From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.5 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_PASS, USER_AGENT_MUTT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6FA3EC282D7 for ; Wed, 30 Jan 2019 18:19:13 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 3E8EA218AE for ; Wed, 30 Jan 2019 18:19:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1548872353; bh=CvR2Qez9TzakxvcQil1RO6biDsW70OK7UhQ+gpiXl0E=; h=Date:From:To:Cc:Subject:References:In-Reply-To:List-ID:From; b=xf81aq6mNFI+XU/UICC/Q1PNXJj08cYDusYQqm99eKn1WEHxp4W86nOPtboQx+2uH i7NXmJsM0Nq6g9yMvmj78oRhd30YHwtbTXlXX9GM7MjW7EDsLpYjtpX2NaszKOSxk3 Vh53KfM/VBCazJ04XwU5NrMKuorlKYCBwP8As0C0= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732837AbfA3STM (ORCPT ); Wed, 30 Jan 2019 13:19:12 -0500 Received: from mail.kernel.org ([198.145.29.99]:53264 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732721AbfA3STM (ORCPT ); Wed, 30 Jan 2019 13:19:12 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7763F20989; Wed, 30 Jan 2019 18:19:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1548872351; bh=CvR2Qez9TzakxvcQil1RO6biDsW70OK7UhQ+gpiXl0E=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=gzg4sq3T8Zk0TOoZpzNwJHTbHiNGm73vRRAwJaSrz0hdB6vDfvs6v9ss6kihrPl3v iDtpnJG5lNIXwKp/unz4AKSrFQ/f7ASyV2pDaepQ/YtNKCSsIb1uRvBO1haMD8SCYx vBRwgfyrsE/K/L5pihBCg1xmevtxBh4BSQaI8MPc= Date: Wed, 30 Jan 2019 19:19:09 +0100 From: Greg KH To: Gao Xiang Cc: stable@vger.kernel.org, viro@zeniv.linux.org.uk, linux-erofs@lists.ozlabs.org, linux-staging mailing list Subject: Re: patch "staging: erofs: keep corrupted fs from crashing kernel in" added to staging-linus Message-ID: <20190130181909.GA16326@kroah.com> References: <15488587831390@kroah.com> <74cc60e3-eb87-d574-a106-305fb40ca54d@huawei.com> <1e5bad91-3d65-c086-d42c-f87d642e3204@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1e5bad91-3d65-c086-d42c-f87d642e3204@huawei.com> User-Agent: Mutt/1.11.2 (2019-01-07) Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org On Wed, Jan 30, 2019 at 11:42:41PM +0800, Gao Xiang wrote: > > > On 2019/1/30 23:05, Gao Xiang wrote: > > > > Hi Greg, > > > > Dan raised some suggestions to me. And I want to get some review ideas from Chao... > > Current EROFS works good for the normal image, this patch is used for corrupted image only... > > > > Could you kindly drop this patch temporarily and I want to get them reviewed... > > Not soon... Thanks! > > It seems this patch is the top of staging-linus...Could you kindly drop it and > it is better to get "Reviewed-by:" tag for all EROFS bugfix patches from corresponding > people (Chao, Dan, or Al if possible) first... Thank you very much! > > sorry to trouble you... No problem, now reverted. greg k-h