lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 22 Jan 2021 17:06:05 +0100 From: Ilya Dryomov <idryomov@...il.com> To: Linus Torvalds <torvalds@...ux-foundation.org> Cc: ceph-devel@...r.kernel.org, linux-kernel@...r.kernel.org Subject: [GIT PULL] Ceph fixes for 5.11-rc5 Hi Linus, The following changes since commit e71ba9452f0b5b2e8dc8aa5445198cd9214a6a62: Linux 5.11-rc2 (2021-01-03 15:55:30 -0800) are available in the Git repository at: https://github.com/ceph/ceph-client.git tags/ceph-for-5.11-rc5 for you to fetch changes up to 9d5ae6f3c50a6f718b6d4be3c7b0828966e01b05: libceph: fix "Boolean result is used in bitwise operation" warning (2021-01-21 16:49:59 +0100) ---------------------------------------------------------------- A patch to zero out sensitive cryptographic data and two minor cleanups prompted by the fact that a bunch of code was moved in this cycle. ---------------------------------------------------------------- Ilya Dryomov (3): libceph: zero out session key and connection secret libceph, ceph: disambiguate ceph_connection_operations handlers libceph: fix "Boolean result is used in bitwise operation" warning fs/ceph/mds_client.c | 34 ++++++++++++++--------------- net/ceph/auth_x.c | 57 +++++++++++++++++++++++++++++-------------------- net/ceph/crypto.c | 3 ++- net/ceph/messenger_v1.c | 2 +- net/ceph/messenger_v2.c | 45 +++++++++++++++++++++----------------- net/ceph/mon_client.c | 14 ++++++------ net/ceph/osd_client.c | 40 +++++++++++++++++----------------- 7 files changed, 107 insertions(+), 88 deletions(-)
Powered by blists - more mailing lists