lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1354830114.18211.4.camel@jlt4.sipsolutions.net> Date: Thu, 06 Dec 2012 22:41:54 +0100 From: Johannes Berg <johannes@...solutions.net> To: Tim Gardner <tim.gardner@...onical.com> Cc: linux-kernel@...r.kernel.org, Wey-Yi Guy <wey-yi.w.guy@...el.com>, Intel Linux Wireless <ilw@...ux.intel.com>, "John W. Linville" <linville@...driver.com>, Emmanuel Grumbach <emmanuel.grumbach@...el.com>, Don Fry <donald.h.fry@...el.com>, linux-wireless@...r.kernel.org, netdev@...r.kernel.org Subject: Re: [PATCH wireless-next] iwlwifi: iwlagn_request_scan: Fix check for NULL priv->scan_request > --- a/drivers/net/wireless/iwlwifi/dvm/scan.c > +++ b/drivers/net/wireless/iwlwifi/dvm/scan.c > @@ -673,8 +673,9 @@ static int iwlagn_request_scan(struct iwl_priv *priv, struct ieee80211_vif *vif) > const u8 *ssid = NULL; > u8 ssid_len = 0; > > - if (WARN_ON_ONCE(priv->scan_request && > - priv->scan_request->n_channels > MAX_SCAN_CHANNEL)) > + if (WARN_ON(priv->scan_type == IWL_SCAN_NORMAL && > + (!priv->scan_request || > + priv->scan_request->n_channels > MAX_SCAN_CHANNEL))) > return -EINVAL; I'll pick it up if you fix the indentation :P johannes -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists