[PATCH] Removed unused variable i from sound/soc/soc-pcm.c Signed-off-by: Shakil A Khan

2015-01-01 Thread Shakil A Khan
--- sound/soc/soc-pcm.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/sound/soc/soc-pcm.c b/sound/soc/soc-pcm.c index d6e8d6b..6b0136e 100644 --- a/sound/soc/soc-pcm.c +++ b/sound/soc/soc-pcm.c @@ -304,7 +304,7 @@ static bool soc_pcm_has_symmetry(struct snd_pcm_substream

[PATCH] Removed unused variable i from sound/soc/soc-pcm.c Signed-off-by: Shakil A Khan shakilk1...@gmail.com

2015-01-01 Thread Shakil A Khan
--- sound/soc/soc-pcm.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/sound/soc/soc-pcm.c b/sound/soc/soc-pcm.c index d6e8d6b..6b0136e 100644 --- a/sound/soc/soc-pcm.c +++ b/sound/soc/soc-pcm.c @@ -304,7 +304,7 @@ static bool soc_pcm_has_symmetry(struct snd_pcm_substream

Re: [PATCH] Freeing dst when the reference count <0 causes general protection fault, it could be a major security flaw as rogue app can modify dst to crash kernel.

2014-09-13 Thread shakil A Khan
On Saturday, September 13, 2014 04:50:22 AM Eric Dumazet wrote: > On Sat, 2014-09-13 at 01:27 -0700, Shakil A Khan wrote: > > Signed-off-by: Shakil A Khan > > --- > > > > net/core/dst.c | 5 - > > 1 file changed, 4 insertions(+), 1 deletion(-) > > >

[PATCH] Freeing dst when the reference count <0 causes general protection fault, it could be a major security flaw as rogue app can modify dst to crash kernel.

2014-09-13 Thread Shakil A Khan
Signed-off-by: Shakil A Khan --- net/core/dst.c | 5 - 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/net/core/dst.c b/net/core/dst.c index a028409..6a848b0 100644 --- a/net/core/dst.c +++ b/net/core/dst.c @@ -284,7 +284,10 @@ void dst_release(struct dst_entry *dst

[PATCH] Freeing dst when the reference count 0 causes general protection fault, it could be a major security flaw as rogue app can modify dst to crash kernel.

2014-09-13 Thread Shakil A Khan
Signed-off-by: Shakil A Khan shakilk1...@gmail.com --- net/core/dst.c | 5 - 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/net/core/dst.c b/net/core/dst.c index a028409..6a848b0 100644 --- a/net/core/dst.c +++ b/net/core/dst.c @@ -284,7 +284,10 @@ void dst_release(struct

Re: [PATCH] Freeing dst when the reference count 0 causes general protection fault, it could be a major security flaw as rogue app can modify dst to crash kernel.

2014-09-13 Thread shakil A Khan
On Saturday, September 13, 2014 04:50:22 AM Eric Dumazet wrote: On Sat, 2014-09-13 at 01:27 -0700, Shakil A Khan wrote: Signed-off-by: Shakil A Khan shakilk1...@gmail.com --- net/core/dst.c | 5 - 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/net/core/dst.c b

Re: [PATCH 2/2] nl80211.c: Fixed the wdev_id being used uninitialized.

2014-09-01 Thread Shakil A Khan
On Monday 01 September 2014 08:07:38 Johannes Berg wrote: > > + u64 wdev_id = 0; > > it's not used uninitialized, NACK. > > johannes > wdev_id can be used uninitialized if have_wdev_id turns to be false, which may happen if the entry for NL80211_ATTR_WDEV is removed in future. Who knows.

[PATCH 3/3] linux.next: kernel/acct.c: Fix for ns(namespace) variable is used only when ACCT_VERSION is 3

2014-09-01 Thread Shakil A Khan
Signed-off-by: Shakil A Khan --- kernel/acct.c |2 ++ 1 files changed, 2 insertions(+), 0 deletions(-) diff --git a/kernel/acct.c b/kernel/acct.c index b4c667d..5f277f5 100644 --- a/kernel/acct.c +++ b/kernel/acct.c @@ -472,7 +472,9 @@ static void do_acct_process(struct bsd_acct_struct

[PATCH 2/2] nl80211.c: Fixed the wdev_id being used uninitialized.

2014-09-01 Thread Shakil A Khan
Signed-off-by: Shakil A Khan --- net/wireless/nl80211.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/net/wireless/nl80211.c b/net/wireless/nl80211.c index df7b133..6cd7df2 100644 --- a/net/wireless/nl80211.c +++ b/net/wireless/nl80211.c @@ -76,7 +76,7

[PATCH] Next branch: authgss: authgss.c: Fix warnings for uninitizlized variable expire

2014-09-01 Thread Shakil A Khan
Signed-off-by : Shakil A Khan --- net/sunrpc/auth_gss/auth_gss.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/net/sunrpc/auth_gss/auth_gss.c b/net/sunrpc/auth_gss/auth_gss.c index afb292c..bea0951 100644 --- a/net/sunrpc/auth_gss/auth_gss.c +++ b/net/sunrpc/auth_gss

[PATCH] Next branch: authgss: authgss.c: Fix warnings for uninitizlized variable expire

2014-09-01 Thread Shakil A Khan
Signed-off-by : Shakil A Khan shakilk1...@gmail.com --- net/sunrpc/auth_gss/auth_gss.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/net/sunrpc/auth_gss/auth_gss.c b/net/sunrpc/auth_gss/auth_gss.c index afb292c..bea0951 100644 --- a/net/sunrpc/auth_gss/auth_gss.c +++ b

[PATCH 2/2] nl80211.c: Fixed the wdev_id being used uninitialized.

2014-09-01 Thread Shakil A Khan
Signed-off-by: Shakil A Khan shakilk1...@gmail.com --- net/wireless/nl80211.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/net/wireless/nl80211.c b/net/wireless/nl80211.c index df7b133..6cd7df2 100644 --- a/net/wireless/nl80211.c +++ b/net/wireless/nl80211.c @@ -76,7

[PATCH 3/3] linux.next: kernel/acct.c: Fix for ns(namespace) variable is used only when ACCT_VERSION is 3

2014-09-01 Thread Shakil A Khan
Signed-off-by: Shakil A Khan shakilk1...@gmail.com --- kernel/acct.c |2 ++ 1 files changed, 2 insertions(+), 0 deletions(-) diff --git a/kernel/acct.c b/kernel/acct.c index b4c667d..5f277f5 100644 --- a/kernel/acct.c +++ b/kernel/acct.c @@ -472,7 +472,9 @@ static void do_acct_process(struct

Re: [PATCH 2/2] nl80211.c: Fixed the wdev_id being used uninitialized.

2014-09-01 Thread Shakil A Khan
On Monday 01 September 2014 08:07:38 Johannes Berg wrote: + u64 wdev_id = 0; it's not used uninitialized, NACK. johannes wdev_id can be used uninitialized if have_wdev_id turns to be false, which may happen if the entry for NL80211_ATTR_WDEV is removed in future. Who knows. -- To