lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 8 Nov 2012 12:31:12 +0800 From: Wei Yongjun <weiyj.lk@...il.com> To: wency@...fujitsu.com Cc: lenb@...nel.org, rjw@...k.pl, yongjun_wei@...ndmicro.com.cn, linux-acpi@...r.kernel.org, linux-kernel@...r.kernel.org, dan.carpenter@...cle.com Subject: Re: [PATCH -next] ACPI: fix missing unlock on error in acpi_memory_remove_memory() Hi Wen, On 11/08/2012 09:31 AM, Wen Congyang wrote: > Hi, wei > > At 11/07/2012 08:38 PM, Wei Yongjun Wrote: >> From: Wei Yongjun <yongjun_wei@...ndmicro.com.cn> >> >> Add the missing mutex_unlock() before return from function >> acpi_memory_remove_memory() in the error handling case. >> >> Introduce by commit 85fcb3758c10e063a2a30dfad75017097999deed >> 'ACPI / memory-hotplug: introduce a mutex lock to protect the list in acpi_memory_device' >> >> dpatch engine is used to auto generate this patch. >> (https://github.com/weiyj/dpatch) >> >> Signed-off-by: Wei Yongjun <yongjun_wei@...ndmicro.com.cn> > Thanks for your patch. > > Dan Carpenter has told me this problem. I fix it, but don't > resend it because it is in test now. I saw your patchset has already applied to linux-pm.git tree: http://git.kernel.org/?p=linux/kernel/git/rafael/linux-pm.git;a=shortlog;h=refs/heads/linux-next So I think what need is to send a new patch to fix it, not resend the full patchset. Regards, Yongjun Wei -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists