From nobody Sun Feb 8 05:40:37 2026 Received: from out-171.mta1.migadu.com (out-171.mta1.migadu.com [95.215.58.171]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 17D54337BA1 for ; Thu, 18 Dec 2025 10:10:47 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=95.215.58.171 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1766052650; cv=none; b=kLAw8ETyezx8gKnX83cQOhpppgb9z0qvbUEbGmGmP50mMw1kceCneDZf/kq3rqY3GooXQAEGvlLxNcWhIxVQnCCSAdP77hx76kaGe6H27LSASJo07PWo1cwjH75VItpBVtdtvtUTCv0l6Y2YZR03tXcB5ffEdRSnzvgCmi7MRjk= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1766052650; c=relaxed/simple; bh=veF5lYBToFocPjvRLcdCN2HH3OWKUCNCNXWz9HQYJg0=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=jhnMcLf8Dgsw1+HTUVjU06IRWWm0GNpQxOvAn5Hmy2WgOhPzkubs3BYq8LidixEzghRtjNZ2lug74LEmcDDloaaWqa9R1D7lLPYY8s6mOLoZx70JlKXGo7Ysrrs9D6/Saa6NbUZNZsrsFXoIWypK7xTv87C6nWy1E/smCxvdoXE= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev; spf=pass smtp.mailfrom=linux.dev; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b=tT7LBQQc; arc=none smtp.client-ip=95.215.58.171 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.dev Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b="tT7LBQQc" X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1766052646; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=PIlnwBxgokdmPQ7p3vS9hRgJ+c1cfBkPrZ4h6cd7ZjI=; b=tT7LBQQc98OMxnG+uoKx9XZyG24Iv0wCS22y4tfeT/ArWj6fYbMapgD30nN2olUDepO1Xm Cwe+findlLa/GCT33O81qnYkwA1c7VSn4c8C7KmxxmbY1/yEKcBtxW4q7gMJd9XEuz2BXd 5QfY/QpdGhVfKB2w1VRFYCj47dmjZTU= From: Thorsten Blum To: Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, "H. Peter Anvin" , Thomas Huth Cc: Thorsten Blum , linux-kernel@vger.kernel.org Subject: [PATCH] x86/mtrr: Replace simple_strtoul with kstrtoul in parse_mtrr_spare_reg Date: Thu, 18 Dec 2025 11:10:23 +0100 Message-ID: <20251218101026.225019-1-thorsten.blum@linux.dev> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Migadu-Flow: FLOW_OUT Content-Type: text/plain; charset="utf-8" Replace simple_strtoul() with the recommended kstrtoul() for parsing the 'mtrr_spare_reg_nr' boot parameter. Check the return value of kstrtoul() and reject invalid values. This adds error handling while preserving behavior for existing values, and removes use of the deprecated simple_strtoul() helper. The current code silently sets 'nr_mtrr_spare_reg =3D 0' if parsing fails, instead of leaving the default value (CONFIG_MTRR_SANITIZER_SPARE_REG_NR_DEFAULT) unchanged. Signed-off-by: Thorsten Blum --- arch/x86/kernel/cpu/mtrr/cleanup.c | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/arch/x86/kernel/cpu/mtrr/cleanup.c b/arch/x86/kernel/cpu/mtrr/= cleanup.c index 763534d77f59..1de5134b1916 100644 --- a/arch/x86/kernel/cpu/mtrr/cleanup.c +++ b/arch/x86/kernel/cpu/mtrr/cleanup.c @@ -437,9 +437,7 @@ static unsigned long nr_mtrr_spare_reg __initdata =3D =20 static int __init parse_mtrr_spare_reg(char *arg) { - if (arg) - nr_mtrr_spare_reg =3D simple_strtoul(arg, NULL, 0); - return 0; + return kstrtoul(arg, 0, &nr_mtrr_spare_reg); } early_param("mtrr_spare_reg_nr", parse_mtrr_spare_reg); =20 --=20 Thorsten Blum GPG: 1D60 735E 8AEF 3BE4 73B6 9D84 7336 78FD 8DFE EAD4