android_kernel_xiaomi_sm8350/arch/x86_64/ia32
Siddha, Suresh B 9fb1759a31 [PATCH] x86_64: TASK_SIZE fixes for compatibility mode processes
A malicious 32bit app can have an elf section at 0xffffe000.  During
exec of this app, we will have a memory leak as insert_vm_struct() is
not checking for return value in syscall32_setup_pages() and thus not
freeing the vma allocated for the vsyscall page.

Check the return value and free the vma incase of failure.

Signed-off-by: Suresh Siddha <suresh.b.siddha@intel.com>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-07-15 22:56:11 -07:00
..
fpu32.c
ia32_aout.c [PATCH] Avoiding mmap fragmentation 2005-06-21 18:46:16 -07:00
ia32_binfmt.c
ia32_ioctl.c
ia32_signal.c [PATCH] x86_64: never block forced SIGSEGV 2005-06-23 09:45:13 -07:00
ia32entry.S [PATCH] kexec: x86_64 kexec implementation 2005-06-25 16:24:50 -07:00
ipc32.c
Makefile
ptrace32.c
sys_ia32.c
syscall32.c [PATCH] x86_64: TASK_SIZE fixes for compatibility mode processes 2005-07-15 22:56:11 -07:00
tls32.c
vsyscall-sigreturn.S
vsyscall-syscall.S
vsyscall-sysenter.S
vsyscall.lds