Re: [Phishing Risk] [External] FAILED: patch "[PATCH] net_sched: fix RTNL deadlock again caused by request_module()" failed to apply to 5.4-stable tree

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Mar 1, 2021 at 10:53 AM Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx> wrote:
>
> On Mon, Mar 01, 2021 at 09:54:33AM -0800, Cong Wang . wrote:
> > On Mon, Mar 1, 2021 at 8:02 AM <gregkh@xxxxxxxxxxxxxxxxxxx> wrote:
> > >
> > >
> > > The patch below does not apply to the 5.4-stable tree.
> > > If someone wants it applied there, or to any other stable or longterm
> > > tree, then please email the backport, including the original git commit
> > > id to <stable@xxxxxxxxxxxxxxx>.
> >
> > This patch is not suitable for -stable due to its large size.
>
> The size here is fine:
>  3 files changed, 79 insertions(+), 41 deletions(-)
>

If you are fine with this, sure. I will take a look at your backports.

> Given that syzbot can trigger this, that means that humans can as well,
> so why shouldn't we fix this?

I meant, it existed for a long time, probably longer than what the Fixes tag
indicates, and no human reported it.

Thanks.




[Index of Archives]     [Linux Kernel]     [Kernel Development Newbies]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite Hiking]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux