Tags: venkatarajasekhar/lge-kernel-gproj
Tags
msm: vidc: Initialize kernel space stack variables This change initializes kernel space stack variables that are passed between kernel space and user space using ioctls. Non initialization of these variables may lead to leakage of memory values from the kernel stack to user space. Change-Id: Icb195470545ee48b55671ac09798610178e833e1 CRs-fixed: 556771,563420 Signed-off-by: Deepak Verma <[email protected]>
vidc: close instance if securing session fails. Video driver will close the instance if secure call fails. Change-Id: I39147272a9183f011529078fe8a18ac8cb2726fd Signed-off-by: Gopikrishnaiah Anandan <[email protected]> Signed-off-by: Ajay Dudani <[email protected]> Signed-off-by: Iliyan Malchev <[email protected]>
avc: Fix oops when handed a bad binder transfer from userspace Change-Id: Ic10bdcdb09e53994fa6d3077f333bf6e8d33d2ce
avc: Fix oops when handed a bad binder transfer from userspace Change-Id: Ic10bdcdb09e53994fa6d3077f333bf6e8d33d2ce
msm: msm_fb: remove mmio access through mmap Disable access to mm io and add appropriate range checks to ensure valid accesses through framebuffer mmap. This prevents illegal access into memory. CRs-Fixed: 474706 Change-Id: If25166f2732433ef967e99c716440030b567aae9 Signed-off-by: Manoj Rao <[email protected]>
msm: msm_fb: remove mmio access through mmap Disable access to mm io and add appropriate range checks to ensure valid accesses through framebuffer mmap. This prevents illegal access into memory. CRs-Fixed: 474706 Change-Id: If25166f2732433ef967e99c716440030b567aae9 Signed-off-by: Manoj Rao <[email protected]>
msm: audio: qdsp6v2: Add size safety check to ACDB driver Check that the size sent by userspace is not larger then the internal amount allowed. This protects against overflowing the stack due to an invalid size. Change-Id: I8230fdb00a7b57d398929e8ab0eb6587476f3db1 CRs-fixed: 470222 Signed-off-by: Ben Romberger <[email protected]>
mm: Hold a file reference in madvise_remove commit 9ab4233dd08036fe34a89c7dc6f47a8bf2eb29eb upstream. Otherwise the code races with munmap (causing a use-after-free of the vma) or with close (causing a use-after-free of the struct file). The bug was introduced by commit 90ed52e ("[PATCH] holepunch: fix mmap_sem i_mutex deadlock") Cc: Hugh Dickins <[email protected]> Cc: Miklos Szeredi <[email protected]> Cc: Badari Pulavarty <[email protected]> Cc: Nick Piggin <[email protected]> Signed-off-by: Andy Lutomirski <[email protected]> Signed-off-by: Linus Torvalds <[email protected]> [bwh: Backported to 3.2: - Adjust context - madvise_remove() calls vmtruncate_range(), not do_fallocate()] Signed-off-by: Ben Hutchings <[email protected]> Signed-off-by: Greg Kroah-Hartman <[email protected]>
mm: Hold a file reference in madvise_remove commit 9ab4233dd08036fe34a89c7dc6f47a8bf2eb29eb upstream. Otherwise the code races with munmap (causing a use-after-free of the vma) or with close (causing a use-after-free of the struct file). The bug was introduced by commit 90ed52e ("[PATCH] holepunch: fix mmap_sem i_mutex deadlock") Cc: Hugh Dickins <[email protected]> Cc: Miklos Szeredi <[email protected]> Cc: Badari Pulavarty <[email protected]> Cc: Nick Piggin <[email protected]> Signed-off-by: Andy Lutomirski <[email protected]> Signed-off-by: Linus Torvalds <[email protected]> [bwh: Backported to 3.2: - Adjust context - madvise_remove() calls vmtruncate_range(), not do_fallocate()] Signed-off-by: Ben Hutchings <[email protected]> Signed-off-by: Greg Kroah-Hartman <[email protected]>
PreviousNext