| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
This was entirely automated, using the script by Al:
PATT='^[[:blank:]]*#[[:blank:]]*include[[:blank:]]*<asm/uaccess.h>'
sed -i -e "s!$PATT!#include <linux/uaccess.h>!" \
$(git grep -l "$PATT"|grep -v ^include/linux/uaccess.h)
to do the replacement at the end of the merge window.
Requested-by: Al Viro <viro@zeniv.linux.org.uk>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Moyster <oysterized@gmail.com>
|
| |
|
|
| |
Signed-off-by: Mister Oyster <oysterized@gmail.com>
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
Problem:
lack of boundary check of user input parameter before copy_from_user.
Solution:
Add boundary protection to prevent buffer overflow
Bug num:28332766
Change-Id: I8536ae241070e59fbb15449bd3bca00d895e0b3f
Signed-off-by: yang-cy.chen <yang-cy.chen@mediatek.com>
Ticket: PORRIDGE-398
|
| |
|
|
| |
Based on: https://android.googlesource.com/kernel/mediatek/+/5b3055f1c7ef9eb9fc703b4ffdbbd1bbee68a980
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
Problem:
lack of boundary check of user input parameter before copy_from_user.
Solution:
Add boundary protection to prevent buffer overflow
Bug num:28333002
Change-Id: I8364a6cbf69527d4b2f2fa7874c8c01720febd5d
Signed-off-by: yang-cy.chen <yang-cy.chen@mediatek.com>
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
Problem:
lack of boundary check of user input parameter before copy_from_user.
Solution:
Add boundary protection to prevent buffer overflow
Bug num:28085410
Change-Id: I178730c373ed3eab3e197b10362c987df659e4c3
Signed-off-by: yang-cy.chen <yang-cy.chen@mediatek.com>
(cherry picked from commit e2c408685e93f73ca16b9d5bc23a186f258a1617)
|
| |
|