aboutsummaryrefslogtreecommitdiff
path: root/drivers/misc/mediatek/thermal/mt6735
Commit message (Collapse)AuthorAgeFilesLines
* Replace <asm/uaccess.h> with <linux/uaccess.h> globallyLinus Torvalds2018-11-2918-18/+18
| | | | | | | | | | | | | | This was entirely automated, using the script by Al: PATT='^[[:blank:]]*#[[:blank:]]*include[[:blank:]]*<asm/uaccess.h>' sed -i -e "s!$PATT!#include <linux/uaccess.h>!" \ $(git grep -l "$PATT"|grep -v ^include/linux/uaccess.h) to do the replacement at the end of the merge window. Requested-by: Al Viro <viro@zeniv.linux.org.uk> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org> Signed-off-by: Moyster <oysterized@gmail.com>
* Security patchesfire8552017-04-166-3/+12
| | | | Signed-off-by: Mister Oyster <oysterized@gmail.com>
* Fix "stack overflow in Mediatek Thermal driver" issueyang-cy.chen2016-11-071-0/+3
| | | | | | | | | | | | | | Problem: lack of boundary check of user input parameter before copy_from_user. Solution: Add boundary protection to prevent buffer overflow Bug num:28332766 Change-Id: I8536ae241070e59fbb15449bd3bca00d895e0b3f Signed-off-by: yang-cy.chen <yang-cy.chen@mediatek.com> Ticket: PORRIDGE-398
* Fix "stack overflow in Mediatek Thermal driver" issuefire8552016-08-261-0/+1
| | | | Based on: https://android.googlesource.com/kernel/mediatek/+/5b3055f1c7ef9eb9fc703b4ffdbbd1bbee68a980
* first commitMeizu OpenSource2016-08-1527-0/+31758