lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <301a18ca0151b97f54ff6f67b4d32afed696459b.camel@netapp.com>
Date:   Fri, 13 Mar 2020 21:23:52 +0000
From:   "Schumaker, Anna" <Anna.Schumaker@...app.com>
To:     "torvalds@...ux-foundation.org" <torvalds@...ux-foundation.org>
CC:     "linux-nfs@...r.kernel.org" <linux-nfs@...r.kernel.org>,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] Please pull NFS Client fixes for 5.6-rc6

Hi Linus,

The following changes since commit 5d63944f8206a80636ae8cb4b9107d3b49f43d37:

  NFSv4: Ensure the delegation cred is pinned when we call delegreturn (2020-02-
13 16:23:02 -0500)

are available in the Git repository at:

  git://git.linux-nfs.org/projects/anna/linux-nfs.git tags/nfs-for-5.6-3

for you to fetch changes up to 55dee1bc0d72877b99805e42e0205087e98b9edd:

  nfs: add minor version to nfs_server_key for fscache (2020-02-25 13:53:24
-0500)

----------------------------------------------------------------
These are mostly fscontext fixes, but there is also one that fixes collisions
seen in fscache.

Thanks,
Anna
----------------------------------------------------------------

Scott Mayhew (4):
      NFS: Ensure the fs_context has the correct fs_type before mounting
      NFS: Don't hard-code the fs_type when submounting
      NFS: Fix leak of ctx->nfs_server.hostname
      nfs: add minor version to nfs_server_key for fscache

 fs/nfs/client.c     | 1 +
 fs/nfs/fs_context.c | 9 +++++++++
 fs/nfs/fscache.c    | 2 ++
 fs/nfs/namespace.c  | 2 +-
 fs/nfs/nfs4client.c | 1 -
 5 files changed, 13 insertions(+), 2 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ