lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri,  1 Mar 2024 14:32:55 +0100
From: David Sterba <dsterba@...e.com>
To: torvalds@...ux-foundation.org
Cc: David Sterba <dsterba@...e.com>,
	linux-btrfs@...r.kernel.org,
	linux-kernel@...r.kernel.org
Subject: [GIT PULL] Btrfs fixes for 6.8-rc7, part 2

Hi,

a few more fixes. Please pull, thanks.

- fix freeing allocated id for anon dev when snapshot creation fails

- fiemap fixes
  - followup for a recent deadlock fix, ranges that fiemap can access
    can still race with ordered extent completion
  - make sure fiemap with SYNC flag does not race with writes

----------------------------------------------------------------
The following changes since commit c7bb26b847e5b97814f522686068c5628e2b3646:

  btrfs: fix data race at btrfs_use_block_rsv() when accessing block reserve (2024-02-22 12:15:12 +0100)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/kdave/linux.git tags/for-6.8-rc6-tag

for you to fetch changes up to e2b54eaf28df0c978626c9736b94f003b523b451:

  btrfs: fix double free of anonymous device after snapshot creation failure (2024-02-29 22:34:11 +0100)

----------------------------------------------------------------
Filipe Manana (3):
      btrfs: fix race between ordered extent completion and fiemap
      btrfs: ensure fiemap doesn't race with writes when FIEMAP_FLAG_SYNC is given
      btrfs: fix double free of anonymous device after snapshot creation failure

 fs/btrfs/disk-io.c     |  22 ++++-----
 fs/btrfs/disk-io.h     |   2 +-
 fs/btrfs/extent_io.c   | 124 +++++++++++++++++++++++++++++++++++++++++--------
 fs/btrfs/inode.c       |  22 ++++++++-
 fs/btrfs/ioctl.c       |   2 +-
 fs/btrfs/transaction.c |   2 +-
 6 files changed, 139 insertions(+), 35 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ