On Fri, May 24, 2013 at 05:42:52PM -0700, Sarah Sharp wrote:
> This patchset address some (but not all) of the security issues found
> with the Klockwork static analysis tool.  I have not reviewed these in
> detail to see if these could be used by attackers, so someone with more
> security experience may want to look these over.

A lot of these changes are just to add checks to functions that you are
calling yourself.  How can those pointers be "not valid" when you
control what you pass to them?

Those seems over-eager, and not really needed.  Or am I missing
somewhere that could change the pointer without the driver knowing it?

thanks,

greg k-h
--
To unsubscribe from this list: send the line "unsubscribe linux-usb" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to