lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 18 Aug 2019 13:58:08 -0700 (PDT) From: David Miller <davem@...emloft.net> To: tlfalcon@...ux.ibm.com Cc: netdev@...r.kernel.org Subject: Re: [PATCH net] ibmvnic: Unmap DMA address of TX descriptor buffers after use From: Thomas Falcon <tlfalcon@...ux.ibm.com> Date: Wed, 14 Aug 2019 14:57:05 -0500 > There's no need to wait until a completion is received to unmap > TX descriptor buffers that have been passed to the hypervisor. > Instead unmap it when the hypervisor call has completed. This patch > avoids the possibility that a buffer will not be unmapped because > a TX completion is lost or mishandled. > > Reported-by: Abdul Haleem <abdhalee@...ux.vnet.ibm.com> > Tested-by: Devesh K. Singh <devesh_singh@...ibm.com> > Signed-off-by: Thomas Falcon <tlfalcon@...ux.ibm.com> Applied.
Powered by blists - more mailing lists