lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 26 Dec 2023 14:28:01 +0100
From: Uwe Kleine-König <u.kleine-koenig@...gutronix.de>
To: Dov Murik <dovmurik@...ux.ibm.com>,
	Ard Biesheuvel <ardb@...nel.org>,
	Dan Williams <dan.j.williams@...el.com>,
	"Borislav Petkov (AMD)" <bp@...en8.de>,
	Tom Lendacky <thomas.lendacky@....com>,
	Dionna Glaze <dionnaglaze@...gle.com>
Cc: kernel@...gutronix.de,
	Gerd Hoffmann <kraxel@...hat.com>,
	linux-kernel@...r.kernel.org
Subject: [PATCH 0/2] virt: Convert to platform remove callback returning void

Hello,

this series converts the two platform drivers below drivers/virt that
make use of .remove() to use .remove_new() instead.

See commit 5c5a7680e67b ("platform: Provide a remove callback that
returns no value") for an extended explanation and the eventual goal.
The TL;DR; is to make it harder for driver authors to leak resources
without noticing. The drivers here get it right though and so can be
converted trivially.

This is merge window material. There doesn't seem to be a maintainer for
all of drivers/virt and I don't know how patch application works there
usally. The two patches are independent of each other so they can be
applied individually if necessary.

Best regards
Uwe

Uwe Kleine-König (2):
  virt: efi_secret: Convert to platform remove callback returning void
  virt: sev-guest: Convert to platform remove callback returning void

 drivers/virt/coco/efi_secret/efi_secret.c | 5 ++---
 drivers/virt/coco/sev-guest/sev-guest.c   | 6 ++----
 2 files changed, 4 insertions(+), 7 deletions(-)

base-commit: b85ea95d086471afb4ad062012a4d73cd328fa86
-- 
2.43.0


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ