lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 9 Dec 2015 10:59:40 -0800 From: Tyler Baker <tyler.baker@...aro.org> To: Alexander Kuleshov <kuleshovmail@...il.com> Cc: Andrew Morton <akpm@...ux-foundation.org>, Tony Luck <tony.luck@...el.com>, Tang Chen <tangchen@...fujitsu.com>, Pekka Enberg <penberg@...nel.org>, Wei Yang <weiyang@...ux.vnet.ibm.com>, Linux MM <linux-mm@...ck.org>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, "Kevin's boot bot" <khilman@...nel.org>, Dan Williams <dan.j.williams@...el.com> Subject: Re: [PATCH] mm/memblock: use memblock_insert_region() for the empty array On 4 December 2015 at 23:23, Alexander Kuleshov <kuleshovmail@...il.com> wrote: > We have the special case for an empty array in the memblock_add_range() > function. In the same time we have almost the same functional in the > memblock_insert_region() function. Let's use the memblock_insert_region() > instead of direct initialization. > > Signed-off-by: Alexander Kuleshov <kuleshovmail@...il.com> Just to add on to the report from Dan, the kernelci.org boot bot has also detected ~65 new boot failures in next-20151209[1], which have been bisected to this patch[2]. It doesn't revert cleanly, so I'm going to try to clean it up by hand and see if it resolves the issue. Cheers, Tyler [1] http://kernelci.org/boot/all/job/next/kernel/next-20151209/ [2] http://hastebin.com/ufiwonuraw.vhdl -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists