[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20260122151842.4069702-1-pratyush@kernel.org>
Date: Thu, 22 Jan 2026 16:18:38 +0100
From: Pratyush Yadav <pratyush@...nel.org>
To: Hugh Dickins <hughd@...gle.com>,
Baolin Wang <baolin.wang@...ux.alibaba.com>,
Andrew Morton <akpm@...ux-foundation.org>,
Pasha Tatashin <pasha.tatashin@...een.com>,
Mike Rapoport <rppt@...nel.org>,
Pratyush Yadav <pratyush@...nel.org>
Cc: linux-mm@...ck.org,
linux-kernel@...r.kernel.org
Subject: [PATCH 0/3] mm: memfd_luo hotfixes
From: "Pratyush Yadav (Google)" <pratyush@...nel.org>
Hi,
This series contains a couple of fixes for memfd preservation using LUO.
Patch 1 is a preparatory patch for patch 2. Patch 2 sets up the right
flags on the file and makes sure security hooks are called. Patch 3
fixes a small memory leak in the error path.
Andrew, it would be great if we can land these in v6.19, especially
patches 1 and 2 since they fix a usability and a security problem. Patch
3 can wait, but then it is pretty simple too. Anyway, since it is pretty
late in the cycle, I'll leave it to your judgement.
Regards,
Pratyush Yadav
Pratyush Yadav (Google) (3):
memfd: export alloc_file()
mm: memfd_luo: use memfd_alloc_file() instead of shmem_file_setup()
mm: memfd_luo: restore and free memfd_luo_ser on failure
include/linux/memfd.h | 6 ++++++
mm/memfd.c | 4 ++--
mm/memfd_luo.c | 10 ++++++----
3 files changed, 14 insertions(+), 6 deletions(-)
base-commit: 1ac8a55c76e78fc4fc406fd7bd872d0127d04feb
--
2.52.0.457.g6b5491de43-goog
Powered by blists - more mailing lists