[PATCH 04/10] lowmem: remove an unecessary local variable

2008-09-11 Thread Viktor Rosendahl
-by: Viktor Rosendahl [EMAIL PROTECTED] --- security/lowmem.c | 14 ++ 1 files changed, 2 insertions(+), 12 deletions(-) diff --git a/security/lowmem.c b/security/lowmem.c index 2dc0c4a..183c57f 100644 --- a/security/lowmem.c +++ b/security/lowmem.c @@ -136,28 +136,18 @@ KERNEL_ATTR_RO

[PATCH 00/10] Patches for fixing the lowmem module

2008-09-11 Thread Viktor Rosendahl
Hello, Currently the lowmem module doesn't compile. Here are some patches that will fix a bug, make some improvements and even make it compile. security/lowmem.c | 258 -- 1 file changed, 154 insertions(+), 104 deletions(-) best regards,

[PATCH 01/10] Security: Kernel OOM-killer and allocation denial use different rules

2008-09-11 Thread Viktor Rosendahl
from the oom killer should not be denied memory either. Signed-off-by: Henrik Saari [EMAIL PROTECTED] Signed-off-by: Viktor Rosendahl [EMAIL PROTECTED] --- security/lowmem.c |5 + 1 files changed, 5 insertions(+), 0 deletions(-) diff --git a/security/lowmem.c b/security/lowmem.c index

Re: [PATCH 1/1] twl4030-madc: Fix arbitrarily initialized function pointer

2008-07-03 Thread Viktor Rosendahl
+ req.func_cb = NULL; maybe below is a better patch: diff --git a/drivers/i2c/chips/twl4030-madc.c b/drivers/i2c/chips/twl4030-madc.c index 72b126b..6d8915e 100644 --- a/drivers/i2c/chips/twl4030-madc.c +++ b/drivers/i2c/chips/twl4030-madc.c @@ -360,7 +360,7 @@ static

[PATCH 1/1] twl4030-madc: Fix arbitrarily initialized function pointer

2008-07-02 Thread Viktor Rosendahl
req is an automatic variable and thus we cannot rely on it being initialized to zero (I am leaving the 0!= NULL discussion aside). Other functions test if this pointer is NULL, in order to determine whether it is a valid address or not. Signed-off-by: Viktor Rosendahl [EMAIL PROTECTED

[PATCH 0/1] twl4030-madc: Fix arbitrarily initialized function pointer

2008-07-02 Thread Viktor Rosendahl
Hi all, I have seen this bug crash the kernel when the security framework is enabled in the kernel config. It crashed with a bad syscall from the events/0 workqueue; probably because the security framework is initialized very early and thus the stack has been used more [or differently] and we end