GOOD DAY
-- Good Day, My name is Fredrick Idahosa, a registered Forex Broker with ETX Capital. I am soliciting on behalf of a private Client who held a Government Position in his Country and wishes to invest the sum of $10.5 Million [Ten Million, Five Hundred Thousand U.S Dollars] in viable business ventures with a foreign partner. My Client is willing to negotiate Sharing Percentage upon hearing from you. If you wish, I shall arrange a meeting with my client prior to the commencement of the transaction. If this proposal is acceptable to you, do not take undue advantage of the trust bestowed on you. I await your urgent response. Sincerely, Fredrick Idahosa
[no subject]
Do you need an urgent loan for Xmas if Yes? Contact us immediately for more info
[PATCH] Staging: rtl8723bs: core: rtw_mlme: Fix spelling issues
Fixed spelling warnings produced by scripts/checkpatch.pl Signed-off-by: Ammly Fredrick <amm...@gmail.com> --- drivers/staging/rtl8723bs/core/rtw_mlme.c | 28 ++-- 1 file changed, 14 insertions(+), 14 deletions(-) diff --git a/drivers/staging/rtl8723bs/core/rtw_mlme.c b/drivers/staging/rtl8723bs/core/rtw_mlme.c index 9e355734f0c0..0c07b9b31081 100644 --- a/drivers/staging/rtl8723bs/core/rtw_mlme.c +++ b/drivers/staging/rtl8723bs/core/rtw_mlme.c @@ -249,7 +249,7 @@ void _rtw_free_network_nolock(structmlme_priv *pmlmepriv, struct wlan_network * /* return the wlan_network with the matching addr - Shall be calle under atomic context... to avoid possible racing condition... + Shall be called under atomic context... to avoid possible racing condition... */ struct wlan_network *_rtw_find_network(struct __queue *scanned_queue, u8 *addr) { @@ -412,7 +412,7 @@ void rtw_free_network_queue(struct adapter *dev, u8 isfreeall) /* return the wlan_network with the matching addr - Shall be calle under atomic context... to avoid possible racing condition... + Shall be called under atomic context... to avoid possible racing condition... */ struct wlan_network *rtw_find_network(struct __queue *scanned_queue, u8 *addr) { @@ -564,7 +564,7 @@ void update_network(struct wlan_bssid_ex *dst, struct wlan_bssid_ex *src, sq_final = ((u32)(src->PhyInfo.SignalQuality)+(u32)(dst->PhyInfo.SignalQuality)*4)/5; rssi_final = (src->Rssi+dst->Rssi*4)/5; } else { - /* bss info not receving from the right channel, use the original RX signal infos */ + /* bss info not receiving from the right channel, use the original RX signal infos */ ss_final = dst->PhyInfo.SignalStrength; sq_final = dst->PhyInfo.SignalQuality; rssi_final = dst->Rssi; @@ -680,7 +680,7 @@ void rtw_update_scanned_network(struct adapter *adapter, struct wlan_bssid_ex *t pnetwork->aid = 0; pnetwork->join_res = 0; - /* bss info not receving from the right channel */ + /* bss info not receiving from the right channel */ if (pnetwork->network.PhyInfo.SignalQuality == 101) pnetwork->network.PhyInfo.SignalQuality = 0; } else { @@ -699,7 +699,7 @@ void rtw_update_scanned_network(struct adapter *adapter, struct wlan_bssid_ex *t pnetwork->last_scanned = jiffies; - /* bss info not receving from the right channel */ + /* bss info not receiving from the right channel */ if (pnetwork->network.PhyInfo.SignalQuality == 101) pnetwork->network.PhyInfo.SignalQuality = 0; @@ -715,7 +715,7 @@ void rtw_update_scanned_network(struct adapter *adapter, struct wlan_bssid_ex *t pnetwork->last_scanned = jiffies; - /* target.Reserved[0]== 1, means that scaned network is a bcn frame. */ + /* target.Reserved[0]== 1, means that scanned network is a bcn frame. */ if ((pnetwork->network.IELength > target->IELength) && (target->Reserved[0] == 1)) update_ie = false; @@ -1264,7 +1264,7 @@ static struct sta_info *rtw_joinbss_update_stainfo(struct adapter *padapter, str /* Commented by Albert 2012/07/21 */ /* When doing the WPS, the wps_ie_len won't equal to 0 */ - /* And the Wi-Fi driver shouldn't allow the data packet to be tramsmitted. */ + /* And the Wi-Fi driver shouldn't allow the data packet to be transmitted. */ if (padapter->securitypriv.wps_ie_len != 0) { psta->ieee8021x_blocked = true; padapter->securitypriv.wps_ie_len = 0; @@ -1272,7 +1272,7 @@ static struct sta_info *rtw_joinbss_update_stainfo(struct adapter *padapter, str /* for A-MPDU Rx reordering buffer control for bmc_sta & sta_info */ - /* if A-MPDU Rx is enabled, reseting rx_ordering_ctrl wstart_b(indicate_seq) to default value = 0x */ + /* if A-MPDU Rx is enabled, resetting rx_ordering_ctrl wstart_b(indicate_seq) to default value = 0x */ /* todo: check if AP can send A-MPDU packets */ for (i = 0; i < 16 ; i++) { /* preorder_ctrl = >recvreorder_ctrl[i]; */ @@ -1374,7 +1374,7 @@ static void rtw_joinbss_update_network(struct adapter *padapter, struct wlan_net rtw_update_ht_cap(padapter, cur_network->network.IEs, cur_
[PATCH] Staging: rtl8723bs: core: rtw_mlme: Fix spelling issues
Fixed spelling warnings produced by scripts/checkpatch.pl Signed-off-by: Ammly Fredrick --- drivers/staging/rtl8723bs/core/rtw_mlme.c | 28 ++-- 1 file changed, 14 insertions(+), 14 deletions(-) diff --git a/drivers/staging/rtl8723bs/core/rtw_mlme.c b/drivers/staging/rtl8723bs/core/rtw_mlme.c index 9e355734f0c0..0c07b9b31081 100644 --- a/drivers/staging/rtl8723bs/core/rtw_mlme.c +++ b/drivers/staging/rtl8723bs/core/rtw_mlme.c @@ -249,7 +249,7 @@ void _rtw_free_network_nolock(structmlme_priv *pmlmepriv, struct wlan_network * /* return the wlan_network with the matching addr - Shall be calle under atomic context... to avoid possible racing condition... + Shall be called under atomic context... to avoid possible racing condition... */ struct wlan_network *_rtw_find_network(struct __queue *scanned_queue, u8 *addr) { @@ -412,7 +412,7 @@ void rtw_free_network_queue(struct adapter *dev, u8 isfreeall) /* return the wlan_network with the matching addr - Shall be calle under atomic context... to avoid possible racing condition... + Shall be called under atomic context... to avoid possible racing condition... */ struct wlan_network *rtw_find_network(struct __queue *scanned_queue, u8 *addr) { @@ -564,7 +564,7 @@ void update_network(struct wlan_bssid_ex *dst, struct wlan_bssid_ex *src, sq_final = ((u32)(src->PhyInfo.SignalQuality)+(u32)(dst->PhyInfo.SignalQuality)*4)/5; rssi_final = (src->Rssi+dst->Rssi*4)/5; } else { - /* bss info not receving from the right channel, use the original RX signal infos */ + /* bss info not receiving from the right channel, use the original RX signal infos */ ss_final = dst->PhyInfo.SignalStrength; sq_final = dst->PhyInfo.SignalQuality; rssi_final = dst->Rssi; @@ -680,7 +680,7 @@ void rtw_update_scanned_network(struct adapter *adapter, struct wlan_bssid_ex *t pnetwork->aid = 0; pnetwork->join_res = 0; - /* bss info not receving from the right channel */ + /* bss info not receiving from the right channel */ if (pnetwork->network.PhyInfo.SignalQuality == 101) pnetwork->network.PhyInfo.SignalQuality = 0; } else { @@ -699,7 +699,7 @@ void rtw_update_scanned_network(struct adapter *adapter, struct wlan_bssid_ex *t pnetwork->last_scanned = jiffies; - /* bss info not receving from the right channel */ + /* bss info not receiving from the right channel */ if (pnetwork->network.PhyInfo.SignalQuality == 101) pnetwork->network.PhyInfo.SignalQuality = 0; @@ -715,7 +715,7 @@ void rtw_update_scanned_network(struct adapter *adapter, struct wlan_bssid_ex *t pnetwork->last_scanned = jiffies; - /* target.Reserved[0]== 1, means that scaned network is a bcn frame. */ + /* target.Reserved[0]== 1, means that scanned network is a bcn frame. */ if ((pnetwork->network.IELength > target->IELength) && (target->Reserved[0] == 1)) update_ie = false; @@ -1264,7 +1264,7 @@ static struct sta_info *rtw_joinbss_update_stainfo(struct adapter *padapter, str /* Commented by Albert 2012/07/21 */ /* When doing the WPS, the wps_ie_len won't equal to 0 */ - /* And the Wi-Fi driver shouldn't allow the data packet to be tramsmitted. */ + /* And the Wi-Fi driver shouldn't allow the data packet to be transmitted. */ if (padapter->securitypriv.wps_ie_len != 0) { psta->ieee8021x_blocked = true; padapter->securitypriv.wps_ie_len = 0; @@ -1272,7 +1272,7 @@ static struct sta_info *rtw_joinbss_update_stainfo(struct adapter *padapter, str /* for A-MPDU Rx reordering buffer control for bmc_sta & sta_info */ - /* if A-MPDU Rx is enabled, reseting rx_ordering_ctrl wstart_b(indicate_seq) to default value = 0x */ + /* if A-MPDU Rx is enabled, resetting rx_ordering_ctrl wstart_b(indicate_seq) to default value = 0x */ /* todo: check if AP can send A-MPDU packets */ for (i = 0; i < 16 ; i++) { /* preorder_ctrl = >recvreorder_ctrl[i]; */ @@ -1374,7 +1374,7 @@ static void rtw_joinbss_update_network(struct adapter *padapter, struct wlan_net rtw_update_ht_cap(padapter, cur_network->network.IEs, cur_network->network.IELeng
[PATCH 12622/12622] Staging: ccree: ssi_cipher: fix brace coding style issue
Fixed some coding style issues after running scripts/checkpatch.pl Fixed spelling in ssi_blkcipher_complete(), should be counter not couter. Signed-off-by: Ammly Fredrick <amm...@gmail.com> --- drivers/staging/ccree/ssi_cipher.c | 72 ++ 1 file changed, 34 insertions(+), 38 deletions(-) diff --git a/drivers/staging/ccree/ssi_cipher.c b/drivers/staging/ccree/ssi_cipher.c index 664ed7e52cf2..37ed4e5133fc 100644 --- a/drivers/staging/ccree/ssi_cipher.c +++ b/drivers/staging/ccree/ssi_cipher.c @@ -72,7 +72,7 @@ static void ssi_ablkcipher_complete(struct device *dev, void *ssi_req, void __io static int validate_keys_sizes(struct ssi_ablkcipher_ctx *ctx_p, uint32_t size) { switch (ctx_p->flow_mode){ case S_DIN_to_AES: - switch (size){ + switch (size) { case CC_AES_128_BIT_KEY_SIZE: case CC_AES_192_BIT_KEY_SIZE: if (likely((ctx_p->cipher_mode != DRV_CIPHER_XTS) && @@ -82,8 +82,8 @@ static int validate_keys_sizes(struct ssi_ablkcipher_ctx *ctx_p, uint32_t size) break; case CC_AES_256_BIT_KEY_SIZE: return 0; - case (CC_AES_192_BIT_KEY_SIZE*2): - case (CC_AES_256_BIT_KEY_SIZE*2): + case (CC_AES_192_BIT_KEY_SIZE * 2): + case (CC_AES_256_BIT_KEY_SIZE * 2): if (likely((ctx_p->cipher_mode == DRV_CIPHER_XTS) || (ctx_p->cipher_mode == DRV_CIPHER_ESSIV) || (ctx_p->cipher_mode == DRV_CIPHER_BITLOCKER))) @@ -94,7 +94,7 @@ static int validate_keys_sizes(struct ssi_ablkcipher_ctx *ctx_p, uint32_t size) } case S_DIN_to_DES: if (likely(size == DES3_EDE_KEY_SIZE || - size == DES_KEY_SIZE)) +size == DES_KEY_SIZE)) return 0; break; #if SSI_CC_HAS_MULTI2 @@ -105,16 +105,15 @@ static int validate_keys_sizes(struct ssi_ablkcipher_ctx *ctx_p, uint32_t size) #endif default: break; - } return -EINVAL; } static int validate_data_size(struct ssi_ablkcipher_ctx *ctx_p, unsigned int size) { - switch (ctx_p->flow_mode){ + switch (ctx_p->flow_mode) { case S_DIN_to_AES: - switch (ctx_p->cipher_mode){ + switch (ctx_p->cipher_mode) { case DRV_CIPHER_XTS: if ((size >= SSI_MIN_AES_XTS_SIZE) && (size <= SSI_MAX_AES_XTS_SIZE) && @@ -172,9 +171,8 @@ static unsigned int get_max_keysize(struct crypto_tfm *tfm) return ssi_alg->crypto_alg.cra_ablkcipher.max_keysize; } - if ((ssi_alg->crypto_alg.cra_flags & CRYPTO_ALG_TYPE_MASK) == CRYPTO_ALG_TYPE_BLKCIPHER) { + if ((ssi_alg->crypto_alg.cra_flags & CRYPTO_ALG_TYPE_MASK) == CRYPTO_ALG_TYPE_BLKCIPHER) return ssi_alg->crypto_alg.cra_blkcipher.max_keysize; - } return 0; } @@ -199,7 +197,7 @@ static int ssi_blkcipher_init(struct crypto_tfm *tfm) dev = _p->drvdata->plat_dev->dev; /* Allocate key buffer, cache line aligned */ - ctx_p->user.key = kmalloc(max_key_buf_size, GFP_KERNEL|GFP_DMA); + ctx_p->user.key = kmalloc(max_key_buf_size, GFP_KERNEL | GFP_DMA); if (!ctx_p->user.key) { SSI_LOG_ERR("Allocating key buffer in context failed\n"); rc = -ENOMEM; @@ -260,11 +258,11 @@ static void ssi_blkcipher_exit(struct crypto_tfm *tfm) } -typedef struct tdes_keys{ +typedef struct tdes_keys { u8 key1[DES_KEY_SIZE]; u8 key2[DES_KEY_SIZE]; u8 key3[DES_KEY_SIZE]; -}tdes_keys_t; +} tdes_keys_t; static const u8 zero_buff[] = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @@ -294,9 +292,9 @@ static int ssi_fips_verify_xts_keys(const u8 *key, unsigned int keylen) /* Weak key is define as key that its first half (128/256 lsb) equals its second half (128/256 msb) */ int singleKeySize = keylen >> 1; - if (unlikely(memcmp(key, [singleKeySize], singleKeySize) == 0)) { + if (unlikely(memcmp(key, [singleKeySize], singleKeySize) == 0)) return -ENOEXEC; - } + #endif /* CCREE_FIPS_SUPPORT */ return 0; @@ -340,12 +338,12 @@ static int ssi_blkcipher_setkey(struct crypto_tfm *tfm, #if SSI_CC_HAS_MULTI2 /*last byte of key buffer is round number and should not be a part of key size*/ - if (ctx_p->flow_mode == S_DIN_to_MULTI2) { - keylen -=1; - } + if (ctx_p->flow_mode == S_DIN_to_MULTI2) + keylen -= 1; +
[PATCH 12622/12622] Staging: ccree: ssi_cipher: fix brace coding style issue
Fixed some coding style issues after running scripts/checkpatch.pl Fixed spelling in ssi_blkcipher_complete(), should be counter not couter. Signed-off-by: Ammly Fredrick --- drivers/staging/ccree/ssi_cipher.c | 72 ++ 1 file changed, 34 insertions(+), 38 deletions(-) diff --git a/drivers/staging/ccree/ssi_cipher.c b/drivers/staging/ccree/ssi_cipher.c index 664ed7e52cf2..37ed4e5133fc 100644 --- a/drivers/staging/ccree/ssi_cipher.c +++ b/drivers/staging/ccree/ssi_cipher.c @@ -72,7 +72,7 @@ static void ssi_ablkcipher_complete(struct device *dev, void *ssi_req, void __io static int validate_keys_sizes(struct ssi_ablkcipher_ctx *ctx_p, uint32_t size) { switch (ctx_p->flow_mode){ case S_DIN_to_AES: - switch (size){ + switch (size) { case CC_AES_128_BIT_KEY_SIZE: case CC_AES_192_BIT_KEY_SIZE: if (likely((ctx_p->cipher_mode != DRV_CIPHER_XTS) && @@ -82,8 +82,8 @@ static int validate_keys_sizes(struct ssi_ablkcipher_ctx *ctx_p, uint32_t size) break; case CC_AES_256_BIT_KEY_SIZE: return 0; - case (CC_AES_192_BIT_KEY_SIZE*2): - case (CC_AES_256_BIT_KEY_SIZE*2): + case (CC_AES_192_BIT_KEY_SIZE * 2): + case (CC_AES_256_BIT_KEY_SIZE * 2): if (likely((ctx_p->cipher_mode == DRV_CIPHER_XTS) || (ctx_p->cipher_mode == DRV_CIPHER_ESSIV) || (ctx_p->cipher_mode == DRV_CIPHER_BITLOCKER))) @@ -94,7 +94,7 @@ static int validate_keys_sizes(struct ssi_ablkcipher_ctx *ctx_p, uint32_t size) } case S_DIN_to_DES: if (likely(size == DES3_EDE_KEY_SIZE || - size == DES_KEY_SIZE)) +size == DES_KEY_SIZE)) return 0; break; #if SSI_CC_HAS_MULTI2 @@ -105,16 +105,15 @@ static int validate_keys_sizes(struct ssi_ablkcipher_ctx *ctx_p, uint32_t size) #endif default: break; - } return -EINVAL; } static int validate_data_size(struct ssi_ablkcipher_ctx *ctx_p, unsigned int size) { - switch (ctx_p->flow_mode){ + switch (ctx_p->flow_mode) { case S_DIN_to_AES: - switch (ctx_p->cipher_mode){ + switch (ctx_p->cipher_mode) { case DRV_CIPHER_XTS: if ((size >= SSI_MIN_AES_XTS_SIZE) && (size <= SSI_MAX_AES_XTS_SIZE) && @@ -172,9 +171,8 @@ static unsigned int get_max_keysize(struct crypto_tfm *tfm) return ssi_alg->crypto_alg.cra_ablkcipher.max_keysize; } - if ((ssi_alg->crypto_alg.cra_flags & CRYPTO_ALG_TYPE_MASK) == CRYPTO_ALG_TYPE_BLKCIPHER) { + if ((ssi_alg->crypto_alg.cra_flags & CRYPTO_ALG_TYPE_MASK) == CRYPTO_ALG_TYPE_BLKCIPHER) return ssi_alg->crypto_alg.cra_blkcipher.max_keysize; - } return 0; } @@ -199,7 +197,7 @@ static int ssi_blkcipher_init(struct crypto_tfm *tfm) dev = _p->drvdata->plat_dev->dev; /* Allocate key buffer, cache line aligned */ - ctx_p->user.key = kmalloc(max_key_buf_size, GFP_KERNEL|GFP_DMA); + ctx_p->user.key = kmalloc(max_key_buf_size, GFP_KERNEL | GFP_DMA); if (!ctx_p->user.key) { SSI_LOG_ERR("Allocating key buffer in context failed\n"); rc = -ENOMEM; @@ -260,11 +258,11 @@ static void ssi_blkcipher_exit(struct crypto_tfm *tfm) } -typedef struct tdes_keys{ +typedef struct tdes_keys { u8 key1[DES_KEY_SIZE]; u8 key2[DES_KEY_SIZE]; u8 key3[DES_KEY_SIZE]; -}tdes_keys_t; +} tdes_keys_t; static const u8 zero_buff[] = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @@ -294,9 +292,9 @@ static int ssi_fips_verify_xts_keys(const u8 *key, unsigned int keylen) /* Weak key is define as key that its first half (128/256 lsb) equals its second half (128/256 msb) */ int singleKeySize = keylen >> 1; - if (unlikely(memcmp(key, [singleKeySize], singleKeySize) == 0)) { + if (unlikely(memcmp(key, [singleKeySize], singleKeySize) == 0)) return -ENOEXEC; - } + #endif /* CCREE_FIPS_SUPPORT */ return 0; @@ -340,12 +338,12 @@ static int ssi_blkcipher_setkey(struct crypto_tfm *tfm, #if SSI_CC_HAS_MULTI2 /*last byte of key buffer is round number and should not be a part of key size*/ - if (ctx_p->flow_mode == S_DIN_to_MULTI2) { - keylen -=1; - } + if (ctx_p->flow_mode == S_DIN_to_MULTI2) + keylen -= 1; + #endif /*SSI_CC_HA
Attn: 08/03/2016
Jag ber om ursäkt två hav grävde i din integritet. Jag är Mr Frederick Whitfield Operations Manger av UBS Investment Bank London. Att den officiella huvudet av alla bankverksamhet i operationsavdelningen, jag upptäckte en övergiven summan av £ 15 miljoner Great British pund (Femton miljoner Brittiska pund) på ett konto ATT tillhör en av våra utländska kunder Late Mr Thomas J. Stewart SOM tyvärr miste livet i en hemsk helikopterolycka. Thomas J. Stewart var 64 år gammal Närs ORO hans hustru Madena, hans enda dotter Sydney dog i en helikopterolycka. Du kan få mer information om kraschen från webbsidan adress nedan: http://www.cbsnews.com/news/helicopter-crash-kills-5-in-phoenix/ Nu är vår bank er väntar ange någon av de anhöriga två komma upp för påståendet av arvsfonden men tyvärr alla ansträngningar Har vara ogiltiga. I Personligt havebeen målet att hitta Varken anhöriga eller någon närmast släkt två Mr. Thomas. På detta avseende, jag söker ditt medgivande två gåva dig som de anhöriga / vilja mottagaren til avlidna SA intäkterna från detta konto värderas till £ 15 miljoner stora brittiska pund kan utbetalas till dig. Detta kommer att betalas ut eller delas i disse procentsatser 60% till mig och 40% till dig. Jag kommer att förse dig med all nödvändigt juridisk information s som kan överutnyttjas för att backa upp detta påstående vi cirka två make. Allt jag behöver är två överföra ditt namn til handlingarna och legalisera på British High Court för två prov dig rättmätiga förmånstagaren. Allt jag behöver nu är din ärliga samarbete, konfidentialitet och tillit två att vi ser denna transaktion igenom. I garantere dig 100% framgång och thatthis affär kommer att genomföras under tillämpningsområdet för lag och også skyddar dig mot eventuella brott mot avtalet. Ange mig følgende SOM Det 7 arbetsdagar att köra igenom det: 1. Ditt fullständiga namn: 2. Telefonnummer: 3. Kontaktadress: 4. Ålder: 5. Kön: 6. Yrke: Ditt samtycke två denna e-post och företags OM kommer att vara mycket uppskattat. Bästa hälsningar, Mr. Frederick Whitfield
Attn: 08/03/2016
Jag ber om ursäkt två hav grävde i din integritet. Jag är Mr Frederick Whitfield Operations Manger av UBS Investment Bank London. Att den officiella huvudet av alla bankverksamhet i operationsavdelningen, jag upptäckte en övergiven summan av £ 15 miljoner Great British pund (Femton miljoner Brittiska pund) på ett konto ATT tillhör en av våra utländska kunder Late Mr Thomas J. Stewart SOM tyvärr miste livet i en hemsk helikopterolycka. Thomas J. Stewart var 64 år gammal Närs ORO hans hustru Madena, hans enda dotter Sydney dog i en helikopterolycka. Du kan få mer information om kraschen från webbsidan adress nedan: http://www.cbsnews.com/news/helicopter-crash-kills-5-in-phoenix/ Nu är vår bank er väntar ange någon av de anhöriga två komma upp för påståendet av arvsfonden men tyvärr alla ansträngningar Har vara ogiltiga. I Personligt havebeen målet att hitta Varken anhöriga eller någon närmast släkt två Mr. Thomas. På detta avseende, jag söker ditt medgivande två gåva dig som de anhöriga / vilja mottagaren til avlidna SA intäkterna från detta konto värderas till £ 15 miljoner stora brittiska pund kan utbetalas till dig. Detta kommer att betalas ut eller delas i disse procentsatser 60% till mig och 40% till dig. Jag kommer att förse dig med all nödvändigt juridisk information s som kan överutnyttjas för att backa upp detta påstående vi cirka två make. Allt jag behöver är två överföra ditt namn til handlingarna och legalisera på British High Court för två prov dig rättmätiga förmånstagaren. Allt jag behöver nu är din ärliga samarbete, konfidentialitet och tillit två att vi ser denna transaktion igenom. I garantere dig 100% framgång och thatthis affär kommer att genomföras under tillämpningsområdet för lag och også skyddar dig mot eventuella brott mot avtalet. Ange mig følgende SOM Det 7 arbetsdagar att köra igenom det: 1. Ditt fullständiga namn: 2. Telefonnummer: 3. Kontaktadress: 4. Ålder: 5. Kön: 6. Yrke: Ditt samtycke två denna e-post och företags OM kommer att vara mycket uppskattat. Bästa hälsningar, Mr. Frederick Whitfield
Re: [PATCH] staging: lustre: remove unused variables
On Tue, May 6, 2014 at 7:56 AM, Emil Goode wrote: > The following commit left some unused variables behind. > > commit 80db2734acbc78db12798cfb611d6acc7fe389e6 > Author: Fredrick John Berchmans > Date: Fri May 2 19:50:15 2014 -0700 > > staging: lustre use kernel socket sockopt apis > > Signed-off-by: Emil Goode > --- > drivers/staging/lustre/lustre/libcfs/linux/linux-tcpip.c |2 -- > 1 file changed, 2 deletions(-) > > diff --git a/drivers/staging/lustre/lustre/libcfs/linux/linux-tcpip.c > b/drivers/staging/lustre/lustre/libcfs/linux/linux-tcpip.c > index 4153b4a..ac3a444 100644 > --- a/drivers/staging/lustre/lustre/libcfs/linux/linux-tcpip.c > +++ b/drivers/staging/lustre/lustre/libcfs/linux/linux-tcpip.c > @@ -46,10 +46,8 @@ > int > libcfs_sock_ioctl(int cmd, unsigned long arg) > { > - mm_segment_toldmm = get_fs(); > struct socket *sock; > int rc; > - struct file*sock_filp; > > rc = sock_create (PF_INET, SOCK_STREAM, 0, ); > if (rc != 0) { > -- > 1.7.10.4 > Hi Emil, I have already submitted a patch for this. Thanks, Fredrick -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: [PATCH] staging: lustre: remove unused variables
On Tue, May 6, 2014 at 7:56 AM, Emil Goode emilgo...@gmail.com wrote: The following commit left some unused variables behind. commit 80db2734acbc78db12798cfb611d6acc7fe389e6 Author: Fredrick John Berchmans fredrickprasha...@gmail.com Date: Fri May 2 19:50:15 2014 -0700 staging: lustre use kernel socket sockopt apis Signed-off-by: Emil Goode emilgo...@gmail.com --- drivers/staging/lustre/lustre/libcfs/linux/linux-tcpip.c |2 -- 1 file changed, 2 deletions(-) diff --git a/drivers/staging/lustre/lustre/libcfs/linux/linux-tcpip.c b/drivers/staging/lustre/lustre/libcfs/linux/linux-tcpip.c index 4153b4a..ac3a444 100644 --- a/drivers/staging/lustre/lustre/libcfs/linux/linux-tcpip.c +++ b/drivers/staging/lustre/lustre/libcfs/linux/linux-tcpip.c @@ -46,10 +46,8 @@ int libcfs_sock_ioctl(int cmd, unsigned long arg) { - mm_segment_toldmm = get_fs(); struct socket *sock; int rc; - struct file*sock_filp; rc = sock_create (PF_INET, SOCK_STREAM, 0, sock); if (rc != 0) { -- 1.7.10.4 Hi Emil, I have already submitted a patch for this. Thanks, Fredrick -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Xmas Loan ...Apply Now
Do you need a loan ? if yes contact fredrick...@qq.com for more. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Xmas Loan ...Apply Now
Do you need a loan ? if yes contact fredrick...@qq.com for more. -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/