mbox series

[GIT,PULL] fsverity updates for 6.2

Message ID Y5ayo48TtNrPgU9D@sol.localdomain (mailing list archive)
State New, archived
Headers show
Series [GIT,PULL] fsverity updates for 6.2 | expand

Pull-request

https://git.kernel.org/pub/scm/fs/fscrypt/fscrypt.git tags/fsverity-for-linus

Message

Eric Biggers Dec. 12, 2022, 4:48 a.m. UTC
The following changes since commit f0c4d9fc9cc9462659728d168387191387e903cc:

  Linux 6.1-rc4 (2022-11-06 15:07:11 -0800)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/fs/fscrypt/fscrypt.git tags/fsverity-for-linus

for you to fetch changes up to a4bbf53d88c728da9ff6c316b1e4ded63a8f3940:

  fsverity: simplify fsverity_get_digest() (2022-11-29 21:07:41 -0800)

----------------------------------------------------------------

The main change this cycle is to stop using the PG_error flag to track
verity failures, and instead just track failures at the bio level.  This
follows a similar fscrypt change that went into 6.1, and it is a step
towards freeing up PG_error for other uses.

There's also one other small cleanup.

----------------------------------------------------------------
Eric Biggers (2):
      fsverity: stop using PG_error to track error status
      fsverity: simplify fsverity_get_digest()

 fs/ext4/readpage.c           |  8 ++----
 fs/f2fs/compress.c           | 64 +++++++++++++++++++++-----------------------
 fs/f2fs/data.c               | 53 ++++++++++++++++++++++--------------
 fs/verity/fsverity_private.h |  5 ++++
 fs/verity/hash_algs.c        |  6 +++++
 fs/verity/measure.c          | 19 ++-----------
 fs/verity/verify.c           | 12 ++++-----
 7 files changed, 85 insertions(+), 82 deletions(-)

Comments

pr-tracker-bot@kernel.org Dec. 13, 2022, 5 a.m. UTC | #1
The pull request you sent on Sun, 11 Dec 2022 20:48:35 -0800:

> https://git.kernel.org/pub/scm/fs/fscrypt/fscrypt.git tags/fsverity-for-linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/ad0d9da164cb52e62637e427517b2060dc956a2d

Thank you!