<feed xmlns='http://www.w3.org/2005/Atom'>
<title>xavi/android_kernel_m2note/drivers/misc/mediatek/mmc-host, branch ng-7.1.2</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.
</subtitle>
<id>https://gitea.privatedns.org/xavi/android_kernel_m2note/atom?h=ng-7.1.2</id>
<link rel='self' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/atom?h=ng-7.1.2'/>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/'/>
<updated>2019-07-18T19:35:48+00:00</updated>
<entry>
<title>msdc: mt6735: fix code defect</title>
<updated>2019-07-18T19:35:48+00:00</updated>
<author>
<name>Edison Liu</name>
<email>Edison.Liu@mediatek.com</email>
</author>
<published>2018-01-11T07:57:41+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=0cdf30c59f4a9464d9c8fe85a37174c479e6408e'/>
<id>urn:sha1:0cdf30c59f4a9464d9c8fe85a37174c479e6408e</id>
<content type='text'>
[Detail]
A malicious userspace application can corrupt kernel memory.
the offset is not limited, so it will becomes a powerful arbitrary
memory read/write primitive.

[Solution]
set the limit of the offset from 0 to 0xFFFF

MTK-Commit-Id: 91446a30b6123dd3391074062dc9833d09dbcc54

Change-Id: Icf733233133bd8ed734ec69a3567e06281d982ff
Signed-off-by: Edison Liu &lt;Edison.Liu@mediatek.com&gt;
CR-Id: ALPS03684210
Feature: Others
</content>
</entry>
<entry>
<title>misc: fix a few Wundef warnings</title>
<updated>2018-11-30T01:12:17+00:00</updated>
<author>
<name>Moyster</name>
<email>oysterized@gmail.com</email>
</author>
<published>2018-11-30T01:12:17+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=640b902053e66fa262b8d4dd555d070f416a7121'/>
<id>urn:sha1:640b902053e66fa262b8d4dd555d070f416a7121</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Replace &lt;asm/uaccess.h&gt; with &lt;linux/uaccess.h&gt; globally</title>
<updated>2018-11-29T16:49:05+00:00</updated>
<author>
<name>Linus Torvalds</name>
<email>torvalds@linux-foundation.org</email>
</author>
<published>2016-12-24T19:46:01+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=8588b01909e0145e5e84f5fe0a5353bd194f205c'/>
<id>urn:sha1:8588b01909e0145e5e84f5fe0a5353bd194f205c</id>
<content type='text'>
This was entirely automated, using the script by Al:

  PATT='^[[:blank:]]*#[[:blank:]]*include[[:blank:]]*&lt;asm/uaccess.h&gt;'
  sed -i -e "s!$PATT!#include &lt;linux/uaccess.h&gt;!" \
        $(git grep -l "$PATT"|grep -v ^include/linux/uaccess.h)

to do the replacement at the end of the merge window.

Requested-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
Signed-off-by: Moyster &lt;oysterized@gmail.com&gt;
</content>
</entry>
<entry>
<title>mediatek: mmc-host: disable debug proc</title>
<updated>2018-05-16T11:31:29+00:00</updated>
<author>
<name>fire855</name>
<email>thefire855@gmail.com</email>
</author>
<published>2018-01-13T13:47:31+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=995449179dc2009bef7bfab09fbececed75fc7ff'/>
<id>urn:sha1:995449179dc2009bef7bfab09fbececed75fc7ff</id>
<content type='text'>
</content>
</entry>
<entry>
<title>mediatek: mmc: disable all proc entries</title>
<updated>2018-05-16T11:11:49+00:00</updated>
<author>
<name>fire855</name>
<email>thefire855@gmail.com</email>
</author>
<published>2018-03-23T15:25:14+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=c8630510c394309fea0cddddf21dfb1340ec6010'/>
<id>urn:sha1:c8630510c394309fea0cddddf21dfb1340ec6010</id>
<content type='text'>
They are not used anywhere and are creating a higher security risk
</content>
</entry>
<entry>
<title>misc: replace __FUNCTION__ by __function__</title>
<updated>2017-09-23T01:10:48+00:00</updated>
<author>
<name>Moyster</name>
<email>oysterized@gmail.com</email>
</author>
<published>2017-09-23T01:10:48+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=b8d1e07edc8d57883bf4b6ca70228b5a9e6b98b2'/>
<id>urn:sha1:b8d1e07edc8d57883bf4b6ca70228b5a9e6b98b2</id>
<content type='text'>
result of :
git grep -l '__FUNCTION__' | xargs sed -i 's/__FUNCTION__/__func__/g'
</content>
</entry>
<entry>
<title>MSDC: Denali Secruity Volnerability</title>
<updated>2017-09-20T13:37:33+00:00</updated>
<author>
<name>Huan Tang</name>
<email>huan.tang@mediatek.com</email>
</author>
<published>2017-07-06T08:00:57+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=8b9af07cd707b04d267142801da8090ef22fc2ee'/>
<id>urn:sha1:8b9af07cd707b04d267142801da8090ef22fc2ee</id>
<content type='text'>
[Detail] Stack overflow &amp; Null Pointer

[Solution] 1.Limited the param 'count' for 'copy_from_user'
	   2.Check Pointer

Change-Id: I81a91a64494b5f088c131f2d1ebc11fcf4b21939
Signed-off-by: Huan Tang &lt;huan.tang@mediatek.com&gt;
CR-Id: ALPS03361487
Feature: Others
Backported to 3.10 and a few code style ocds
Signed-off-by: Mister Oyster &lt;oysterized@gmail.com&gt;
</content>
</entry>
<entry>
<title>first commit</title>
<updated>2016-08-15T02:19:42+00:00</updated>
<author>
<name>Meizu OpenSource</name>
<email>patchwork@meizu.com</email>
</author>
<published>2016-08-15T02:19:42+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=d2e1446d81725c351dc73a03b397ce043fb18452'/>
<id>urn:sha1:d2e1446d81725c351dc73a03b397ce043fb18452</id>
<content type='text'>
</content>
</entry>
</feed>
