[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAJZ5v0j4Df7055nA_niXzhonrE2QebyQFzEFY5FVYb=M5F1B2Q@mail.gmail.com>
Date: Thu, 21 Aug 2025 21:11:43 +0200
From: "Rafael J. Wysocki" <rafael@...nel.org>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: ACPI Devel Maling List <linux-acpi@...r.kernel.org>,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] ACPI fixes for v6.17-rc3
Hi Linus,
Please pull from the tag
git://git.kernel.org/pub/scm/linux/kernel/git/rafael/linux-pm.git \
acpi-6.17-rc3
with top-most commit 670b51121ed09ff3a41539243407e4bd52eea9f4
Merge branches 'acpi-apei' and 'acpi-pfrut'
on top of commit c17b750b3ad9f45f2b6f7e6f7f4679844244f0b9
Linux 6.17-rc2
to receive ACPI fixes for 6.17-rc3.
These fix three new issues in the ACPI APEI error injection code and
an ACPI platform firmware runtime update interface issue:
- Make ACPI APEI error injection check the version of the request when
mapping the EINJ parameter structure in the BIOS reserved memory to
prevent injecting errors based on an uninitialized field (Tony Luck)
- Fix potential NULL dereference in __einj_error_inject() that may
occur when memory allocation fails (Charles Han)
- Remove the __exit annotation from einj_remove(), so it can be called
on errors during faux device probe (Uwe Kleine-König)
- Use a security-version-number check instead of a runtime version
check during ACPI platform firmware runtime driver updates to prevent
those updates from failing due to false-positive driver version check
failures (Chen Yu)
Thanks!
---------------
Charles Han (1):
ACPI: APEI: EINJ: fix potential NULL dereference in __einj_error_inject()
Chen Yu (1):
ACPI: pfr_update: Fix the driver update version check
Tony Luck (1):
ACPI: APEI: EINJ: Check if user asked for EINJV2 injection
Uwe Kleine-König (1):
ACPI: APEI: EINJ: Fix resource leak by remove callback in .exit.text
---------------
drivers/acpi/apei/einj-core.c | 17 +++++++----------
drivers/acpi/pfr_update.c | 2 +-
include/uapi/linux/pfrut.h | 1 +
3 files changed, 9 insertions(+), 11 deletions(-)
Powered by blists - more mailing lists