lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 6 Nov 2013 07:25:55 -0800 From: Olof Johansson <olof@...om.net> To: Kent Overstreet <kmo@...erainc.com> Cc: Jens Axboe <axboe@...nel.dk>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, Chris Mason <chris.mason@...ionio.com>, Mike Snitzer <snitzer@...hat.com>, NeilBrown <neilb@...e.de> Subject: Re: [PATCH] block: Revert bio_clone() default behaviour On Tue, Nov 5, 2013 at 9:07 PM, Kent Overstreet <kmo@...erainc.com> wrote: > On Tue, Nov 05, 2013 at 09:02:19PM -0800, Olof Johansson wrote: >> Hi, >> >> On Tue, Nov 5, 2013 at 7:48 PM, Kent Overstreet <kmo@...erainc.com> wrote: >> >> > Chris, Olaf, can you two in particular test this? I have tested the bounce >> > buffer code (and bcache), but Jens told me today there was an md bug that I >> > _still_ can't find any emails about so I'm not sure what to test for that. >> >> (I'm guessing you mean me and not some German person here. :-) >> >> What is this expected to apply on top of? It doesn't apply cleanly on >> the 20131105 -next tree which is where I had been seeing the issues. > > Sorry - it's on top of Jens' for-3.13/core branch, > git://git.kernel.org/pub/scm/linux/kernel/git/axboe/linux-block.git Tested-by: Olof Johansson <olof@...om.net> Note that last night's -next seems to have held up as well. -Olof -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists