Received: by 2002:a05:7412:e794:b0:fa:551:50a7 with SMTP id o20csp3045111rdd; Sat, 13 Jan 2024 12:38:40 -0800 (PST) X-Google-Smtp-Source: AGHT+IEa778PFR9u4ynU8XTwHXFdeHB1rPTiQcCbobqcuP3Vo+usAMWg8L7zvNx2CNoQ/lqXrIRt X-Received: by 2002:ac8:7fc4:0:b0:429:bbf0:43cc with SMTP id b4-20020ac87fc4000000b00429bbf043ccmr4645039qtk.124.1705178320012; Sat, 13 Jan 2024 12:38:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1705178319; cv=none; d=google.com; s=arc-20160816; b=hylrqX6+zlKsZ/OSm7RbCqMwrNu5HXyNn0p6c1nWQNP4at2IirmaM3TX5w41YMbG2p naKOJey3VBZD/khJzrHH0zE3Z+etfyKQt8DjfviHYgSUJ1FItbJveCK/BkjqbESxk6HC sal0jIMRlcIOJKkG3PISxfwP4UjtD6opfeAqxCpX0maTXibQNjfERKHqDM8qo8VU2Ggz vR68PybaYCXM7ZSS+7RmKgSIIBk+t6kedMbOnX4P2pujMBbEIbEz+qfJKTsVp/HUQ8OL YNy+BSkN0cy6vHWrDfwiETwWbGUkB1Yvrywi4xwrVlpjxB5JAONnDN3X4aRrEb5gdEeY yVFA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=thread-topic:thread-index:content-transfer-encoding:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:subject :message-id:cc:to:from:date; bh=P2wCc5k3OeGL6LWXj2cvs48S29U9hP6u/QffeEuugT0=; fh=bxFzCp/E9cubu1hDGLmTODg1d4zhuZ8rBUUo0PD7pkI=; b=f3cehDuBb1auF+dTqnlUg2yAlnARsto0/kG4bncjIeJhbWhFhtswQSN5KKbO1yYecq XzY9UOJuPJxeZPSQ/Rpr5w2uOWpmwvfP7r7uthMC5zXS8zX6nSfFo3RzlWmM2jlcooAX vli91/+z8efgHCy3Kkt3sEEKY/KKIikODuozE+1YK/8p5VNz5YPhazPEII1VG50HznuY +aOZf08bTAhvAR08gSotYjaug9XkuKP5Mj+Ws9SI+4mR30Ed4oJ9RAfekO0Vj51YbO3q xsBu5G+gNtJRZMOHTyyrWEYyih+T5utCyjsikYRls1DRRC3iMU4NeHxLGM2TbmgeZY+p fQeQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel+bounces-25364-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-25364-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id o21-20020ac85a55000000b00429ceb1264fsi3449998qta.211.2024.01.13.12.38.39 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 13 Jan 2024 12:38:39 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-25364-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel+bounces-25364-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-25364-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id BE91C1C2102E for ; Sat, 13 Jan 2024 20:38:39 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 49053C8FF; Sat, 13 Jan 2024 20:38:33 +0000 (UTC) Received: from lithops.sigma-star.at (lithops.sigma-star.at [195.201.40.130]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E5E7C569C for ; Sat, 13 Jan 2024 20:38:29 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=nod.at Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=nod.at Received: from localhost (localhost [127.0.0.1]) by lithops.sigma-star.at (Postfix) with ESMTP id C353B6343B29; Sat, 13 Jan 2024 21:38:21 +0100 (CET) Received: from lithops.sigma-star.at ([127.0.0.1]) by localhost (lithops.sigma-star.at [127.0.0.1]) (amavisd-new, port 10032) with ESMTP id M1Ys3QVfrw38; Sat, 13 Jan 2024 21:38:21 +0100 (CET) Received: from localhost (localhost [127.0.0.1]) by lithops.sigma-star.at (Postfix) with ESMTP id 5C91E63434F8; Sat, 13 Jan 2024 21:38:21 +0100 (CET) Received: from lithops.sigma-star.at ([127.0.0.1]) by localhost (lithops.sigma-star.at [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id Y4Fg9X_IlY7t; Sat, 13 Jan 2024 21:38:21 +0100 (CET) Received: from lithops.sigma-star.at (lithops.sigma-star.at [195.201.40.130]) by lithops.sigma-star.at (Postfix) with ESMTP id 363A664103FF; Sat, 13 Jan 2024 21:38:21 +0100 (CET) Date: Sat, 13 Jan 2024 21:38:21 +0100 (CET) From: Richard Weinberger To: torvalds Cc: linux-mtd , linux-kernel Message-ID: <1338470076.231558.1705178301103.JavaMail.zimbra@nod.at> Subject: [GIT PULL] UBI and UBIFS updates for v6.8-rc1 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-Mailer: Zimbra 8.8.12_GA_3807 (ZimbraWebClient - FF97 (Linux)/8.8.12_GA_3809) Thread-Index: sjTu+G2rpOo2O3CccI1h9x6trSQ5MA== Thread-Topic: UBI and UBIFS updates for v6.8-rc1 Linus, The following changes since commit 861deac3b092f37b2c5e6871732f3e11486f7082: Linux 6.7-rc7 (2023-12-23 16:25:56 -0800) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/rw/ubifs.git tags/ubifs-for-linus-6.8-rc1 for you to fetch changes up to adbf4c4954e33e623897058a617c583d65a177f6: ubi: block: fix memleak in ubiblock_create() (2024-01-06 23:52:51 +0100) ---------------------------------------------------------------- This pull request contains updates for UBI and UBIFS: UBI: - Use in-tree fault injection framework and add new injection types - Fix for a memory leak in the block driver UBIFS: - kernel-doc fixes - Various minor fixes ---------------------------------------------------------------- Eric Biggers (1): ubifs: use crypto_shash_tfm_digest() in ubifs_hmac_wkm() Li Nan (1): ubi: block: fix memleak in ubiblock_create() Randy Dunlap (2): ubifs: auth.c: fix kernel-doc function prototype warning ubifs: fix kernel-doc warnings Sascha Hauer (1): ubifs: describe function parameters ZhaoLong Wang (5): ubi: Use the fault injection framework to enhance the fault injection capability ubi: Split io_failures into write_failure and erase_failure ubi: Add six fault injection type for testing ubi: Reserve sufficient buffer length for the input mask mtd: Add several functions to the fail_function list Zhihao Cheng (2): ubifs: Check @c->dirty_[n|p]n_cnt and @c->nroot state under @c->lp_mutex ubifs: ubifs_symlink: Fix memleak of inode->i_link in error path drivers/mtd/mtdcore.c | 5 + drivers/mtd/ubi/Kconfig | 9 ++ drivers/mtd/ubi/block.c | 2 +- drivers/mtd/ubi/debug.c | 108 +++++++++++++++-- drivers/mtd/ubi/debug.h | 304 ++++++++++++++++++++++++++++++++++++++++++++---- drivers/mtd/ubi/io.c | 86 +++++++++++++- drivers/mtd/ubi/ubi.h | 45 ++++--- fs/ubifs/auth.c | 21 +--- fs/ubifs/commit.c | 13 ++- fs/ubifs/dir.c | 2 + fs/ubifs/file.c | 30 +++-- fs/ubifs/replay.c | 2 + 12 files changed, 539 insertions(+), 88 deletions(-)