From patchwork Mon Jan 8 18:24:29 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Kees Cook X-Patchwork-Id: 13513838 Received: from mail-pg1-f170.google.com (mail-pg1-f170.google.com [209.85.215.170]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 157D254BD5 for ; Mon, 8 Jan 2024 18:24:30 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=chromium.org Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=chromium.org Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=chromium.org header.i=@chromium.org header.b="OXU1KPLe" Received: by mail-pg1-f170.google.com with SMTP id 41be03b00d2f7-5cd8667c59eso1546851a12.2 for ; Mon, 08 Jan 2024 10:24:30 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; t=1704738270; x=1705343070; darn=vger.kernel.org; h=content-disposition:mime-version:message-id:subject:cc:to:from:date :from:to:cc:subject:date:message-id:reply-to; bh=Wntsga8MBQJaWaP7YapLiJi+lAgkD8shAgSVOuCyoMM=; b=OXU1KPLenpFSZ8qZbqRCvsmamYmbQ4IH/jh+hS+o+5MMc/81whiR6lZRDKny6ltTQs +CiM2JB9dJFYX+hdQv7rWY4d2+YolfmyjuuG6si6Vg/8i3Lvjy1XAKSgYc9+cwdCV0FD RtbgQ8n/xnbTfz4PdxKBHhC/3d4NmrN7o+G/A= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704738270; x=1705343070; h=content-disposition:mime-version:message-id:subject:cc:to:from:date :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=Wntsga8MBQJaWaP7YapLiJi+lAgkD8shAgSVOuCyoMM=; b=R+dOiNxmcSffNQJ9ZWPzhRDLJwIYLNOhgZNtYMnfz085mhqxq0AQiCMLLHnLnVqj7Q Y8rKNajSeecnWnMXSpCDr+gumJpxy1h0i5t2Sl/YIVmAl/56/QgIcVQkPv/ASEkiDkCu +DSDmZAIV02HCFPjv19xcipdevcrA1v/DM8CLSLms5GqX6TJlmpGQAtyz3x85DyPd/zT wy88mbLkXa9pOAqF8TJWKRNc4h64A8ZMaoiTtIA0Em7ZuNp8piISrGE64VDlDLomJgHW 5Bg7XWpPnRInD78XoYuLVN4i/UmF8mB60p3XuwX6PqSnBqHmsX/T7hRMCaaoWdCE5GwZ UuJw== X-Gm-Message-State: AOJu0Yzou4/pMHI5HGokt8Q0Cy1HTmu/u2JOgmM+/qYLUsJXkXDrESqK iSLQ47ONgoJF4I824xUT01lh8EsRs9tw X-Google-Smtp-Source: AGHT+IH0a3ojzF5womZNmVLpf6U29HBSD1aeSujdsfiHNgTLeltOj+tIQc6pmhJ2ghoGWz8GO6zekQ== X-Received: by 2002:a05:6a20:7494:b0:199:6bb9:df5d with SMTP id p20-20020a056a20749400b001996bb9df5dmr5451336pzd.24.1704738270492; Mon, 08 Jan 2024 10:24:30 -0800 (PST) Received: from www.outflux.net (198-0-35-241-static.hfc.comcastbusiness.net. [198.0.35.241]) by smtp.gmail.com with ESMTPSA id n3-20020a635c43000000b005cdc081bd2asm170992pgm.24.2024.01.08.10.24.30 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 08 Jan 2024 10:24:30 -0800 (PST) Date: Mon, 8 Jan 2024 10:24:29 -0800 From: Kees Cook To: Linus Torvalds Cc: linux-kernel@vger.kernel.org, "Guilherme G. Piccoli" , Kees Cook , linux-hardening@vger.kernel.org, Matthias Brugger , Sergey Shtylyov , Tony Luck , Weichen Chen Subject: [GIT PULL] pstore updates for v6.8-rc1 Message-ID: <202401081022.31D251086@keescook> Precedence: bulk X-Mailing-List: linux-hardening@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Disposition: inline Hi Linus, Please pull these pstore updates for v6.8-rc1. These are a couple small fixes, and a refactoring to use cleanup.h now that it has had time to bake in a full release. Thanks! -Kees The following changes since commit 98b1cc82c4affc16f5598d4fa14b1858671b2263: Linux 6.7-rc2 (2023-11-19 15:02:14 -0800) are available in the Git repository at: https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git tags/pstore-v6.8-rc1 for you to fetch changes up to 24a0b5e196cf70ccff97bc0add6fa7178ad50cc4: pstore: inode: Use cleanup.h for struct pstore_private (2023-12-08 14:15:44 -0800) ---------------------------------------------------------------- pstore updates for v6.8-rc1 - Do not allow misconfigured ECC sizes (Sergey Shtylyov) - Allow for odd number of CPUs (Weichen Chen) - Refactor error handling to use cleanup.h ---------------------------------------------------------------- Kees Cook (4): pstore: inode: Convert kfree() usage to __free(kfree) pstore: inode: Convert mutex usage to guard(mutex) pstore: inode: Use __free(pstore_iput) for inode allocations pstore: inode: Use cleanup.h for struct pstore_private Sergey Shtylyov (1): pstore: ram_core: fix possible overflow in persistent_ram_init_ecc() Weichen Chen (1): pstore/ram: Fix crash when setting number of cpus to an odd number fs/pstore/inode.c | 109 +++++++++++++++++++++------------------------------ fs/pstore/ram.c | 1 + fs/pstore/ram_core.c | 2 +- 3 files changed, 46 insertions(+), 66 deletions(-)