lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <BY2PR0301MB071148B70ADBB9D88A5CC9F0A0060@BY2PR0301MB0711.namprd03.prod.outlook.com>
Date:	Thu, 12 Mar 2015 12:44:04 +0000
From:	KY Srinivasan <kys@...rosoft.com>
To:	Olaf Hering <olaf@...fle.de>,
	Vitaly Kuznetsov <vkuznets@...hat.com>
CC:	"gregkh@...uxfoundation.org" <gregkh@...uxfoundation.org>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
	"devel@...uxdriverproject.org" <devel@...uxdriverproject.org>,
	"apw@...onical.com" <apw@...onical.com>
Subject: RE: [PATCH 2/6] Drivers: hv: hv_balloon: keep locks balanced on
 add_memory() failure



> -----Original Message-----
> From: Olaf Hering [mailto:olaf@...fle.de]
> Sent: Thursday, March 12, 2015 4:14 AM
> To: Vitaly Kuznetsov
> Cc: KY Srinivasan; gregkh@...uxfoundation.org; linux-
> kernel@...r.kernel.org; devel@...uxdriverproject.org; apw@...onical.com
> Subject: Re: [PATCH 2/6] Drivers: hv: hv_balloon: keep locks balanced on
> add_memory() failure
> 
> On Thu, Mar 12, Vitaly Kuznetsov wrote:
> 
> > My "Drivers: hv: hv_balloon: eliminate the trylock path in
> > acquire/release_region_mutex"
> > (b05d8d9ef5ef21d1b18440430f950304836e1aaa
> > in char-misc-next) removed these wrappers.
> 
> I see now. There are many changes in char-misc-next. The description gives
> the impression that mainline is broken. Not sure if thats true, perhaps its just
> char-misc-next which is affected.

Yes; I notified Greg of this and I have resent the set with proper tag for Greg to pick this set up
for 4.0.

Regards,

K. Y
> 
> Olaf

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ