lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 8 Feb 2019 09:39:04 +0100
From:   Greg KH <gregkh@...uxfoundation.org>
To:     Linus Torvalds <torvalds@...ux-foundation.org>,
        Andrew Morton <akpm@...ux-foundation.org>
Cc:     linux-kernel@...r.kernel.org
Subject: [GIT PULL] Driver core fixes for 5.0-rc6

The following changes since commit 1c7fc5cbc33980acd13d668f1c8f0313d6ae9fd8:

  Linux 5.0-rc2 (2019-01-14 10:41:12 +1200)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/driver-core.git tags/driver-core-5.0-rc6

for you to fetch changes up to 36991ca68db9dd43bac7f3519f080ee3939263ef:

  blk-mq: protect debugfs_create_files() from failures (2019-01-31 14:07:59 +0100)

----------------------------------------------------------------
Driver core fixes for 5.0-rc6

Here are some driver core fixes for 5.0-rc6.

Well, not so much "driver core" as "debugfs".  There's a lot of
outstanding debugfs cleanup patches coming in through different
subsystem trees, and in that process the debugfs core was found that it
really should return errors when something bad happens, to prevent
random files from showing up in the root of debugfs afterward.  So
debugfs was fixed up to handle this properly, and then two fixes for
the relay and blk-mq code was needed as it was making invalid
assumptions about debugfs return values.

There's also a cacheinfo fix in here that resolves a tiny issue.

All of these have been in linux-next for over a week with no reported
problems.

Signed-off-by: Greg Kroah-Hartman <gregkh@...uxfoundation.org>

----------------------------------------------------------------
Greg Kroah-Hartman (5):
      debugfs: fix debugfs_rename parameter checking
      debugfs: return error values, not NULL
      debugfs: debugfs_lookup() should return NULL if not found
      relay: check return of create_buf_file() properly
      blk-mq: protect debugfs_create_files() from failures

Huacai Chen (1):
      cacheinfo: Keep the old value if of_property_read_u32 fails

 block/blk-mq-debugfs.c   |  3 +++
 drivers/base/cacheinfo.c |  6 ++----
 fs/debugfs/inode.c       | 36 ++++++++++++++++++++++++------------
 kernel/relay.c           |  4 +++-
 4 files changed, 32 insertions(+), 17 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ