lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20200805142946.GA2154236@kroah.com> Date: Wed, 5 Aug 2020 16:29:46 +0200 From: Greg KH <greg@...ah.com> To: Jan Kara <jack@...e.cz> Cc: stable@...r.kernel.org, tytso@....edu, adilger.kernel@...ger.ca, linux-ext4@...r.kernel.org, linux-kernel@...r.kernel.org, wanglong19@...tuan.com, heguanjun@...tuan.com, Jiang Ying <jiangying8582@....com> Subject: Re: [PATCH v4] ext4: fix direct I/O read error On Wed, Aug 05, 2020 at 10:51:07AM +0200, Jan Kara wrote: > Note to stable tree maintainers (summary from the rather long changelog): > This is a non-upstream patch. It will not go upstream because the problem > there has been fixed by converting ext4 to use iomap infrastructure. > However that change is out of scope for stable kernels and this is a > minimal fix for the problem that has hit real-world applications so I think > it would be worth it to include the fix in stable trees. Thanks. Thanks for the note, I wouldn't have noticed it otherwise :) greg k-h
Powered by blists - more mailing lists