lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 29 Dec 2015 10:37:10 +0100 From: Matias Bjørling <mb@...htnvm.io> To: Wenwei Tao <ww.tao0320@...il.com> Cc: linux-kernel@...r.kernel.org, linux-block@...r.kernel.org Subject: Re: [PATCH] lightnvm: check bi_error in gc On 12/29/2015 06:50 AM, Wenwei Tao wrote: > We should check last io compeltion status before > start another one. > > Signed-off-by: Wenwei Tao <ww.tao0320@...il.com> > --- > drivers/lightnvm/rrpc.c | 6 ++++++ > 1 file changed, 6 insertions(+) > > diff --git a/drivers/lightnvm/rrpc.c b/drivers/lightnvm/rrpc.c > index c0886a8..d40c140 100644 > --- a/drivers/lightnvm/rrpc.c > +++ b/drivers/lightnvm/rrpc.c > @@ -328,6 +328,10 @@ try: > goto finished; > } > wait_for_completion_io(&wait); > + if (bio->bi_error) { > + rrpc_inflight_laddr_release(rrpc, rqd); > + goto finished; > + } > > bio_reset(bio); > reinit_completion(&wait); > @@ -350,6 +354,8 @@ try: > wait_for_completion_io(&wait); > > rrpc_inflight_laddr_release(rrpc, rqd); > + if (bio->bi_error) > + goto finished; > > bio_reset(bio); > } > Thanks Tao. I've applied it for 4.5. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists