lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <c2181ba919c59ffde5c9b9fc615608f92a146413.camel@kernel.org>
Date:   Fri, 17 Feb 2023 09:16:29 -0500
From:   Trond Myklebust <trondmy@...nel.org>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     linux-nfs@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: [GIT PULL] Please pull another NFS client change for 6.2

Hi Linus,

The following changes since commit ec35307e18ba8174e2a3f701956059f6a36f22fb:

  Merge tag 'drm-fixes-2023-02-17' of git://anongit.freedesktop.org/drm/drm (2023-02-16 20:23:32 -0800)

are available in the Git repository at:

  git://git.linux-nfs.org/projects/trondmy/linux-nfs.git tags/nfs-for-6.2-3

for you to fetch changes up to 896e090eefedeb8a715ea19938a2791c32679cc9:

  Revert "NFSv4.2: Change the default KConfig value for READ_PLUS" (2023-02-17 09:07:19 -0500)

Unfortunately, we found another bug in the NFSv4.2 READ_PLUS code.
Since it has not been possible to fix the bug in time for the 6.2
release, let's just revert the Kconfig change that enables it.

Thanks,
  Trond

----------------------------------------------------------------
NFS client fixes for Linux 6.2

Bugfix:
- Revert "NFSv4.2: Change the default KConfig value for READ_PLUS"

----------------------------------------------------------------
Anna Schumaker (1):
      Revert "NFSv4.2: Change the default KConfig value for READ_PLUS"

 fs/nfs/Kconfig | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)


-- 
Trond Myklebust
Linux NFS client maintainer, Hammerspace
trond.myklebust@...merspace.com


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ