lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20200613054431.GL11245@magnolia>
Date:   Fri, 12 Jun 2020 22:44:31 -0700
From:   "Darrick J. Wong" <djwong@...nel.org>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     "Darrick J. Wong" <djwong@...nel.org>,
        linux-fsdevel@...r.kernel.org, linux-xfs@...r.kernel.org,
        david@...morbit.com, linux-kernel@...r.kernel.org,
        sandeen@...deen.net, hch@....de,
        linux-ext4 <linux-ext4@...r.kernel.org>,
        Theodore Ts'o <tytso@....edu>, riteshh@...ux.ibm.com
Subject: [GIT PULL] iomap: bug fix for 5.8-rc1

Hi Linus,

Please pull this single iomap bug fix for 5.8-rc1 that fixes a variable
type mistake on 32-bit architectures.  The branch merged cleanly with
upstream head as of a few minutes ago.

--D

The following changes since commit 0e698dfa282211e414076f9dc7e83c1c288314fd:

  Linux 5.7-rc4 (2020-05-03 14:56:04 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/fs/xfs/xfs-linux.git tags/iomap-5.8-merge-1

for you to fetch changes up to d4ff3b2ef901cd451fb8a9ff4623d060a79502cd:

  iomap: Fix unsharing of an extent >2GB on a 32-bit machine (2020-06-08 20:58:29 -0700)

----------------------------------------------------------------
New code for 5.8:
- Fix an integer overflow problem in the unshare actor.

----------------------------------------------------------------
Matthew Wilcox (Oracle) (1):
      iomap: Fix unsharing of an extent >2GB on a 32-bit machine

 fs/iomap/buffered-io.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ