commit | fb5854676bd03f94355ecc63e17885046b959e87 | [log] [tgz] |
---|---|---|
author | Manjunathappa Prakash <c_pmanju@qca.qualcomm.com> | Mon Dec 23 19:07:07 2013 -0800 |
committer | AnjaneeDevi Kapparapu <akappa@codeaurora.org> | Mon Jan 06 15:20:08 2014 +0530 |
tree | ec17c792a4a19b1893e71835584b08db34484b95 | |
parent | 4d93d84085f73a64b1c2909552486e522b6afc6e [diff] |
wlan: fix unsafe code after VOS_ASSERT The WLAN module extensively uses the VOS_ASSERT macro, which either does nothing or emits a warning (depending on conditional compilation) and continues, i.e. it does not abort. Use of VOS_ASSERT is unsafe in instances where the assert performs out-of-bounds or NULL pointer checks. Patch takes care to bailout where ever it is unsafe to continue. Change-Id: Ida1b72f4292f0b5d30b307b5ee43748e4af99a78 CRs-Fixed: 556307