> This is another patch about making a copy of the data into kernel space > before using it. It is easy to trigger a kernel oops in the original > code. If you passed a NULL to SNDRV_SST_SET_TARGET_DEVICE then it > called BUG_ON(). And SNDRV_SST_DRIVER_INFO would let you write the > information to arbitrary memory locations which is a security violation. > > Signed-off-by: Dan Carpenter <error27@xxxxxxxxx> Acked by: Vinod Koul <Vinod.koul@xxxxxxxxx> ~Vinod -- To unsubscribe from this list: send the line "unsubscribe kernel-janitors" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html