lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 20 Dec 2010 16:25:32 +0200 From: Felipe Contreras <felipe.contreras@...ia.com> To: linux-main <linux-kernel@...r.kernel.org>, linux-omap <linux-omap@...r.kernel.org>, Greg KH <greg@...ah.com>, Omar Ramirez Luna <omar.ramirez@...com> Cc: Ohad Ben-Cohen <ohad@...ery.com>, Fernando Guzman Lugo <fernando.lugo@...com>, Nishanth Menon <nm@...com>, Ameya Palande <ameya.palande@...ia.com>, Felipe Contreras <felipe.contreras@...ia.com> Subject: [PATCH 0/2] staging: tidspbridge: fix dma race condition Hi, I found a race condition that triggers a kernel panic. It's explained in the following patches, but basically the map_obj that contains the user pages is being destroyed while doing a DMA operation (which requires that map_obj). My solution is to convert the spinlock to a semaphore, and exten the area protected (which might sleep). I have not tested these specific patches; they have been forward ported. But in a similar branch, they solve the issue. Felipe Contreras (2): staging: tidspbridge: convert dmm_map_lock to sema staging: tidspbridge: extend dmm_map semaphore .../staging/tidspbridge/include/dspbridge/drv.h | 2 +- drivers/staging/tidspbridge/rmgr/drv_interface.c | 2 +- drivers/staging/tidspbridge/rmgr/proc.c | 23 +++++++++++++------- 3 files changed, 17 insertions(+), 10 deletions(-) -- 1.7.3.3 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists