lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 11 Sep 2013 09:32:53 +1000 From: Ryan Mallon <rmallon@...il.com> To: dmitry.torokhov@...il.com, rydberg@...omail.se Cc: carl@...labs.com, linux-input@...r.kernel.org, linux-kernel@...r.kernel.org, Ryan Mallon <rmallon@...il.com> Subject: [PATCH 2/2] uinput: Use input_inject_event in uinput_inject_event Call input_inject_event rather than input_event in uinput_inject_event. This mirrors the behaviour of evdev_write. input_inject_event will ignore the injected event if the uinput input device has been grabbed for exclusive access by a handler other than uinput. Signed-off-by: Ryan Mallon <rmallon@...il.com> --- drivers/input/misc/uinput.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/input/misc/uinput.c b/drivers/input/misc/uinput.c index 6aea346..0962ecb 100644 --- a/drivers/input/misc/uinput.c +++ b/drivers/input/misc/uinput.c @@ -443,7 +443,7 @@ static ssize_t uinput_inject_event(struct uinput_device *udev, if (input_event_from_user(buffer + bytes, &ev)) return -EFAULT; - input_event(udev->dev, ev.type, ev.code, ev.value); + input_inject_event(udev->dev, ev.type, ev.code, ev.value); bytes += input_event_size(); } -- 1.7.9.7 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists