lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20080325081752.GJ10722@ZenIV.linux.org.uk>
Date:	Tue, 25 Mar 2008 08:17:52 +0000
From:	Al Viro <viro@...IV.linux.org.uk>
To:	Linus Torvalds <torvalds@...ux-foundation.org>
Cc:	linux-kernel@...r.kernel.org
Subject: [git pull] vfs patches

misc VFS fixes for 2.6.25.  Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs-2.6.git/ for-linus

Shortlog:
Al Viro (5):
      restore export of do_kern_mount()
      sanitize hppfs
      double dput() on failure exit in tiny-shmem
      double iput() on failure exit in hugetlb
      get stack footprint of pathname resolution back to relative sanity

Christoph Hellwig (1):
      check for null vfsmount in dentry_open()

Dave Hansen (2):
      hppfs pass vfsmount to dentry_open()
      fix up new filp allocators

Jeff Mahoney (1):
      reiserfs: eliminate private use of struct file in xattr

Diffstat:
 fs/anon_inodes.c      |   18 +-
 fs/file_table.c       |    6 +
 fs/hppfs/hppfs_kern.c |  435 +++++++++++++++++++++++--------------------------
 fs/hugetlbfs/inode.c  |    2 +-
 fs/namei.c            |   63 ++++----
 fs/open.c             |   12 ++
 fs/pipe.c             |   19 +-
 fs/reiserfs/xattr.c   |  110 ++++---------
 fs/super.c            |    1 +
 mm/tiny-shmem.c       |    2 +
 10 files changed, 302 insertions(+), 366 deletions(-)

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ