lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20200603103146.C42D65204F@d06av21.portsmouth.uk.ibm.com> Date: Wed, 3 Jun 2020 16:01:45 +0530 From: Ritesh Harjani <riteshh@...ux.ibm.com> To: Marek Szyprowski <m.szyprowski@...sung.com>, linux-ext4@...r.kernel.org, tytso@....edu Cc: linux-fsdevel@...r.kernel.org, Jan Kara <jack@...e.com>, linux-kernel@...r.kernel.org, adilger.kernel@...ger.ca, sfr@...b.auug.org.au, linux-next@...r.kernel.org, syzkaller-bugs@...glegroups.com, syzbot+82f324bb69744c5f6969@...kaller.appspotmail.com Subject: Re: [PATCHv5 1/1] ext4: mballoc: Use raw_cpu_ptr instead of this_cpu_ptr > This fixes the warning observed on various Samsung Exynos SoC based > boards with linux-next 20200602. > > Tested-by: Marek Szyprowski <m.szyprowski@...sung.com> > Thanks Marek, Hello Ted, Please pick up below change which I just sent with an added "Fixes" by tag. Changes wise it is the same which Marek tested. https://patchwork.ozlabs.org/project/linux-ext4/patch/20200603101827.2824-1-riteshh@linux.ibm.com/ -ritesh
Powered by blists - more mailing lists