lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 24 May 2024 09:23:41 -0400
From: Kent Overstreet <kent.overstreet@...ux.dev>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: linux-bcachefs@...r.kernel.org, linux-fsdevel@...r.kernel.org, 
	linux-kernel@...r.kernel.org
Subject: [GIT PULL] bcachefs fixes for 6.10-rc1

Nothing exciting, just syzbot fixes (except for the one
FMODE_CAN_ODIRECT patch).

Looks like syzbot reports have slowed down; this is all catch up from
two weeks of conferences.

Next hardening project is using Thomas's error injection tooling to
torture test repair.

The following changes since commit eb6a9339efeb6f3d2b5c86fdf2382cdc293eca2c:

  Merge tag 'mm-nonmm-stable-2024-05-19-11-56' of git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm (2024-05-19 14:02:03 -0700)

are available in the Git repository at:

  https://evilpiepirate.org/git/bcachefs.git tags/bcachefs-2024-05-24

for you to fetch changes up to d93ff5fa40b9db5f505d508336bc171f54db862e:

  bcachefs: Fix race path in bch2_inode_insert() (2024-05-22 20:37:47 -0400)

----------------------------------------------------------------
bcachefs fixes for 6.10-rc1

Just a few syzbot fixes

----------------------------------------------------------------
Kent Overstreet (17):
      bcachefs: Fix rcu splat in check_fix_ptrs()
      bcachefs: Fix ref in trans_mark_dev_sbs() error path
      bcachefs: Fix shift overflow in btree_lost_data()
      bcachefs: Fix shift overflows in replicas.c
      bcachefs: Improve bch2_assert_pos_locked()
      bcachefs: Fix missing parens in drop_locks_do()
      bcachefs: Add missing guard in bch2_snapshot_has_children()
      bcachefs: Fix bch2_alloc_ciphers()
      bcachefs: bch2_checksum() returns 0 for unknown checksum type
      bcachefs: Check for subvolues with bogus snapshot/inode fields
      bcachefs: Fix bogus verify_replicas_entry() assert
      bcachefs: Fix btree_trans leak in bch2_readahead()
      bcachefs: Fix stack oob in __bch2_encrypt_bio()
      bcachefs: Fix unsafety in bch2_dirent_name_bytes()
      bcachefs: Fix shutdown ordering
      bcachefs: Ensure we're RW before journalling
      bcachefs: Fix race path in bch2_inode_insert()

Youling Tang (1):
      bcachefs: set FMODE_CAN_ODIRECT instead of a dummy direct_IO method

 fs/bcachefs/bcachefs_format.h |  6 ++++++
 fs/bcachefs/btree_iter.c      |  2 ++
 fs/bcachefs/btree_iter.h      |  2 +-
 fs/bcachefs/buckets.c         | 13 +++++++------
 fs/bcachefs/checksum.c        | 37 ++++++++++++++++++++----------------
 fs/bcachefs/dirent.c          |  3 +++
 fs/bcachefs/fs-io-buffered.c  |  4 ++--
 fs/bcachefs/fs.c              |  6 +++---
 fs/bcachefs/printbuf.c        |  7 +++++++
 fs/bcachefs/recovery.c        |  7 ++++++-
 fs/bcachefs/replicas.c        | 44 ++++++++++++++++++++++---------------------
 fs/bcachefs/sb-errors_types.h |  4 +++-
 fs/bcachefs/snapshot.h        |  7 ++-----
 fs/bcachefs/subvolume.c       |  9 +++++++++
 fs/bcachefs/super.c           |  2 +-
 15 files changed, 96 insertions(+), 57 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ