use of strcpy() in build_aa_ext_struct() in
-policy_unpack_test.c with strscpy().
-
-strscpy() is the safer method to use to ensure the buffer does not
-overflow. This was found by kernel test robot:
-https://lore.kernel.org/all/202301040348.NbfVsXO0-lkp@intel.com/.
-
-Reported-by: kernel test robot <lkp@intel.com>
-
-Signed-off-by: Rae Moar <rmoar@google.com>
-Signed-off-by: John Johansen <john.johansen@canonical.com>
-Signed-off-by: Sasha Levin <sashal@kernel.org>
----
- security/apparmor/policy_unpack_test.c | 13 ++++++-------
- 1 file changed, 6 insertions(+), 7 deletions(-)
-
-diff --git a/security/apparmor/policy_unpack_test.c b/security/apparmor/policy_unpack_test.c
-index 0a969b2e03dba..64ddea559f9ac 100644
---- a/security/apparmor/policy_unpack_test.c
-+++ b/security/apparmor/policy_unpack_test.c
-@@ -66,31 +66,30 @@ static struct aa_ext *build_aa_ext_struct(struct policy_unpack_fixture *puf,
-
- *buf = AA_NAME;
- *(buf + 1) = strlen(TEST_STRING_NAME) + 1;
-- strcpy(buf + 3, TEST_STRING_NAME);
-+ strscpy(buf + 3, TEST_STRING_NAME, e->end - (void *)(buf + 3));
-
- buf = e->start + TEST_STRING_BUF_OFFSET;
- *buf = AA_STRING;
- *(buf + 1) = strlen(TEST_STRING_DATA) + 1;
-- strcpy(buf + 3, TEST_STRING_DATA);
--
-+ strscpy(buf + 3, TEST_STRING_DATA, e->end - (void *)(buf + 3));
- buf = e->start + TEST_NAMED_U32_BUF_OFFSET;
- *buf = AA_NAME;
- *(buf + 1) = strlen(TEST_U32_NAME) + 1;
-- strcpy(buf + 3, TEST_U32_NAME);
-+ strscpy(buf + 3, TEST_U32_NAME, e->end - (void *)(buf + 3));
- *(buf + 3 + strlen(TEST_U32_NAME) + 1) = AA_U32;
- *((u32 *)(buf + 3 + strlen(TEST_U32_NAME) + 2)) = TEST_U32_DATA;
-
- buf = e->start + TEST_NAMED_U64_BUF_OFFSET;
- *buf = AA_NAME;
- *(buf + 1) = strlen(TEST_U64_NAME) + 1;
-- strcpy(buf + 3, TEST_U64_NAME);
-+ strscpy(buf + 3, TEST_U64_NAME, e->end - (void *)(buf + 3));
- *(buf + 3 + strlen(TEST_U64_NAME) + 1) = AA_U64;
- *((u64 *)(buf + 3 + strlen(TEST_U64_NAME) + 2)) = TEST_U64_DATA;
-
- buf = e->start + TEST_NAMED_BLOB_BUF_OFFSET;
- *buf = AA_NAME;
- *(buf + 1) = strlen(TEST_BLOB_NAME) + 1;
-- strcpy(buf + 3, TEST_BLOB_NAME);
-+ strscpy(buf + 3, TEST_BLOB_NAME, e->end - (void *)(buf + 3));
- *(buf + 3 + strlen(TEST_BLOB_NAME) + 1) = AA_BLOB;
- *(buf + 3 + strlen(TEST_BLOB_NAME) + 2) = TEST_BLOB_DATA_SIZE;
- memcpy(buf + 3 + strlen(TEST_BLOB_NAME) + 6,
-@@ -99,7 +98,7 @@ static struct aa_ext *build_aa_ext_struct(struct policy_unpack_fixture *puf,
- buf = e->start + TEST_NAMED_ARRAY_BUF_OFFSET;
- *buf = AA_NAME;
- *(buf + 1) = strlen(TEST_ARRAY_NAME) + 1;
-- strcpy(buf + 3, TEST_ARRAY_NAME);
-+ strscpy(buf + 3, TEST_ARRAY_NAME, e->end - (void *)(buf + 3));
- *(buf + 3 + strlen(TEST_ARRAY_NAME) + 1) = AA_ARRAY;
- *((u16 *)(buf + 3 + strlen(TEST_ARRAY_NAME) + 2)) = TEST_ARRAY_SIZE;
-
---
-2.40.1
-
alsa-hda-fix-a-possible-null-pointer-dereference-due.patch
alsa-hda-realtek-add-quirk-for-asus-rog-gx650p.patch
alsa-hda-realtek-add-quirk-for-asus-rog-ga402x.patch
-apparmor-fix-use-of-strcpy-in-policy_unpack_test.patch
alsa-hda-realtek-add-quirk-for-asus-rog-gz301v.patch
powerpc-kasan-disable-kcov-in-kasan-code.patch
bluetooth-mgmt-use-correct-address-for-memcpy.patch
+++ /dev/null
-From 711dd4ba0e42156e1a9a2673ac6a40733d19e760 Mon Sep 17 00:00:00 2001
-From: Sasha Levin <sashal@kernel.org>
-Date: Fri, 27 Jan 2023 20:12:19 +0000
-Subject: apparmor: fix use of strcpy in policy_unpack_test
-
-From: Rae Moar <rmoar@google.com>
-
-[ Upstream commit b54aebd4411134b525a82d663a26b2f135ecb7e8 ]
-
-Replace the use of strcpy() in build_aa_ext_struct() in
-policy_unpack_test.c with strscpy().
-
-strscpy() is the safer method to use to ensure the buffer does not
-overflow. This was found by kernel test robot:
-https://lore.kernel.org/all/202301040348.NbfVsXO0-lkp@intel.com/.
-
-Reported-by: kernel test robot <lkp@intel.com>
-
-Signed-off-by: Rae Moar <rmoar@google.com>
-Signed-off-by: John Johansen <john.johansen@canonical.com>
-Signed-off-by: Sasha Levin <sashal@kernel.org>
----
- security/apparmor/policy_unpack_test.c | 13 ++++++-------
- 1 file changed, 6 insertions(+), 7 deletions(-)
-
-diff --git a/security/apparmor/policy_unpack_test.c b/security/apparmor/policy_unpack_test.c
-index e1bfdab524b79..5c9bde25e56df 100644
---- a/security/apparmor/policy_unpack_test.c
-+++ b/security/apparmor/policy_unpack_test.c
-@@ -69,31 +69,30 @@ static struct aa_ext *build_aa_ext_struct(struct policy_unpack_fixture *puf,
-
- *buf = AA_NAME;
- *(buf + 1) = strlen(TEST_STRING_NAME) + 1;
-- strcpy(buf + 3, TEST_STRING_NAME);
-+ strscpy(buf + 3, TEST_STRING_NAME, e->end - (void *)(buf + 3));
-
- buf = e->start + TEST_STRING_BUF_OFFSET;
- *buf = AA_STRING;
- *(buf + 1) = strlen(TEST_STRING_DATA) + 1;
-- strcpy(buf + 3, TEST_STRING_DATA);
--
-+ strscpy(buf + 3, TEST_STRING_DATA, e->end - (void *)(buf + 3));
- buf = e->start + TEST_NAMED_U32_BUF_OFFSET;
- *buf = AA_NAME;
- *(buf + 1) = strlen(TEST_U32_NAME) + 1;
-- strcpy(buf + 3, TEST_U32_NAME);
-+ strscpy(buf + 3, TEST_U32_NAME, e->end - (void *)(buf + 3));
- *(buf + 3 + strlen(TEST_U32_NAME) + 1) = AA_U32;
- *((u32 *)(buf + 3 + strlen(TEST_U32_NAME) + 2)) = TEST_U32_DATA;
-
- buf = e->start + TEST_NAMED_U64_BUF_OFFSET;
- *buf = AA_NAME;
- *(buf + 1) = strlen(TEST_U64_NAME) + 1;
-- strcpy(buf + 3, TEST_U64_NAME);
-+ strscpy(buf + 3, TEST_U64_NAME, e->end - (void *)(buf + 3));
- *(buf + 3 + strlen(TEST_U64_NAME) + 1) = AA_U64;
- *((u64 *)(buf + 3 + strlen(TEST_U64_NAME) + 2)) = TEST_U64_DATA;
-
- buf = e->start + TEST_NAMED_BLOB_BUF_OFFSET;
- *buf = AA_NAME;
- *(buf + 1) = strlen(TEST_BLOB_NAME) + 1;
-- strcpy(buf + 3, TEST_BLOB_NAME);
-+ strscpy(buf + 3, TEST_BLOB_NAME, e->end - (void *)(buf + 3));
- *(buf + 3 + strlen(TEST_BLOB_NAME) + 1) = AA_BLOB;
- *(buf + 3 + strlen(TEST_BLOB_NAME) + 2) = TEST_BLOB_DATA_SIZE;
- memcpy(buf + 3 + strlen(TEST_BLOB_NAME) + 6,
-@@ -102,7 +101,7 @@ static struct aa_ext *build_aa_ext_struct(struct policy_unpack_fixture *puf,
- buf = e->start + TEST_NAMED_ARRAY_BUF_OFFSET;
- *buf = AA_NAME;
- *(buf + 1) = strlen(TEST_ARRAY_NAME) + 1;
-- strcpy(buf + 3, TEST_ARRAY_NAME);
-+ strscpy(buf + 3, TEST_ARRAY_NAME, e->end - (void *)(buf + 3));
- *(buf + 3 + strlen(TEST_ARRAY_NAME) + 1) = AA_ARRAY;
- *((u16 *)(buf + 3 + strlen(TEST_ARRAY_NAME) + 2)) = TEST_ARRAY_SIZE;
-
---
-2.40.1
-
alsa-hda-realtek-add-quirk-for-asus-rog-ga402x.patch
alsa-hda-realtek-amend-g634-quirk-to-enable-rear-spe.patch
alsa-hda-realtek-add-quirk-for-asus-rog-g614jx.patch
-apparmor-fix-use-of-strcpy-in-policy_unpack_test.patch
alsa-hda-realtek-add-quirk-for-asus-rog-gz301v.patch
powerpc-kasan-disable-kcov-in-kasan-code.patch
bluetooth-mgmt-use-correct-address-for-memcpy.patch