lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 9 Jun 2020 06:23:36 +0000 (UTC) From: Kalle Valo <kvalo@...eaurora.org> To: Evan Green <evgreen@...omium.org> Cc: kuabhs@...gle.com.org, sujitka@...omium.org, Evan Green <evgreen@...omium.org>, "David S. Miller" <davem@...emloft.net>, Govind Singh <govinds@....qualcomm.com>, Jakub Kicinski <kuba@...nel.org>, Michal Kazior <michal.kazior@...to.com>, ath10k@...ts.infradead.org, linux-kernel@...r.kernel.org, linux-wireless@...r.kernel.org, netdev@...r.kernel.org Subject: Re: [PATCH] ath10k: Acquire tx_lock in tx error paths Evan Green <evgreen@...omium.org> wrote: > ath10k_htt_tx_free_msdu_id() has a lockdep assertion that htt->tx_lock > is held. Acquire the lock in a couple of error paths when calling that > function to ensure this condition is met. > > Fixes: 6421969f248fd ("ath10k: refactor tx pending management") > Fixes: e62ee5c381c59 ("ath10k: Add support for htt_data_tx_desc_64 descriptor") > Signed-off-by: Evan Green <evgreen@...omium.org> > Signed-off-by: Kalle Valo <kvalo@...eaurora.org> Patch applied to ath-next branch of ath.git, thanks. a738e766e3ed ath10k: Acquire tx_lock in tx error paths -- https://patchwork.kernel.org/patch/11588229/ https://wireless.wiki.kernel.org/en/developers/documentation/submittingpatches
Powered by blists - more mailing lists