lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 12 Jun 2020 16:51:33 +0300 From: Ido Schimmel <idosch@...sch.org> To: Ritesh Harjani <riteshh@...ux.ibm.com> Cc: syzbot <syzbot+82f324bb69744c5f6969@...kaller.appspotmail.com>, adilger.kernel@...ger.ca, linux-ext4@...r.kernel.org, linux-kernel@...r.kernel.org, linux-next@...r.kernel.org, sfr@...b.auug.org.au, syzkaller-bugs@...glegroups.com, tytso@....edu Subject: Re: linux-next test error: BUG: using smp_processor_id() in preemptible [ADDR] code: syz-fuzzer/6792 On Fri, Jun 12, 2020 at 07:09:04PM +0530, Ritesh Harjani wrote: > I see Ted has already taken v2 of this patch in his dev repo. > Should be able to see in linux tree soon. > > https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?h=dev&id=811985365378df01386c3cfb7ff716e74ca376d5 Great, thanks a lot. I've replaced previous patch with this one in my testing tree.
Powered by blists - more mailing lists