1. 26 Jun, 2023 10 commits
    • Linus Torvalds's avatar
      Merge tag 'nfsd-6.5' of git://git.kernel.org/pub/scm/linux/kernel/git/cel/linux · f7976a64
      Linus Torvalds authored
      Pull nfsd updates from Chuck Lever:
      
       - Clean-ups in the READ path in anticipation of MSG_SPLICE_PAGES
      
       - Better NUMA awareness when allocating pages and other objects
      
       - A number of minor clean-ups to XDR encoding
      
       - Elimination of a race when accepting a TCP socket
      
       - Numerous observability enhancements
      
      * tag 'nfsd-6.5' of git://git.kernel.org/pub/scm/linux/kernel/git/cel/linux: (46 commits)
        nfsd: remove redundant assignments to variable len
        svcrdma: Fix stale comment
        NFSD: Distinguish per-net namespace initialization
        nfsd: move init of percpu reply_cache_stats counters back to nfsd_init_net
        SUNRPC: Address RCU warning in net/sunrpc/svc.c
        SUNRPC: Use sysfs_emit in place of strlcpy/sprintf
        SUNRPC: Remove transport class dprintk call sites
        SUNRPC: Fix comments for transport class registration
        svcrdma: Remove an unused argument from __svc_rdma_put_rw_ctxt()
        svcrdma: trace cc_release calls
        svcrdma: Convert "might sleep" comment into a code annotation
        NFSD: Add an nfsd4_encode_nfstime4() helper
        SUNRPC: Move initialization of rq_stime
        SUNRPC: Optimize page release in svc_rdma_sendto()
        svcrdma: Prevent page release when nothing was received
        svcrdma: Revert 2a1e4f21 ("svcrdma: Normalize Send page handling")
        SUNRPC: Revert 57990067 ("svcrdma: Remove unused sc_pages field")
        SUNRPC: Revert cc93ce95 ("svcrdma: Retain the page backing rq_res.head[0].iov_base")
        NFSD: add encoding of op_recall flag for write delegation
        NFSD: Add "official" reviewers for this subsystem
        ...
      f7976a64
    • Linus Torvalds's avatar
      Merge tag 'v6.5/vfs.mount' of git://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs · c0a572d9
      Linus Torvalds authored
      Pull vfs mount updates from Christian Brauner:
       "This contains the work to extend move_mount() to allow adding a mount
        beneath the topmost mount of a mount stack.
      
        There are two LWN articles about this. One covers the original patch
        series in [1]. The other in [2] summarizes the session and roughly the
        discussion between Al and me at LSFMM. The second article also goes
        into some good questions from attendees.
      
        Since all details are found in the relevant commit with a technical
        dive into semantics and locking at the end I'm only adding the
        motivation and core functionality for this from commit message and
        leave out the invasive details. The code is also heavily commented and
        annotated as well which was explicitly requested.
      
        TL;DR:
      
          > mount -t ext4 /dev/sda /mnt
            |
            └─/mnt    /dev/sda    ext4
      
          > mount --beneath -t xfs /dev/sdb /mnt
            |
            └─/mnt    /dev/sdb    xfs
              └─/mnt  /dev/sda    ext4
      
          > umount /mnt
            |
            └─/mnt    /dev/sdb    xfs
      
        The longer motivation is that various distributions are adding or are
        in the process of adding support for system extensions and in the
        future configuration extensions through various tools. A more detailed
        explanation on system and configuration extensions can be found on the
        manpage which is listed below at [3].
      
        System extension images may – dynamically at runtime — extend the
        /usr/ and /opt/ directory hierarchies with additional files. This is
        particularly useful on immutable system images where a /usr/ and/or
        /opt/ hierarchy residing on a read-only file system shall be extended
        temporarily at runtime without making any persistent modifications.
      
        When one or more system extension images are activated, their /usr/
        and /opt/ hierarchies are combined via overlayfs with the same
        hierarchies of the host OS, and the host /usr/ and /opt/ overmounted
        with it ("merging"). When they are deactivated, the mount point is
        disassembled — again revealing the unmodified original host version of
        the hierarchy ("unmerging"). Merging thus makes the extension's
        resources suddenly appear below the /usr/ and /opt/ hierarchies as if
        they were included in the base OS image itself. Unmerging makes them
        disappear again, leaving in place only the files that were shipped
        with the base OS image itself.
      
        System configuration images are similar but operate on directories
        containing system or service configuration.
      
        On nearly all modern distributions mount propagation plays a crucial
        role and the rootfs of the OS is a shared mount in a peer group
        (usually with peer group id 1):
      
           TARGET  SOURCE  FSTYPE  PROPAGATION  MNT_ID  PARENT_ID
           /       /       ext4    shared:1     29      1
      
        On such systems all services and containers run in a separate mount
        namespace and are pivot_root()ed into their rootfs. A separate mount
        namespace is almost always used as it is the minimal isolation
        mechanism services have. But usually they are even much more isolated
        up to the point where they almost become indistinguishable from
        containers.
      
        Mount propagation again plays a crucial role here. The rootfs of all
        these services is a slave mount to the peer group of the host rootfs.
        This is done so the service will receive mount propagation events from
        the host when certain files or directories are updated.
      
        In addition, the rootfs of each service, container, and sandbox is
        also a shared mount in its separate peer group:
      
           TARGET  SOURCE  FSTYPE  PROPAGATION         MNT_ID  PARENT_ID
           /       /       ext4    shared:24 master:1  71      47
      
        For people not too familiar with mount propagation, the master:1 means
        that this is a slave mount to peer group 1. Which as one can see is
        the host rootfs as indicated by shared:1 above. The shared:24
        indicates that the service rootfs is a shared mount in a separate peer
        group with peer group id 24.
      
        A service may run other services. Such nested services will also have
        a rootfs mount that is a slave to the peer group of the outer service
        rootfs mount.
      
        For containers things are just slighly different. A container's rootfs
        isn't a slave to the service's or host rootfs' peer group. The rootfs
        mount of a container is simply a shared mount in its own peer group:
      
           TARGET                    SOURCE  FSTYPE  PROPAGATION  MNT_ID  PARENT_ID
           /home/ubuntu/debian-tree  /       ext4    shared:99    61      60
      
        So whereas services are isolated OS components a container is treated
        like a separate world and mount propagation into it is restricted to a
        single well known mount that is a slave to the peer group of the
        shared mount /run on the host:
      
           TARGET                  SOURCE              FSTYPE  PROPAGATION  MNT_ID  PARENT_ID
           /propagate/debian-tree  /run/host/incoming  tmpfs   master:5     71      68
      
        Here, the master:5 indicates that this mount is a slave to the peer
        group with peer group id 5. This allows to propagate mounts into the
        container and served as a workaround for not being able to insert
        mounts into mount namespaces directly. But the new mount api does
        support inserting mounts directly. For the interested reader the
        blogpost in [4] might be worth reading where I explain the old and the
        new approach to inserting mounts into mount namespaces.
      
        Containers of course, can themselves be run as services. They often
        run full systems themselves which means they again run services and
        containers with the exact same propagation settings explained above.
      
        The whole system is designed so that it can be easily updated,
        including all services in various fine-grained ways without having to
        enter every single service's mount namespace which would be
        prohibitively expensive. The mount propagation layout has been
        carefully chosen so it is possible to propagate updates for system
        extensions and configurations from the host into all services.
      
        The simplest model to update the whole system is to mount on top of
        /usr, /opt, or /etc on the host. The new mount on /usr, /opt, or /etc
        will then propagate into every service. This works cleanly the first
        time. However, when the system is updated multiple times it becomes
        necessary to unmount the first update on /opt, /usr, /etc and then
        propagate the new update. But this means, there's an interval where
        the old base system is accessible. This has to be avoided to protect
        against downgrade attacks.
      
        The vfs already exposes a mechanism to userspace whereby mounts can be
        mounted beneath an existing mount. Such mounts are internally referred
        to as "tucked". The patch series exposes the ability to mount beneath
        a top mount through the new MOVE_MOUNT_BENEATH flag for the
        move_mount() system call. This allows userspace to seamlessly upgrade
        mounts. After this series the only thing that will have changed is
        that mounting beneath an existing mount can be done explicitly instead
        of just implicitly.
      
        The crux is that the proposed mechanism already exists and that it is
        so powerful as to cover cases where mounts are supposed to be updated
        with new versions. Crucially, it offers an important flexibility.
        Namely that updates to a system may either be forced or can be delayed
        and the umount of the top mount be left to a service if it is a
        cooperative one"
      
      Link: https://lwn.net/Articles/927491 [1]
      Link: https://lwn.net/Articles/934094 [2]
      Link: https://man7.org/linux/man-pages/man8/systemd-sysext.8.html [3]
      Link: https://brauner.io/2023/02/28/mounting-into-mount-namespaces.html [4]
      Link: https://github.com/flatcar/sysext-bakery
      Link: https://fedoraproject.org/wiki/Changes/Unified_Kernel_Support_Phase_1
      Link: https://fedoraproject.org/wiki/Changes/Unified_Kernel_Support_Phase_2
      Link: https://github.com/systemd/systemd/pull/26013
      
      * tag 'v6.5/vfs.mount' of git://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs:
        fs: allow to mount beneath top mount
        fs: use a for loop when locking a mount
        fs: properly document __lookup_mnt()
        fs: add path_mounted()
      c0a572d9
    • Linus Torvalds's avatar
      Merge tag 'v6.5/vfs.file' of git://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs · 1f2300a7
      Linus Torvalds authored
      Pull vfs file handling updates from Christian Brauner:
       "This contains Amir's work to fix a long-standing problem where an
        unprivileged overlayfs mount can be used to avoid fanotify permission
        events that were requested for an inode or superblock on the
        underlying filesystem.
      
        Some background about files opened in overlayfs. If a file is opened
        in overlayfs @file->f_path will refer to a "fake" path. What this
        means is that while @file->f_inode will refer to inode of the
        underlying layer, @file->f_path refers to an overlayfs
        {dentry,vfsmount} pair. The reasons for doing this are out of scope
        here but it is the reason why the vfs has been providing the
        open_with_fake_path() helper for overlayfs for very long time now. So
        nothing new here.
      
        This is for sure not very elegant and everyone including the overlayfs
        maintainers agree. Improving this significantly would involve more
        fragile and potentially rather invasive changes.
      
        In various codepaths access to the path of the underlying filesystem
        is needed for such hybrid file. The best example is fsnotify where
        this becomes security relevant. Passing the overlayfs
        @file->f_path->dentry will cause fsnotify to skip generating fsnotify
        events registered on the underlying inode or superblock.
      
        To fix this we extend the vfs provided open_with_fake_path() concept
        for overlayfs to create a backing file container that holds the real
        path and to expose a helper that can be used by relevant callers to
        get access to the path of the underlying filesystem through the new
        file_real_path() helper. This pattern is similar to what we do in
        d_real() and d_real_inode().
      
        The first beneficiary is fsnotify and fixes the security sensitive
        problem mentioned above.
      
        There's a couple of nice cleanups included as well.
      
        Over time, the old open_with_fake_path() helper added specifically for
        overlayfs a long time ago started to get used in other places such as
        cachefiles. Even though cachefiles have nothing to do with hybrid
        files.
      
        The only reason cachefiles used that concept was that files opened
        with open_with_fake_path() aren't charged against the caller's open
        file limit by raising FMODE_NOACCOUNT. It's just mere coincidence that
        both overlayfs and cachefiles need to ensure to not overcharge the
        caller for their internal open calls.
      
        So this work disentangles FMODE_NOACCOUNT use cases and backing file
        use-cases by adding the FMODE_BACKING flag which indicates that the
        file can be used to retrieve the backing file of another filesystem.
        (Fyi, Jens will be sending you a really nice cleanup from Christoph
        that gets rid of 3 FMODE_* flags otherwise this would be the last
        fmode_t bit we'd be using.)
      
        So now overlayfs becomes the sole user of the renamed
        open_with_fake_path() helper which is now named backing_file_open().
        For internal kernel users such as cachefiles that are only interested
        in FMODE_NOACCOUNT but not in FMODE_BACKING we add a new
        kernel_file_open() helper which opens a file without being charged
        against the caller's open file limit. All new helpers are properly
        documented and clearly annotated to mention their special uses.
      
        We also rename vfs_tmpfile_open() to kernel_tmpfile_open() to clearly
        distinguish it from vfs_tmpfile() and align it the other kernel_*()
        internal helpers"
      
      * tag 'v6.5/vfs.file' of git://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs:
        ovl: enable fsnotify events on underlying real files
        fs: use backing_file container for internal files with "fake" f_path
        fs: move kmem_cache_zalloc() into alloc_empty_file*() helpers
        fs: use a helper for opening kernel internal files
        fs: rename {vfs,kernel}_tmpfile_open()
      1f2300a7
    • Linus Torvalds's avatar
      Merge tag 'v6.5/vfs.rename.locking' of git://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs · 2eedfa9e
      Linus Torvalds authored
      Pull vfs rename locking updates from Christian Brauner:
       "This contains the work from Jan to fix problems with cross-directory
        renames originally reported in [1].
      
        To quickly sum it up some filesystems (so far we know at least about
        ext4, udf, f2fs, ocfs2, likely also reiserfs, gfs2 and others) need to
        lock the directory when it is being renamed into another directory.
      
        This is because we need to update the parent pointer in the directory
        in that case and if that races with other operations on the directory,
        in particular a conversion from one directory format into another, bad
        things can happen.
      
        So far we've done the locking in the filesystem code but recently
        Darrick pointed out in [2] that the RENAME_EXCHANGE case was missing.
        That one is particularly nasty because RENAME_EXCHANGE can arbitrarily
        mix regular files and directories and proper lock ordering is not
        achievable in the filesystems alone.
      
        This patch set adds locking into vfs_rename() so that not only parent
        directories but also moved inodes, regardless of whether they are
        directories or not, are locked when calling into the filesystem.
      
        This means establishing a locking order for unrelated directories. New
        helpers are added for this purpose and our documentation is updated to
        cover this in detail.
      
        The locking is now actually easier to follow as we now always lock
        source and target. We've always locked the target independent of
        whether it was a directory or file and we've always locked source if
        it was a regular file. The exact details for why this came about can
        be found in [3] and [4]"
      
      Link: https://lore.kernel.org/all/20230117123735.un7wbamlbdihninm@quack3 [1]
      Link: https://lore.kernel.org/all/20230517045836.GA11594@frogsfrogsfrogs [2]
      Link: https://lore.kernel.org/all/20230526-schrebergarten-vortag-9cd89694517e@brauner [3]
      Link: https://lore.kernel.org/all/20230530-seenotrettung-allrad-44f4b00139d4@brauner [4]
      
      * tag 'v6.5/vfs.rename.locking' of git://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs:
        fs: Restrict lock_two_nondirectories() to non-directory inodes
        fs: Lock moved directories
        fs: Establish locking order for unrelated directories
        Revert "f2fs: fix potential corruption when moving a directory"
        Revert "udf: Protect rename against modification of moved directory"
        ext4: Remove ext4 locking of moved directory
      2eedfa9e
    • Linus Torvalds's avatar
      Merge tag 'v6.5/vfs.misc' of git://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs · 64bf6ae9
      Linus Torvalds authored
      Pull misc vfs updates from Christian Brauner:
       "Miscellaneous features, cleanups, and fixes for vfs and individual fs
      
        Features:
      
         - Use mode 0600 for file created by cachefilesd so it can be run by
           unprivileged users. This aligns them with directories which are
           already created with mode 0700 by cachefilesd
      
         - Reorder a few members in struct file to prevent some false sharing
           scenarios
      
         - Indicate that an eventfd is used a semaphore in the eventfd's
           fdinfo procfs file
      
         - Add a missing uapi header for eventfd exposing relevant uapi
           defines
      
         - Let the VFS protect transitions of a superblock from read-only to
           read-write in addition to the protection it already provides for
           transitions from read-write to read-only. Protecting read-only to
           read-write transitions allows filesystems such as ext4 to perform
           internal writes, keeping writers away until the transition is
           completed
      
        Cleanups:
      
         - Arnd removed the architecture specific arch_report_meminfo()
           prototypes and added a generic one into procfs.h. Note, we got a
           report about a warning in amdpgpu codepaths that suggested this was
           bisectable to this change but we concluded it was a false positive
      
         - Remove unused parameters from split_fs_names()
      
         - Rename put_and_unmap_page() to unmap_and_put_page() to let the name
           reflect the order of the cleanup operation that has to unmap before
           the actual put
      
         - Unexport buffer_check_dirty_writeback() as it is not used outside
           of block device aops
      
         - Stop allocating aio rings from highmem
      
         - Protecting read-{only,write} transitions in the VFS used open-coded
           barriers in various places. Replace them with proper little helpers
           and document both the helpers and all barrier interactions involved
           when transitioning between read-{only,write} states
      
         - Use flexible array members in old readdir codepaths
      
        Fixes:
      
         - Use the correct type __poll_t for epoll and eventfd
      
         - Replace all deprecated strlcpy() invocations, whose return value
           isn't checked with an equivalent strscpy() call
      
         - Fix some kernel-doc warnings in fs/open.c
      
         - Reduce the stack usage in jffs2's xattr codepaths finally getting
           rid of this: fs/jffs2/xattr.c:887:1: error: the frame size of 1088
           bytes is larger than 1024 bytes [-Werror=frame-larger-than=]
           royally annoying compilation warning
      
         - Use __FMODE_NONOTIFY instead of FMODE_NONOTIFY where an int and not
           fmode_t is required to avoid fmode_t to integer degradation
           warnings
      
         - Create coredumps with O_WRONLY instead of O_RDWR. There's a long
           explanation in that commit how O_RDWR is actually a bug which we
           found out with the help of Linus and git archeology
      
         - Fix "no previous prototype" warnings in the pipe codepaths
      
         - Add overflow calculations for remap_verify_area() as a signed
           addition overflow could be triggered in xfstests
      
         - Fix a null pointer dereference in sysv
      
         - Use an unsigned variable for length calculations in jfs avoiding
           compilation warnings with gcc 13
      
         - Fix a dangling pipe pointer in the watch queue codepath
      
         - The legacy mount option parser provided as a fallback by the VFS
           for filesystems not yet converted to the new mount api did prefix
           the generated mount option string with a leading ',' causing issues
           for some filesystems
      
         - Fix a repeated word in a comment in fs.h
      
         - autofs: Update the ctime when mtime is updated as mandated by
           POSIX"
      
      * tag 'v6.5/vfs.misc' of git://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs: (27 commits)
        readdir: Replace one-element arrays with flexible-array members
        fs: Provide helpers for manipulating sb->s_readonly_remount
        fs: Protect reconfiguration of sb read-write from racing writes
        eventfd: add a uapi header for eventfd userspace APIs
        autofs: set ctime as well when mtime changes on a dir
        eventfd: show the EFD_SEMAPHORE flag in fdinfo
        fs/aio: Stop allocating aio rings from HIGHMEM
        fs: Fix comment typo
        fs: unexport buffer_check_dirty_writeback
        fs: avoid empty option when generating legacy mount string
        watch_queue: prevent dangling pipe pointer
        fs.h: Optimize file struct to prevent false sharing
        highmem: Rename put_and_unmap_page() to unmap_and_put_page()
        cachefiles: Allow the cache to be non-root
        init: remove unused names parameter in split_fs_names()
        jfs: Use unsigned variable for length calculations
        fs/sysv: Null check to prevent null-ptr-deref bug
        fs: use UB-safe check for signed addition overflow in remap_verify_area
        procfs: consolidate arch_report_meminfo declaration
        fs: pipe: reveal missing function protoypes
        ...
      64bf6ae9
    • Linus Torvalds's avatar
      Merge tag 'v6.5/fs.ntfs' of git://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs · 5c1c88cd
      Linus Torvalds authored
      Pull ntfs updates from Christian Brauner:
       "A pile of various smaller fixes for ntfs"
      
      * tag 'v6.5/fs.ntfs' of git://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs:
        ntfs: do not dereference a null ctx on error
        ntfs: Remove unneeded semicolon
        ntfs: Correct spelling
        ntfs: remove redundant initialization to pointer cb_sb_start
      5c1c88cd
    • Linus Torvalds's avatar
      Merge tag 'auxdisplay-6.5' of https://github.com/ojeda/linux · 1f268d6d
      Linus Torvalds authored
      Pull auxdisplay update from Miguel Ojeda:
       "A single cleanup for i2c drivers to switch them back to use
        '.probe()'"
      
      * tag 'auxdisplay-6.5' of https://github.com/ojeda/linux:
        auxdisplay: Switch i2c drivers back to use .probe()
      1f268d6d
    • Linus Torvalds's avatar
      Merge tag 'rust-6.5' of https://github.com/Rust-for-Linux/linux · a1257b5e
      Linus Torvalds authored
      Pull rust updates from Miguel Ojeda:
       "A fairly small one in terms of feature additions. Most of the changes
        in terms of lines come from the upgrade to the new version of the
        toolchain (which in turn is big due to the vendored 'alloc' crate).
      
        Upgrade to Rust 1.68.2:
      
         - This is the first such upgrade, and we will try to update it often
           from now on, in order to remain close to the latest release, until
           a minimum version (which is "in the future") can be established.
      
           The upgrade brings the stabilization of 4 features we used (and 2
           more that we used in our old 'rust' branch).
      
           Commit 3ed03f4d ("rust: upgrade to Rust 1.68.2") contains the
           details and rationale.
      
        pin-init API:
      
         - Several internal improvements and fixes to the pin-init API, e.g.
           allowing to use 'Self' in a struct definition with '#[pin_data]'.
      
        'error' module:
      
         - New 'name()' method for the 'Error' type (with 'errname()'
           integration), used to implement the 'Debug' trait for 'Error'.
      
         - Add error codes from 'include/linux/errno.h' to the list of Rust
           'Error' constants.
      
         - Allow specifying error type on the 'Result' type (with the default
           still being our usual 'Error' type).
      
        'str' module:
      
         - 'TryFrom' implementation for 'CStr', and new 'to_cstring()' method
           based on it.
      
        'sync' module:
      
         - Implement 'AsRef' trait for 'Arc', allowing to use 'Arc' in code
           that is generic over smart pointer types.
      
         - Add 'ptr_eq' method to 'Arc' for easier, less error prone
           comparison between two 'Arc' pointers.
      
         - Reword the 'Send' safety comment for 'Arc', and avoid referencing
           it from the 'Sync' one.
      
        'task' module:
      
         - Implement 'Send' marker for 'Task'.
      
        'types' module:
      
         - Implement 'Send' and 'Sync' markers for 'ARef<T>' when 'T' is
           'AlwaysRefCounted', 'Send' and 'Sync'.
      
        Other changes:
      
         - Documentation improvements and '.gitattributes' change to start
           using the Rust diff driver"
      
      * tag 'rust-6.5' of https://github.com/Rust-for-Linux/linux:
        rust: error: `impl Debug` for `Error` with `errname()` integration
        rust: task: add `Send` marker to `Task`
        rust: specify when `ARef` is thread safe
        rust: sync: reword the `Arc` safety comment for `Sync`
        rust: sync: reword the `Arc` safety comment for `Send`
        rust: sync: implement `AsRef<T>` for `Arc<T>`
        rust: sync: add `Arc::ptr_eq`
        rust: error: add missing error codes
        rust: str: add conversion from `CStr` to `CString`
        rust: error: allow specifying error type on `Result`
        rust: init: update macro expansion example in docs
        rust: macros: replace Self with the concrete type in #[pin_data]
        rust: macros: refactor generics parsing of `#[pin_data]` into its own function
        rust: macros: fix usage of `#[allow]` in `quote!`
        docs: rust: point directly to the standalone installers
        .gitattributes: set diff driver for Rust source code files
        rust: upgrade to Rust 1.68.2
        rust: arc: fix intra-doc link in `Arc<T>::init`
        rust: alloc: clarify what is the upstream version
      a1257b5e
    • Linus Torvalds's avatar
      Merge tag 's390-6.4-4' of git://git.kernel.org/pub/scm/linux/kernel/git/s390/linux · 9d9a9bf0
      Linus Torvalds authored
      Pull s390 updates from Alexander Gordeev:
      
       - Use correct type for size of memory allocated for ELF core header on
         kernel crash.
      
       - Fix insecure W+X mapping warning when KASAN shadow memory range is
         not aligned on page boundary.
      
       - Avoid allocation of short by one page KASAN shadow memory when the
         original memory range is less than (PAGE_SIZE << 3).
      
       - Fix virtual vs physical address confusion in physical memory
         enumerator. It is not a real issue, since virtual and physical
         addresses are currently the same.
      
       - Set CONFIG_NET_TC_SKB_EXT=y in s390 config files as it is required
         for offloading TC as well as bridges on switchdev capable ConnectX
         devices.
      
      * tag 's390-6.4-4' of git://git.kernel.org/pub/scm/linux/kernel/git/s390/linux:
        s390/defconfigs: set CONFIG_NET_TC_SKB_EXT=y
        s390/boot: fix physmem_info virtual vs physical address confusion
        s390/kasan: avoid short by one page shadow memory
        s390/kasan: fix insecure W+X mapping warning
        s390/crash: use the correct type for memory allocation
      9d9a9bf0
    • Linus Torvalds's avatar
      Merge tag 'nios2_updates_for_v6.5' of git://git.kernel.org/pub/scm/linux/kernel/git/dinguyen/linux · be5b52dc
      Linus Torvalds authored
      Pull nios2 updates from Dinh Nguyen:
      
       - Convert pgtable constructor/destructors to ptdesc
      
       - Replace strlcpy with strscpy
      
      * tag 'nios2_updates_for_v6.5' of git://git.kernel.org/pub/scm/linux/kernel/git/dinguyen/linux:
        nios2: Replace all non-returning strlcpy with strscpy
        nios2: Convert __pte_free_tlb() to use ptdescs
      be5b52dc
  2. 25 Jun, 2023 5 commits
  3. 23 Jun, 2023 21 commits
  4. 22 Jun, 2023 4 commits