On Fri, May 24, 2013 at 05:42:52PM -0700, Sarah Sharp wrote: > This patchset address some (but not all) of the security issues found > with the Klockwork static analysis tool. I have not reviewed these in > detail to see if these could be used by attackers, so someone with more > security experience may want to look these over. A lot of these changes are just to add checks to functions that you are calling yourself. How can those pointers be "not valid" when you control what you pass to them? Those seems over-eager, and not really needed. Or am I missing somewhere that could change the pointer without the driver knowing it? thanks, greg k-h -- To unsubscribe from this list: send the line "unsubscribe linux-usb" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html