android_kernel_xiaomi_sm8350/arch/x86_64
Siddha, Suresh B 9fb1759a31 [PATCH] x86_64: TASK_SIZE fixes for compatibility mode processes
A malicious 32bit app can have an elf section at 0xffffe000.  During
exec of this app, we will have a memory leak as insert_vm_struct() is
not checking for return value in syscall32_setup_pages() and thus not
freeing the vma allocated for the vsyscall page.

Check the return value and free the vma incase of failure.

Signed-off-by: Suresh Siddha <suresh.b.siddha@intel.com>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-07-15 22:56:11 -07:00
..
boot [PATCH] x86_64: coding style and whitespace fixups 2005-06-25 16:25:02 -07:00
crypto [CRYPTO] Add x86_64 asm AES 2005-07-06 13:55:00 -07:00
ia32 [PATCH] x86_64: TASK_SIZE fixes for compatibility mode processes 2005-07-15 22:56:11 -07:00
kernel [PATCH] x86_64: section alignment fix 2005-07-12 16:00:59 -07:00
lib [PATCH] Platform SMIs and their interferance with tsc based delay calibration 2005-06-23 09:45:08 -07:00
mm [PATCH] x86_64: Change init sections for CPU hotplug support 2005-06-25 16:24:30 -07:00
oprofile
pci [PATCH] PCI: use the MCFG table to properly access pci devices (x86-64) 2005-06-27 21:52:48 -07:00
defconfig [PATCH] x86_64: Update defconfig 2005-05-17 07:59:17 -07:00
Kconfig [NET]: add a top-level Networking menu to *config 2005-07-11 21:03:49 -07:00
Kconfig.debug
Makefile [CRYPTO] Add x86_64 asm AES 2005-07-06 13:55:00 -07:00