From nobody Sat Feb 7 14:57:27 2026 Received: from out-177.mta0.migadu.com (out-177.mta0.migadu.com [91.218.175.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 645122882CD for ; Tue, 27 Jan 2026 21:58:54 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=91.218.175.177 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1769551136; cv=none; b=GAkl2JLLc23LENSNrMGWjc3n4n5Srt0NQh9YwyvWO4A+HIoGaIWnnPavGhFBjV3WWgwk2JS/8vq9F6b5npOBrePcrkHMzYBkGZYezqjCktAMqx/1aj2Fr31U21DjnPKX1LyDKUqHajA8E6H2rdHnl2a/zFGDlclNiyEHvjJ+A6o= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1769551136; c=relaxed/simple; bh=veF5lYBToFocPjvRLcdCN2HH3OWKUCNCNXWz9HQYJg0=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=s0kyePhp/13ysHhBX/a1Dbl/kar8UbB20kBl/ybCZrLJSPA+S5bIbjs0VewTlPA4iyTGttbDL0XwCgnhdIoksx/c4Fn78Tbagl2h2blZNGakpHIFKQpc+JZ0GYuVj2TzWuDX/VEZN81nwku9xNMd/I2SSLiugOUQA62AUlmijno= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev; spf=pass smtp.mailfrom=linux.dev; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b=ZRuk1ZrY; arc=none smtp.client-ip=91.218.175.177 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.dev Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b="ZRuk1ZrY" X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1769551131; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=PIlnwBxgokdmPQ7p3vS9hRgJ+c1cfBkPrZ4h6cd7ZjI=; b=ZRuk1ZrYnFKx6lWT6H49g7v4yJeQvRnjb58ecBeU4T7OEDOJ/PXRi+51hK2KDKCWCtmp3v iADc4U6DUS35Eg4aVQGVnjlLmbvI2046cxat9k/FAiZLrH6BAMgTKn3dF7gseg98w0AZ5x IedrZUFz8XNmJnfVO1fge60jm993W3g= From: Thorsten Blum To: Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, "H. Peter Anvin" , Thomas Huth Cc: Thorsten Blum , linux-kernel@vger.kernel.org Subject: [PATCH RESEND] x86/mtrr: Replace simple_strtoul with kstrtoul in parse_mtrr_spare_reg Date: Tue, 27 Jan 2026 22:58:23 +0100 Message-ID: <20260127215824.440005-2-thorsten.blum@linux.dev> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Migadu-Flow: FLOW_OUT Content-Type: text/plain; charset="utf-8" Replace simple_strtoul() with the recommended kstrtoul() for parsing the 'mtrr_spare_reg_nr' boot parameter. Check the return value of kstrtoul() and reject invalid values. This adds error handling while preserving behavior for existing values, and removes use of the deprecated simple_strtoul() helper. The current code silently sets 'nr_mtrr_spare_reg =3D 0' if parsing fails, instead of leaving the default value (CONFIG_MTRR_SANITIZER_SPARE_REG_NR_DEFAULT) unchanged. Signed-off-by: Thorsten Blum --- arch/x86/kernel/cpu/mtrr/cleanup.c | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/arch/x86/kernel/cpu/mtrr/cleanup.c b/arch/x86/kernel/cpu/mtrr/= cleanup.c index 763534d77f59..1de5134b1916 100644 --- a/arch/x86/kernel/cpu/mtrr/cleanup.c +++ b/arch/x86/kernel/cpu/mtrr/cleanup.c @@ -437,9 +437,7 @@ static unsigned long nr_mtrr_spare_reg __initdata =3D =20 static int __init parse_mtrr_spare_reg(char *arg) { - if (arg) - nr_mtrr_spare_reg =3D simple_strtoul(arg, NULL, 0); - return 0; + return kstrtoul(arg, 0, &nr_mtrr_spare_reg); } early_param("mtrr_spare_reg_nr", parse_mtrr_spare_reg); =20 --=20 Thorsten Blum GPG: 1D60 735E 8AEF 3BE4 73B6 9D84 7336 78FD 8DFE EAD4