lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 13 May 2022 06:20:21 +0000 (UTC) From: Kalle Valo <kvalo@...nel.org> To: Dongliang Mu <dzm91@...t.edu.cn> Cc: Ping-Ke Shih <pkshih@...ltek.com>, "David S. Miller" <davem@...emloft.net>, Eric Dumazet <edumazet@...gle.com>, Jakub Kicinski <kuba@...nel.org>, Paolo Abeni <pabeni@...hat.com>, Dongliang Mu <mudongliangabcd@...il.com>, syzkaller <syzkaller@...glegroups.com>, linux-wireless@...r.kernel.org, netdev@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [v2] rtlwifi: Use pr_warn instead of WARN_ONCE Dongliang Mu <dzm91@...t.edu.cn> wrote: > From: Dongliang Mu <mudongliangabcd@...il.com> > > This memory allocation failure can be triggered by fault injection or > high pressure testing, resulting a WARN. > > Fix this by replacing WARN with pr_warn. > > Reported-by: syzkaller <syzkaller@...glegroups.com> > Signed-off-by: Dongliang Mu <mudongliangabcd@...il.com> Patch applied to wireless-next.git, thanks. ad732da434a2 rtlwifi: Use pr_warn instead of WARN_ONCE -- https://patchwork.kernel.org/project/linux-wireless/patch/20220511014453.1621366-1-dzm91@hust.edu.cn/ https://wireless.wiki.kernel.org/en/developers/documentation/submittingpatches
Powered by blists - more mailing lists