mirror of
https://github.com/followmsi/android_kernel_google_msm.git
synced 2024-11-06 23:17:41 +00:00
USB: resizing usbmon binary interface buffer causes protection faults
Enlarging the buffer size via the MON_IOCT_RING_SIZE ioctl causes general protection faults. It appears the culprit is an incorrect argument to mon_free_buff: instead of passing the size of the current buffer being freed, the size of the new buffer is passed. Use the correct size argument to mon_free_buff when changing the size of the buffer. Signed-off-by: Steven Robertson <steven@strobe.cc> Acked-by: Pete Zaitcev <zaitcev@redhat.com> Cc: stable <stable@kernel.org> Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
This commit is contained in:
parent
92eb2a5e53
commit
33d973ad88
1 changed files with 1 additions and 1 deletions
|
@ -1004,7 +1004,7 @@ static long mon_bin_ioctl(struct file *file, unsigned int cmd, unsigned long arg
|
|||
|
||||
mutex_lock(&rp->fetch_lock);
|
||||
spin_lock_irqsave(&rp->b_lock, flags);
|
||||
mon_free_buff(rp->b_vec, size/CHUNK_SIZE);
|
||||
mon_free_buff(rp->b_vec, rp->b_size/CHUNK_SIZE);
|
||||
kfree(rp->b_vec);
|
||||
rp->b_vec = vec;
|
||||
rp->b_size = size;
|
||||
|
|
Loading…
Reference in a new issue