Commit Graph

5 Commits

Author SHA1 Message Date
Ramesh Nallagopu
1145bbef01 dsp-kernel: Fix to use copy from user for compat invoke user pointers
When allocating context to copy the compat invoke call arguments data,
it incorrectly treats compat invoke call arguments as kernel memory,
leading to exceptions. The fix is to recognize them as userspace pointers.

Change-Id: I336b33156498103d3c3591768be98e0c105dda89
Signed-off-by: rnallago <quic_rnallago@quicinc.com>
2024-07-19 23:24:05 +05:30
Ramesh Nallagopu
e83cbc32d8 dsp-kernel: Fix memory leak in compact ioctl invoke
Currently, compact fastrpc ioctl functions allocate memory dynamically
and return without freeing this memory. Do memory free before return.

Change-Id: I4591ccc951e7e43362a4c2d9e0265c89ab8582f8
Signed-off-by: rnallago <quic_rnallago@quicinc.com>
2024-07-10 11:08:02 +05:30
Ramesh Nallagopu
c60ac212aa dsp-kernel: Fix to avoid untrusted pointer dereference
Currently, the compat ioctl call distinguishes itself using a global
flag. If a user sends a compat ioctl call followed by a normal ioctl
call, it may result in using a user passed address as a kernel address
in the fastrpcdriver. To address this issue, consider localizing the
compat flag for the ioctl call.

Change-Id: Ie8fc724424534102736b8c0bc594720547ab6ff6
Signed-off-by: rnallago <quic_rnallago@quicinc.com>
2024-07-03 20:16:16 +05:30
Vamsi Krishna Gattupalli
bfd12fbf25 msm: adsprpc: To avoid null pointer dereference
To log error for fastrpc_mmap_remove_ssr and
compat_fastrpc_get_dsp_info for avoiding null pointer
dereferences leading to kw issues.

Change-Id: I0f759ce5d9c3100a5cff3e61ad1499f6eb1b55dd
Signed-off-by: Ansa Ahmed <ansaahme@qti.qualcomm.com>
2023-01-31 23:44:36 -08:00
Anirudh Raghavendra
b0ee7bc076 adsprpc: Add initial src files to new target
Add fastrpc driver files to vendor branch

Change-Id: I852eee93cf6c0b2bc0833f9635f73b890de930da
Signed-off-by: Anirudh Raghavendra <quic_araghave@quicinc.com>
2022-08-12 17:41:38 -07:00