lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 6 Aug 2020 10:59:02 -0400 From: "Theodore Ts'o" <tytso@....edu> To: brookxu <brookxu.cn@...il.com> Cc: adilger.kernel@...ger.ca, linux-ext4@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: ext4: delete the invalid BUGON in ext4_mb_load_buddy_gfp() On Mon, Jul 27, 2020 at 09:54:14AM +0800, brookxu wrote: > Delete the invalid BUGON in ext4_mb_load_buddy_gfp(), the previous > code has already judged whether page is NULL. > > Signed-off-by: Chunguang Xu <brookxu@...cent.com> Applied, but I had to manually apply your patch since it was mangled by your mailer. It looks like the problem may have been caused by your using gmail; please take a look at the file Documentation/process/email-clients.rst for some hints. - Ted
Powered by blists - more mailing lists