linux/drivers/android
Todd Kjos 0b0509508b binder: check for overflow when alloc for security context
When allocating space in the target buffer for the security context,
make sure the extra_buffers_size doesn't overflow. This can only
happen if the given size is invalid, but an overflow can turn it
into a valid size. Fail the transaction if an overflow is detected.

Signed-off-by: Todd Kjos <tkjos@google.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2019-04-25 21:26:49 +02:00
..
binder_alloc_selftest.c binder: fix sparse issue in binder_alloc_selftest.c 2019-02-14 08:13:56 +01:00
binder_alloc.c binder: fix race between munmap() and direct reclaim 2019-03-21 06:51:32 +01:00
binder_alloc.h binder: use userspace pointer as base of buffer space 2019-02-12 10:43:57 +01:00
binder_internal.h binderfs: remove separate device_initcall() 2019-02-01 15:50:26 +01:00
binder_trace.h binder: use userspace pointer as base of buffer space 2019-02-12 10:43:57 +01:00
binder.c binder: check for overflow when alloc for security context 2019-04-25 21:26:49 +02:00
binderfs.c binderfs: remove separate device_initcall() 2019-02-01 15:50:26 +01:00
Kconfig binder: add functions to copy to/from binder buffers 2019-02-12 10:43:57 +01:00
Makefile binder: implement binderfs 2018-12-19 09:40:13 +01:00