From 32a6800a4198273386510b991fee7ab3d90a4afd Mon Sep 17 00:00:00 2001 From: Felix Fietkau Date: Thu, 19 Mar 2015 11:58:59 +0000 Subject: kernel: remove linux 3.8 support Signed-off-by: Felix Fietkau SVN-Revision: 44890 --- ...-mpcore_wdt_fix_wdioc_setoptions_handling.patch | 29 ---------------------- 1 file changed, 29 deletions(-) delete mode 100644 target/linux/generic/patches-3.8/993-mpcore_wdt_fix_wdioc_setoptions_handling.patch (limited to 'target/linux/generic/patches-3.8/993-mpcore_wdt_fix_wdioc_setoptions_handling.patch') diff --git a/target/linux/generic/patches-3.8/993-mpcore_wdt_fix_wdioc_setoptions_handling.patch b/target/linux/generic/patches-3.8/993-mpcore_wdt_fix_wdioc_setoptions_handling.patch deleted file mode 100644 index c986ac8f21..0000000000 --- a/target/linux/generic/patches-3.8/993-mpcore_wdt_fix_wdioc_setoptions_handling.patch +++ /dev/null @@ -1,29 +0,0 @@ -According to the include/linux/watchdog.h WDIOC_SETOPTIONS is -classified as 'read from device' ioctl call: - #define WDIOC_SETOPTIONS _IOR(WATCHDOG_IOCTL_BASE, 4, int) - -However, the driver 'mpcore_wdt' performs 'copy_from_user' only if -_IOC_WRITE is set, thus the local variable 'uarg' which is used in -WDIOC_SETOPTIONS handling remains uninitialized. - -The proper way to fix this is to bind WDIOC_SETOPTIONS to _IOW, -but this will break compatibility. -So adding additional condition for performing 'copy_from_user'. - -Signed-off-by: Vitaly Kuzmichev ---- - drivers/watchdog/mpcore_wdt.c | 3 ++- - 1 files changed, 2 insertions(+), 1 deletions(-) - ---- a/drivers/watchdog/mpcore_wdt.c -+++ b/drivers/watchdog/mpcore_wdt.c -@@ -235,7 +235,8 @@ static long mpcore_wdt_ioctl(struct file - if (_IOC_DIR(cmd) && _IOC_SIZE(cmd) > sizeof(uarg)) - return -ENOTTY; - -- if (_IOC_DIR(cmd) & _IOC_WRITE) { -+ if ((_IOC_DIR(cmd) & _IOC_WRITE) -+ || cmd == WDIOC_SETOPTIONS) { - ret = copy_from_user(&uarg, (void __user *)arg, _IOC_SIZE(cmd)); - if (ret) - return -EFAULT; -- cgit v1.2.3