lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20221010115703.wpy6uy22oee356r5@skbuf> Date: Mon, 10 Oct 2022 11:57:04 +0000 From: Vladimir Oltean <vladimir.oltean@....com> To: Sasha Levin <sashal@...nel.org> CC: "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, "stable@...r.kernel.org" <stable@...r.kernel.org>, Jakub Kicinski <kuba@...nel.org>, "vinicius.gomes@...el.com" <vinicius.gomes@...el.com>, "jhs@...atatu.com" <jhs@...atatu.com>, "xiyou.wangcong@...il.com" <xiyou.wangcong@...il.com>, "jiri@...nulli.us" <jiri@...nulli.us>, "davem@...emloft.net" <davem@...emloft.net>, "edumazet@...gle.com" <edumazet@...gle.com>, "pabeni@...hat.com" <pabeni@...hat.com>, "netdev@...r.kernel.org" <netdev@...r.kernel.org> Subject: Re: [PATCH AUTOSEL 6.0 55/77] net/sched: taprio: taprio_dump and taprio_change are protected by rtnl_mutex On Sun, Oct 09, 2022 at 06:07:32PM -0400, Sasha Levin wrote: > From: Vladimir Oltean <vladimir.oltean@....com> > > [ Upstream commit 18cdd2f0998a4967b1fff4c43ed9aef049e42c39 ] > > Since the writer-side lock is taken here, we do not need to open an RCU > read-side critical section, instead we can use rtnl_dereference() to > tell lockdep we are serialized with concurrent writes. > > Signed-off-by: Vladimir Oltean <vladimir.oltean@....com> > Signed-off-by: Jakub Kicinski <kuba@...nel.org> > Signed-off-by: Sasha Levin <sashal@...nel.org> > --- Not needed for stable kernels, please drop, thanks.
Powered by blists - more mailing lists