lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 1 May 2020 16:52:38 -0600
From:   Jens Axboe <axboe@...nel.dk>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     io-uring <io-uring@...r.kernel.org>,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] io_uring fixes for 5.7-rc4

Hi Linus,

- Fix for statx not grabbing the file table, making AT_EMPTY_PATH fail

- Cover a few cases where async poll can handle retry, eliminating the
  need for an async thread

- fallback request busy/free fix (Bijan)

- syzbot reported SQPOLL thread exit fix for non-preempt (Xiaoguang)

- Fix extra put of req for sync_file_range (Pavel)

- Always punt splice async. We'll improve this for 5.8, but wanted to
  eliminate the inode mutex lock from the non-blocking path for 5.7
  (Pavel)

Please pull!


  git://git.kernel.dk/linux-block.git tags/io_uring-5.7-2020-05-01


----------------------------------------------------------------
Bijan Mottahedeh (1):
      io_uring: use proper references for fallback_req locking

Jens Axboe (3):
      io_uring: statx must grab the file table for valid fd
      io_uring: enable poll retry for any file with ->read_iter / ->write_iter
      io_uring: only force async punt if poll based retry can't handle it

Pavel Begunkov (3):
      io_uring: fix extra put in sync_file_range()
      io_uring: check non-sync defer_list carefully
      io_uring: punt splice async because of inode mutex

Xiaoguang Wang (1):
      io_uring: use cond_resched() in io_ring_ctx_wait_and_kill()

 fs/io_uring.c | 58 +++++++++++++++++++++++++++++++---------------------------
 1 file changed, 31 insertions(+), 27 deletions(-)

-- 
Jens Axboe

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ