lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 26 Dec 2019 15:14:22 -0800 (PST) From: David Miller <davem@...emloft.net> To: madalin.bucur@....nxp.com Cc: netdev@...r.kernel.org, leon@...nel.org Subject: Re: [PATCH net,v2] dpaa_eth: fix DMA mapping leak From: Madalin Bucur <madalin.bucur@....nxp.com> Date: Mon, 23 Dec 2019 09:39:22 +0200 > On the error path some fragments remain DMA mapped. Adding a fix > that unmaps all the fragments. Rework cleanup path to be simpler. > > Fixes: 8151ee88bad5 ("dpaa_eth: use page backed rx buffers") > Signed-off-by: Madalin Bucur <madalin.bucur@....nxp.com> > --- > > Changes from v1: used Dave's suggestion to simplify cleanup path Applied, thanks.
Powered by blists - more mailing lists