lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <5A548464.7060506@mentor.com>
Date:   Tue, 9 Jan 2018 00:59:16 -0800
From:   Jiada Wang <jiada_wang@...tor.com>
To:     Takashi Sakamoto <o-takashi@...amocchi.jp>
CC:     Mark Brown <broonie@...nel.org>, <alsa-devel@...a-project.org>,
        <kuninori.morimoto.gx@...esas.com>, <linux-kernel@...r.kernel.org>,
        <tiwai@...e.com>, <lgirdwood@...il.com>
Subject: Re: Applied "ASoC: rsnd: ssi: fix race condition in rsnd_ssi_pointer_update"
 to the asoc tree

Hi Sakamoto-san


On 01/08/2018 10:53 PM, Takashi Sakamoto wrote:
> Hi Jiada,
>
> On Jan 9 2018 14:42, Jiada Wang wrote:
>> Only the first patch in
>> https://www.spinics.net/lists/alsa-devel/msg71021.html
>> was applied, but the second patch "ASoC: rsnd: ssi: remove 
>> unnesessary period_pos"
>> was missed
>>
>> Could you please have a look
>
> I can see all of them were applied to Mark's for-next branch[1].
>
>  - 33f801366bdf ('ASoC: rsnd: ssi: fix race condition in 
> rsnd_ssi_pointer_update')[2]
>  - 2e2d53da81af ('ASoC: rsnd: ssi: remove unnesessary period_pos')[3]
>
> No worries to us.

Thanks,

Jiada
>
> [1] 
> https://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound.git/log/?h=for-next
> [2] 
> https://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound.git/commit/sound/soc/sh?h=for-next&id=33f801366bdf3f8b67dfe325b84f4051a090d01e
> [3] 
> https://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound.git/commit/sound/soc/sh?h=for-next&id=2e2d53da81af6b2222c6b4e025a5d01b37b4449b
>
>
> Regards
>
> Takashi Sakamoto

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ