Received: by 2002:a05:6a10:a852:0:0:0:0 with SMTP id d18csp965500pxy; Wed, 5 May 2021 19:32:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyqneCF4/6St//yI5G3g9f5Zgq71HaHt76gRA0+yD2MA1AOdyk911RR+v0XYFnFsE9ivzlS X-Received: by 2002:a17:906:994f:: with SMTP id zm15mr1934023ejb.24.1620268342332; Wed, 05 May 2021 19:32:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620268342; cv=none; d=google.com; s=arc-20160816; b=KRtlUTQ6Qff+Eo4pJWyhyqPRO+AXlbMX0rqwzUCrb/iAj/29fbstbDSpKQhW3oEtmi BOG8jHrYH+g+KrTDs4mMakCMX3bae1bY/pXrdI/dLolXvIWhqxwHaFKMIKCmlkL3sxUU Q2FnI38ekbZWQHwxrPomEzYHNjRf7oNnPE6rXYa6knqBgap8jz/ryoXfidRzt83XrQtb FEYJ0VbZlszzPHWkS0cAohWrftUblnixEzYM6M9qZOW5hD34hyQE6sI6r/aCw7gA8U6y 6FbNBdx5g0nUkoG4nsasvlFr2wBhls5U2rUrgD449GwfrhqMjWzxtAxg/YIBllAqfQRm iy+w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:cc:to:from:date:dkim-signature; bh=L9tlvoP76YV6TBD9nxRFbpH2CH4jnh/gd42O3pKPXOw=; b=piRowSu6mdqtBfbgv/F2Yrvwxi0SAEtaclfcaKoMhvrqmHVwwbyFoWuXkNiFTdgECZ JrBIRFmINjAZB0u1YOubXFQxiP0/SuVJpqsX/dHRokKTR8hkYcJcFXAdryWkZngQO2DI fRUE7K8MLuTtddq+PcKQaPxWLyps3TTr9qXVTuAgJJvbKur+eJOCVfjNlbs8ngQyr4D4 mTprMRsFud0lvor0MiPqMIEc2IgLhVRVOW5FMqMl3ny4tlx34a0CadhnPQxOgrV2026A 0QKwZHhgntOP59CZIu7IZ8jsdv5dsQ/efClp8NmC9xD/8v2uQ9cQRDoSklwhmoJYpJ9Q iGwA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@tyhicks-com.20150623.gappssmtp.com header.s=20150623 header.b=KxgEIMJr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z10si1062168eja.84.2021.05.05.19.31.59; Wed, 05 May 2021 19:32:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@tyhicks-com.20150623.gappssmtp.com header.s=20150623 header.b=KxgEIMJr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231349AbhEFCaG (ORCPT + 99 others); Wed, 5 May 2021 22:30:06 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57126 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231416AbhEFCaF (ORCPT ); Wed, 5 May 2021 22:30:05 -0400 Received: from mail-qk1-x734.google.com (mail-qk1-x734.google.com [IPv6:2607:f8b0:4864:20::734]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4CFA8C061574 for ; Wed, 5 May 2021 19:29:07 -0700 (PDT) Received: by mail-qk1-x734.google.com with SMTP id i17so3668362qki.3 for ; Wed, 05 May 2021 19:29:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tyhicks-com.20150623.gappssmtp.com; s=20150623; h=date:from:to:cc:subject:message-id:mime-version:content-disposition; bh=L9tlvoP76YV6TBD9nxRFbpH2CH4jnh/gd42O3pKPXOw=; b=KxgEIMJr3shxFOTkGYIGp2besz2h3HgbPvNL/qjsYVXUdcXW2lnHFoZjluDL/ycWtV n6UjaD6EBBiCFnrbXfw6gpFHOs/hYHFZvOt+1gdkPcsq4nd0LTKO6L966GpoxT3g/P10 LwE7bB3N5xURRHKPmuRiOgrHdGqHcj735niN0KIty+v4fT5PHT+NEm/REpVwJW7tXse/ 1okGh1gT90zASrZR+f4/MK1CtgrBjDeR1MwkgHlFCYh2jE/4KWiOjEAzJixjK2HkAIev mFo/eSe3pG1LRqe2PtN30NgowDRIIgH0lcPWJnvueWF+f/WYWlBVx0ubjaAbnixz1x5O PP+w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:mime-version :content-disposition; bh=L9tlvoP76YV6TBD9nxRFbpH2CH4jnh/gd42O3pKPXOw=; b=M67vHU8cg9OBj6/+2J/VAmXoE4iP4/KISM7Dg54PyEhI/iD244ReARuGE7qPgxUeks 860oHvb+I4yNt7hMPZf6iOc3sKsa7h15P3UXd6cY/jh64CYDqvP1jPfwwXe8OXZHDTsy YJ+GHyQrQVcwI+YrNjgTxHHTTvrJMJmz3t4eiwfekUkISePGEUfy2xqFnM7LOdR8Pr3l N/GrF9CGwbhmSnrHlcFWrvoEzDi67TGuIi/RI3nll7eUnvxR3Dt+fUqG/ncVzluVmJzh Z+YYiXTaGyX9+lyNg8Wff9nLBkogZmDPh8rxganbiuXQsUjU6dNx8FcGnIaVts8XyNjT /r4w== X-Gm-Message-State: AOAM530cLwZoLA7QrmLOYSCE9R7VaAgyYcNYOWXvAfH3qKbnfjr2mxPx BKM6K66sWzT/ipJqdcimhFiQN4FhkFtRyy7V X-Received: by 2002:a05:620a:3c1:: with SMTP id r1mr1789349qkm.339.1620268146560; Wed, 05 May 2021 19:29:06 -0700 (PDT) Received: from elm (162-237-133-238.lightspeed.rcsntx.sbcglobal.net. [162.237.133.238]) by smtp.gmail.com with ESMTPSA id w4sm1014591qki.57.2021.05.05.19.29.05 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 05 May 2021 19:29:05 -0700 (PDT) Date: Wed, 5 May 2021 21:28:51 -0500 From: Tyler Hicks To: Linus Torvalds Cc: Andrew Morton , linux-kernel@vger.kernel.org, ecryptfs@vger.kernel.org Subject: [GIT PULL] eCryptfs updates for 5.13-rc1 Message-ID: <20210506022851.GA622556@elm> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Linus, The following changes since commit d434405aaab7d0ebc516b68a8fc4100922d7f5ef: Linux 5.12-rc7 (2021-04-11 15:16:13 -0700) are available in the Git repository at: https://git.kernel.org/pub/scm/linux/kernel/git/tyhicks/ecryptfs.git tags/ecryptfs-5.13-rc1-updates for you to fetch changes up to 9046625511ad8dfbc8c6c2de16b3532c43d68d48: ecryptfs: fix kernel panic with null dev_name (2021-04-19 05:50:32 +0000) Note that there's a "back merge" in here because I forgot to send out a 5.12 PR for two small cleanups that were queued up so my branch was still on a 5.11-rc release. I did the back merge because the W=1 fixes needed the idmapped mounts changes that landed in 5.12 and I had hoped to merge (but didn't) some additional changes to switch over to using a private clone of the lower mount, which also relied on the idmapped mounts changes. I won't make a habit out of back merging but wanted to mention the reasoning since this is the first time I've felt I needed to do it. Please let me know if it is a problem. ---------------------------------------------------------------- Code cleanups and a bug fix - W=1 compiler warning cleanups - Mutex initialization simplification - Protect against NULL pointer exception during mount ---------------------------------------------------------------- Christian Brauner (1): ecryptfs: remove unused helpers Jeffrey Mitchell (1): ecryptfs: fix kernel panic with null dev_name Lee Jones (13): ecryptfs: read_write: File headers do not make good candidates for kernel-doc ecryptfs: debug: Demote a couple of kernel-doc abuses ecryptfs: dentry: File headers are not good candidates for kernel-doc ecryptfs: kthread: Demote file header and provide description for 'cred' ecryptfs: file: Demote kernel-doc abuses ecryptfs: super: Fix formatting, naming and kernel-doc abuses ecryptfs: messaging: Add missing param descriptions and demote abuses ecryptfs: main: Demote a bunch of non-conformant kernel-doc headers ecryptfs: miscdev: File headers are not good kernel-doc candidates ecryptfs: crypto: Supply some missing param descriptions and demote abuses ecryptfs: mmap: Help out one function header and demote other abuses ecryptfs: inode: Help out nearly-there header and demote non-conformant ones ecryptfs: keystore: Fix some kernel-doc issues and demote non-conformant headers Sascha Hauer (1): ecryptfs: Fix typo in message Tom Rix (1): eCryptfs: add a semicolon Tyler Hicks (1): Merge tag 'v5.12-rc7' into ecryptfs/next Ye Bin (1): eCryptfs: Use DEFINE_MUTEX() for mutex lock Zheng Yongjun (1): ecryptfs: use DEFINE_MUTEX() for mutex lock fs/ecryptfs/crypto.c | 25 ++++++++++++------------- fs/ecryptfs/debug.c | 4 ++-- fs/ecryptfs/dentry.c | 2 +- fs/ecryptfs/ecryptfs_kernel.h | 14 +------------- fs/ecryptfs/file.c | 4 ++-- fs/ecryptfs/inode.c | 11 +++++------ fs/ecryptfs/keystore.c | 15 ++++++++------- fs/ecryptfs/kthread.c | 3 ++- fs/ecryptfs/main.c | 30 ++++++++++++++++++------------ fs/ecryptfs/messaging.c | 14 +++++++------- fs/ecryptfs/miscdev.c | 3 ++- fs/ecryptfs/mmap.c | 11 ++++++----- fs/ecryptfs/read_write.c | 4 +++- fs/ecryptfs/super.c | 8 ++++---- 14 files changed, 73 insertions(+), 75 deletions(-)