Skip to content

Tags: venkatarajasekhar/lge-kernel-gproj

Tags

cm-10.2.0

Toggle cm-10.2.0's commit message
msm: vidc: Initialize kernel space stack variables

This change initializes kernel space stack variables
that are passed between kernel space and user space
using ioctls.
Non initialization of these variables may lead to
leakage of memory values from the kernel stack to
user space.

Change-Id: Icb195470545ee48b55671ac09798610178e833e1
CRs-fixed: 556771,563420
Signed-off-by: Deepak Verma <[email protected]>

cm-10.2-M1

Toggle cm-10.2-M1's commit message
vidc: close instance if securing session fails.

Video driver will close the instance if secure call fails.

Change-Id: I39147272a9183f011529078fe8a18ac8cb2726fd
Signed-off-by: Gopikrishnaiah Anandan <[email protected]>
Signed-off-by: Ajay Dudani <[email protected]>
Signed-off-by: Iliyan Malchev <[email protected]>

cm-10.1.3

Toggle cm-10.1.3's commit message
avc: Fix oops when handed a bad binder transfer from userspace

Change-Id: Ic10bdcdb09e53994fa6d3077f333bf6e8d33d2ce

cm-10.1.3-RC2

Toggle cm-10.1.3-RC2's commit message
avc: Fix oops when handed a bad binder transfer from userspace

Change-Id: Ic10bdcdb09e53994fa6d3077f333bf6e8d33d2ce

cm-10.1.3-RC1

Toggle cm-10.1.3-RC1's commit message
avc: Fix oops when handed a bad binder transfer from userspace

Change-Id: Ic10bdcdb09e53994fa6d3077f333bf6e8d33d2ce

cm-10.1.2

Toggle cm-10.1.2's commit message
msm: msm_fb: remove mmio access through mmap

Disable access to mm io and add
appropriate range checks to ensure valid accesses
through framebuffer mmap. This prevents illegal
access into memory.

CRs-Fixed: 474706
Change-Id: If25166f2732433ef967e99c716440030b567aae9
Signed-off-by: Manoj Rao <[email protected]>

cm-10.1.1

Toggle cm-10.1.1's commit message
msm: msm_fb: remove mmio access through mmap

Disable access to mm io and add
appropriate range checks to ensure valid accesses
through framebuffer mmap. This prevents illegal
access into memory.

CRs-Fixed: 474706
Change-Id: If25166f2732433ef967e99c716440030b567aae9
Signed-off-by: Manoj Rao <[email protected]>

cm-10.1.0

Toggle cm-10.1.0's commit message
msm: audio: qdsp6v2: Add size safety check to ACDB driver

Check that the size sent by userspace is not larger
then the internal amount allowed. This protects
against overflowing the stack due to an invalid size.

Change-Id: I8230fdb00a7b57d398929e8ab0eb6587476f3db1
CRs-fixed: 470222
Signed-off-by: Ben Romberger <[email protected]>

cm-10.1.0-RC5

Toggle cm-10.1.0-RC5's commit message
mm: Hold a file reference in madvise_remove

commit 9ab4233dd08036fe34a89c7dc6f47a8bf2eb29eb upstream.

Otherwise the code races with munmap (causing a use-after-free
of the vma) or with close (causing a use-after-free of the struct
file).

The bug was introduced by commit 90ed52e ("[PATCH] holepunch: fix
mmap_sem i_mutex deadlock")

Cc: Hugh Dickins <[email protected]>
Cc: Miklos Szeredi <[email protected]>
Cc: Badari Pulavarty <[email protected]>
Cc: Nick Piggin <[email protected]>
Signed-off-by: Andy Lutomirski <[email protected]>
Signed-off-by: Linus Torvalds <[email protected]>
[bwh: Backported to 3.2:
 - Adjust context
 - madvise_remove() calls vmtruncate_range(), not do_fallocate()]
Signed-off-by: Ben Hutchings <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>

cm-10.1.0-RC4

Toggle cm-10.1.0-RC4's commit message
mm: Hold a file reference in madvise_remove

commit 9ab4233dd08036fe34a89c7dc6f47a8bf2eb29eb upstream.

Otherwise the code races with munmap (causing a use-after-free
of the vma) or with close (causing a use-after-free of the struct
file).

The bug was introduced by commit 90ed52e ("[PATCH] holepunch: fix
mmap_sem i_mutex deadlock")

Cc: Hugh Dickins <[email protected]>
Cc: Miklos Szeredi <[email protected]>
Cc: Badari Pulavarty <[email protected]>
Cc: Nick Piggin <[email protected]>
Signed-off-by: Andy Lutomirski <[email protected]>
Signed-off-by: Linus Torvalds <[email protected]>
[bwh: Backported to 3.2:
 - Adjust context
 - madvise_remove() calls vmtruncate_range(), not do_fallocate()]
Signed-off-by: Ben Hutchings <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>