lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 5 Nov 2017 08:30:13 +0100 From: Greg Kroah-Hartman <gregkh@...uxfoundation.org> To: Geert Uytterhoeven <geert@...ux-m68k.org> Cc: SF Markus Elfring <elfring@...rs.sourceforge.net>, USB list <linux-usb@...r.kernel.org>, Alan Stern <stern@...land.harvard.edu>, Eugene Korenevsky <ekorenevsky@...il.com>, Günter Röck <linux@...ck-us.net>, Jaejoong Kim <climbbb.kim@...il.com>, Johan Hovold <johan@...nel.org>, Jonathan Corbet <corbet@....net>, Mathias Nyman <mathias.nyman@...ux.intel.com>, Mauro Carvalho Chehab <mchehab@...nel.org>, LKML <linux-kernel@...r.kernel.org>, "kernel-janitors@...r.kernel.org" <kernel-janitors@...r.kernel.org> Subject: Re: [PATCH] USB: core: Improve unlocking of a mutex in two functions On Sun, Nov 05, 2017 at 12:25:19AM +0100, Geert Uytterhoeven wrote: > On Sat, Nov 4, 2017 at 9:12 PM, SF Markus Elfring > <elfring@...rs.sourceforge.net> wrote: > > From: Markus Elfring <elfring@...rs.sourceforge.net> > > Date: Sat, 4 Nov 2017 21:00:46 +0100 > > > > * Add jump targets so that a call of the function "mutex_unlock" is stored > > only twice in these function implementations. > > > > * Replace five calls by goto statements. > > > > This issue was detected by using the Coccinelle software. > > > > Signed-off-by: Markus Elfring <elfring@...rs.sourceforge.net> > > NAKed-by: Geert Uytterhoeven <geert@...ux-m68k.org> Don't worry, or waste your time, I don't take patches from this author as they are in my blacklist. greg k-h
Powered by blists - more mailing lists