Commit graph

602786 commits

Author SHA1 Message Date
9b4bda65c0
Add Droidian packaging 2023-08-18 01:02:08 -07:00
637b83730f
Add Droidian kernel config 2023-08-18 00:59:51 -07:00
Jami Kettunen
fc45d1fa0f Enable overlay filesystem support
On UT 20.04 workaround-session-migration-mtime.service at least needs
it.
2023-06-13 03:29:09 +03:00
Florian Leeber
9773c06e8c
Restore the original scheduler for this device 2022-02-13 00:00:22 +01:00
Florian Leeber
8ea678f101 Apply patch for camera permissions
Change-Id: I9df1b906139df5dddbe590b0bd3e26cb2fa7f5c0
2022-01-20 21:37:12 +01:00
Florian Leeber
76ad1e02cd Try to enable Waydroid configs
Change-Id: Id753712f8cf42840e89a87bc9c1289c9ec2a0995
2021-12-24 22:24:35 +01:00
Florian Leeber
97a8e46bdb Make the same dirty hack as Erfan lol
Change-Id: Ic8539f23279dbd63e5106b916d7ec0c710dee0de
2021-06-17 23:34:57 +02:00
Florian Leeber
b786492b70 Fix binder transaction crash with ril
Change-Id: I8a494229220588cf1e6ea84ff89920740dd9102c
2021-05-11 00:13:50 +02:00
Florian Leeber
068b69ec9a Disable navigation events in fingerprint reader
Change-Id: I5e5a9eb96c830877232c505b31e3d4d10be35e3e
2021-03-03 00:06:51 +01:00
Florian Leeber
858c0364a0
Merge pull request #2 from JamiKettunen/fix-builtin-wlan
Fix and start using WLAN as a built-in again
2020-12-18 13:37:18 +01:00
Florian Leeber
eb589f1135
Merge pull request #1 from JamiKettunen/hide-mouse-cursor
Hide mouse cursor & fix building on recent binutils hosts such as Arch
2020-12-18 13:31:02 +01:00
Jami Kettunen
3278251d40
Build QCA WLAN driver as a built-in again as now it works 2020-12-18 13:17:20 +02:00
Sultanxda
3cb431c1a5
qcacld-3.0: Load driver on device initcall when not built as a module
Requiring userspace to write to /sys/kernel/boot_wlan/boot_wlan to boot
up the wlan device is unnecessary and blocks userspace for the large
amount of time it takes for wlan boot to finish.

Instead, load the driver asynchronously on device_initcall.

Change-Id: I4d696b9d46de032158fd223c60d9a7dbde26cc3f
Signed-off-by: Sultanxda <sultanxda@gmail.com>
Signed-off-by: Nathan Chancellor <natechancellor@gmail.com>
Signed-off-by: Jami Kettunen <jami.kettunen@protonmail.com>

Combines:
071d5c9cb3
aded485ca7
494bc76e6e
2020-12-18 13:17:17 +02:00
Jami Kettunen
b083a066c9
scripts/dtc: Remove redundant YYLOC global declaration
gcc 10 will default to -fno-common, which causes this error at link
time:

  (.text+0x0): multiple definition of `yylloc'; dtc-lexer.lex.o (symbol from plugin):(.text+0x0): first defined here

This is because both dtc-lexer as well as dtc-parser define the same
global symbol yyloc. Before with -fcommon those were merged into one
defintion. The proper solution would be to to mark this as "extern",
however that leads to:

  dtc-lexer.l:26:16: error: redundant redeclaration of 'yylloc' [-Werror=redundant-decls]
   26 | extern YYLTYPE yylloc;
      |                ^~~~~~
In file included from dtc-lexer.l:24:
dtc-parser.tab.h:127:16: note: previous declaration of 'yylloc' was here
  127 | extern YYLTYPE yylloc;
      |                ^~~~~~
cc1: all warnings being treated as errors

which means the declaration is completely redundant and can just be
dropped.

Signed-off-by: Dirk Mueller <dmueller@suse.com>
Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
[robh: cherry-pick from upstream]
Cc: stable@vger.kernel.org
Signed-off-by: Rob Herring <robh@kernel.org>
Change-Id: Ie5f32479b6fb948472bbfdec45a07c3728855c28
Signed-off-by: engstk <eng.stk@sapo.pt>
2020-12-18 02:42:10 +02:00
Jami Kettunen
606a5a6ef2
Disable HBTP mouse input driver to hide cursor shown on boot 2020-12-18 01:55:21 +02:00
Florian Leeber
29b22f6662 Disable rfkill for BT driver 2020-12-14 00:00:29 +01:00
Florian Leeber
693b6af586 Revert changes to BT power driver but leave VHCI on in defconfig 2020-12-13 23:59:10 +01:00
Florian Leeber
09e57d7cea Make WiFi driver a module (see also device tree) 2020-12-13 23:25:29 +01:00
Florian Leeber
e112aa84d8 Add Apparmor patches 2020-12-09 22:05:44 +01:00
Florian Leeber
7b86427e4c Enable VHCI Bluetooth interface and remove rfkill from it (interferes with flightmode) 2020-12-09 22:05:32 +01:00
Florian Leeber
105eb9b8eb Make touchpanel work 2020-12-09 18:27:23 +01:00
Florian Leeber
f46067aae5 Modify kernel config according kernel config checker 2020-12-09 18:27:11 +01:00
codeworkx
11c85590a0 Revert "Revert "msm: mdss: hdmi: skip pan_display during handoff""
This reverts commit ac0bcfe881.

Change-Id: I5ed3edd4cdd4a5f8026ba1b5b71c21248f0b1fe7
2019-08-30 09:28:28 +02:00
codeworkx
10ed5f7e10 staging: update wifi stack from LA.UM.7.4.r1-05500-8x98.0
Change-Id: I7e3b91dc20014d0c0ed763a7f98f53c3d4235474
2019-08-30 09:24:37 +02:00
E V Ravi
244c129b97 msm: ais: jpegdma: Added missing lock for dqbuf and streamon
Added missing lock to avoid race conditon for dqbuf and
streamon.

Change-Id: I260dfc964066ad68552dfab0c43584708cfc8b8e
Signed-off-by: E V Ravi <evenka@codeaurora.org>
2019-08-30 09:24:37 +02:00
Rajesh Kemisetti
a614a92c2a msm: kgsl: Fix race condition between drawobj and context destroy
drawobj_destroy_sync() tries to cancel all pending sync events
by taking local copy of pending list. In case of sync point timestamp
event, it goes ahead and accesses context's events list assuming that
event's context would be alive.

But at the same time, if the other context, which is of interest for
these sync point events, can be destroyed by cancelling all
events in its group.

This leads to use-after-free in drawobj_destroy_sync() path.

Fix is to give the responsibility of putting the context's ref count
to the thread which clears the pending mask.

Change-Id: I8d08ef6ddb38ca917f75088071c04727bced11d2
Signed-off-by: Rajesh Kemisetti <rajeshk@codeaurora.org>
2019-08-30 09:24:37 +02:00
Manikanta Kanamarlapudi
1fff932af1 msm: vidc: Add checks to avoid OOB access
validate structures and payload sizes in the
packet against packet size to avoid OOB access.

Change-Id: Id44e5c6be4dde3e6545d453f5edd3219776a4e58
Signed-off-by: Manikanta Kanamarlapudi <kmanikan@codeaurora.org>
Signed-off-by: Sanjay Singh <sisanj@codeaurora.org>
2019-08-30 09:24:36 +02:00
Priyanka Gujjula
c748783b7b msm: vidc: Avoid information leak while accessing the packet
Use trusted packet size on the received packet and check for
the size of the data received against the expected size
before accessing the packet.

Change-Id: I1bd6008249a0bf4edeec711ec8d23cf7b8dac1f1
Signed-off-by: Priyanka Gujjula <pgujjula@codeaurora.org>
2019-08-30 09:24:36 +02:00
Hardik Arya
c7ba613752 diag: Prevent out-of-bound access while processing dci transaction
Proper buffer length check is missing for dci userspace data
buffer before processing the dci transaction. The patch adds
proper check for the same.

Change-Id: I68c0e8c41d4e05493adecf8a1fcacea708dfafa2
Signed-off-by: Hardik Arya <harya@codeaurora.org>
2019-08-30 09:24:36 +02:00
Aditya Bavanari
92ba699743 ASoC: msm: qdsp6v2: Remove param_size from pkt_size of apr header
As param_size is included in apr header pkt_size, out of
bounds access occurs in glink. Remove the param size addition
to fix this issue.

CRs-Fixed: 2472208
Change-Id: If8b34aeacd3bc9ba67ac9276eb1a8ebf0933f9f9
Signed-off-by: Aditya Bavanari <abavanar@codeaurora.org>
2019-08-30 09:24:36 +02:00
Govindaraj Rajagopal
ba4427e9ef msm: vidc: add additional check to avoid out of bound access
pkt->msg_size can be corrupted and that leads to OOB access. So added
additional conditional check to avoid OOB access in debug queue
packet handling.

Change-Id: I360812c40369ecef2dd99464d400661bc785074b
Signed-off-by: Govindaraj Rajagopal <grajagop@codeaurora.org>
Signed-off-by: Sanjay Singh <sisanj@codeaurora.org>
2019-08-30 09:24:36 +02:00
raghavendra ambadas
65638ab69c fbdev: msm: check for hdmi as primary
skip pan display operation if found hdmi as primary
and handoff is pending. This check will help pan display path
to execute for primary display in recovery mode.

Change-Id: Iedd7e6b98f62d3a0d5b9cdda4ba4591ed8bfac68
Signed-off-by: Raghavendra Ambadas <rambad@codeaurora.org>
2019-08-30 09:24:31 +02:00
VijayaKumar T M
2b43f489a3 msm: camera: jpegdma: Added missing lock for dqbuf and streamon
Added missing lock to avoid race conditon for dqbuf and
streamon

CRs-Fixed: 2376566
Change-Id: I1c0ef9014914a9892c4d443600618c52d0aeebfa
Signed-off-by: VijayaKumar T M <vtmuni@codeaurora.org>
2019-08-30 09:21:11 +02:00
raghavendra ambadas
3b5389da43 fbdev: msm: check the length of the external input buffer properly
dchdr->dlen is a short variable controlled by the user-provided data.
If the value is negative, loop continues, also increasing the value
of "len". As a result buffer overflow occurs. So define the len as
unsigned and check with length of string input from user space.

Change-Id: I8bb9ab33d543c826eb330e16ae116385d823ca98
Signed-off-by: raghavendra ambadas <rambad@codeaurora.org>
2019-08-30 09:21:11 +02:00
Nirmal Abraham
9e11c9b247 drm/msm/dsi-staging: Add range check in debugfs_dump_info_read
Add a check to make sure that the length of bytes copied
to the destination buffer doesn't exceed the requested
buffer length before calling the copy_to_user to avoid
buffer overflow.

Change-Id: Icd65b9be2791a8a487dfc8d7461aadce61de3f1b
Signed-off-by: Nirmal Abraham <nabrah@codeaurora.org>
2019-08-30 09:21:11 +02:00
Yueyi Li
d598338175 arm64: kaslr: Reserve size of ARM64_MEMSTART_ALIGN in linear region
When KASLR is enabled (CONFIG_RANDOMIZE_BASE=y), the top 4K of kernel
virtual address space may be mapped to physical addresses despite being
reserved for ERR_PTR values.

Fix the randomization of the linear region so that we avoid mapping the
last page of the virtual address space.

Change-Id: I3035dbe8e64b2a31f5d56b7dc29366958adda6ce
Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Signed-off-by: liyueyi <liyueyi@live.com>
[will: rewrote commit message; merged in suggestion from Ard]
Signed-off-by: Will Deacon <will.deacon@arm.com>
Git-commit: c8a43c18a97845e7f94ed7d181c11f41964976a2
Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
Signed-off-by: Vinayak Menon <vinmenon@codeaurora.org>
2019-08-30 09:21:10 +02:00
Rajesh Kemisetti
8774e7b998 msm: kgsl: Add missing check for snapshot IB dump
During ringbuffer parsing, same IB can exist multiple times
but size validation happens only for the first time.
This leads to out of bound access if the subsequent sizes are
greater than the allocated size.

Add a check to make sure that requested size is within the
allocated range.

Change-Id: Ie5d3c02c1669de2e6188821399e985f0991aa57c
Signed-off-by: Rajesh Kemisetti <rajeshk@codeaurora.org>
2019-08-30 09:21:10 +02:00
Srinivas Dasari
350a145574 cfg80211: indicate support for external authentication
Define macro to indicate backport support for
external authentication where authentication can be
offloaded to userspace in specific cases such as SAE.

Change-Id: Ib253b303e82f583f61bc13d14c8d491d5ea2af15
CRs-Fixed: 2468738
Signed-off-by: Srinivas Dasari <dasaris@codeaurora.org>
Signed-off-by: Jiachao Wu <jiacwu@codeaurora.org>
Signed-off-by: Min Liu <minliu@codeaurora.org>
Signed-off-by: stonez <stonez@codeaurora.org>
2019-08-30 09:21:10 +02:00
Pavankumar Kondeti
97fe3984e9 sched/walt: Fix the memory leak of idle task load pointers
The memory for task load pointers are allocated twice for each
idle thread except for the boot CPU. This happens during boot
from idle_threads_init()->idle_init() in the following 2 paths.

1. idle_init()->fork_idle()->copy_process()->
		sched_fork()->init_new_task_load()

2. idle_init()->fork_idle()-> init_idle()->init_new_task_load()

The memory allocation for all tasks happens through the 1st path,
so use the same for idle tasks and kill the 2nd path. Since
the idle thread of boot CPU does not go through fork_idle(),
allocate the memory for it separately.

Change-Id: I4696a414ffe07d4114b56d326463026019e278f1
Signed-off-by: Pavankumar Kondeti <pkondeti@codeaurora.org>
[schikk@codeaurora.org: resolved merge conflicts]
Signed-off-by: Swetha Chikkaboraiah <schikk@codeaurora.org>
2019-08-30 09:21:10 +02:00
Srinivas Dasari
18716efa40 nl80211: Allow SAE Authentication for NL80211_CMD_CONNECT
This commit allows SAE Authentication for NL80211_CMD_CONNECT
interface, provided host driver advertises the support.

Host drivers may offload the SAE authentication to user space
through NL80211_CMD_EXTERNAL_AUTH interface and thus expect
the user space to advertise support to handle offload through
NL80211_ATTR_EXTERNAL_AUTH_SUPPORT in NL80211_CMD_CONNECT
request. Such drivers should reject the connect request on no
offload support from user space.

Signed-off-by: Srinivas Dasari <dasaris@qti.qualcomm.com>
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Git-commit: 10773a7c09b327d02144c7d181e6544b7015ffc7
Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
CRs-Fixed: 2468738
Change-Id: I41b49228e88b32a35323c4dc8fa98e507a8a971d
Signed-off-by: Srinivas Dasari <dasaris@codeaurora.org>
Signed-off-by: Jiachao Wu <jiacwu@codeaurora.org>
Signed-off-by: Min Liu <minliu@codeaurora.org>
Signed-off-by: stonez <stonez@codeaurora.org>
2019-08-30 09:21:10 +02:00
Srinivas Dasari
3edd7e38cf cfg80211/nl80211: Optional authentication offload to userspace
This interface allows the host driver to offload the authentication to
user space. This is exclusively defined for host drivers that do not
define separate commands for authentication and association, but rely on
userspace SME (e.g., in wpa_supplicant for the ~WPA_DRIVER_FLAGS_SME
case) for the authentication to happen. This can be used to implement
SAE without full implementation in the kernel/firmware while still being
able to use NL80211_CMD_CONNECT with driver-based BSS selection.

Host driver sends NL80211_CMD_EXTERNAL_AUTH event to start/abort
authentication to the port on which connect is triggered and status
of authentication is further indicated by user space to host
driver through the same command response interface.

User space entities advertise this capability through the
NL80211_ATTR_EXTERNAL_AUTH_SUPP flag in the NL80211_CMD_CONNECT request.
Host drivers shall look at this capability to offload the authentication.

Signed-off-by: Srinivas Dasari <dasaris@qti.qualcomm.com>
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
[add socket connection ownership check]
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Git-commit: 40cbfa90218bc570a7959b436b9d48a18c361041
Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
CRs-Fixed: 2468738
Change-Id: Id925dd82d9a9c719b32aac2de75b6ad001f1a958
[dasaris@codeaurora.org: merging with msm-specific changes]
Signed-off-by: Srinivas Dasari <dasaris@codeaurora.org>
Signed-off-by: Jiachao Wu <jiacwu@codeaurora.org>
Signed-off-by: Min Liu <minliu@codeaurora.org>
Signed-off-by: stonez <stonez@codeaurora.org>
2019-08-30 09:21:10 +02:00
Srinivas Dasari
8cb175043f cfg80211: Updated nl80211_commands to be in sync with upstream
Update nl80211_commands to be in sync with upstream.
This is needed to add new commands.

Change-Id: Ib6b71e3f66560b035377c7bc0c115490b04f5c4f
CRs-Fixed: 2468738
Signed-off-by: Srinivas Dasari <dasaris@codeaurora.org>
Signed-off-by: stonez <stonez@codeaurora.org>
2019-08-30 09:21:10 +02:00
Pranav Vashi
7f0b81a71f usb: dwc3-msm: adapt enum otg_state to drd_state
Signed-off-by: Pranav Vashi <neobuddy89@gmail.com>
2019-08-10 14:29:01 +02:00
codeworkx
4b5255f5eb Revert "msm: camera: isp: Fix frame drop pattern"
This reverts commit cc4d1a6cb1.
2019-08-10 14:20:12 +02:00
codeworkx
f6334e63fa Merge tag 'LA.UM.7.4.r1-05400-8x98.0' into lineage-16.0
"LA.UM.7.4.r1-05400-8x98.0"

Change-Id: Iaa6db184c519b1a6f8de9b989ba402f156bec25c
2019-08-10 14:13:49 +02:00
Alistair Strachan
88950d5914 media: uvcvideo: Fix 'type' check leading to overflow
commit 47bb117911b051bbc90764a8bff96543cbd2005f upstream.

When initially testing the Camera Terminal Descriptor wTerminalType
field (buffer[4]), no mask is used. Later in the function, the MSB is
overloaded to store the descriptor subtype, and so a mask of 0x7fff
is used to check the type.

If a descriptor is specially crafted to set this overloaded bit in the
original wTerminalType field, the initial type check will fail (falling
through, without adjusting the buffer size), but the later type checks
will pass, assuming the buffer has been made suitably large, causing an
overflow.

Avoid this problem by checking for the MSB in the wTerminalType field.
If the bit is set, assume the descriptor is bad, and abort parsing it.

Originally reported here:
https://groups.google.com/forum/#!topic/syzkaller/Ot1fOE6v1d8
A similar (non-compiling) patch was provided at that time.

Change-Id: Icedffeb8d406351675f5195fdd9000a644d07b95
Reported-by: syzbot <syzkaller@googlegroups.com>
Signed-off-by: Alistair Strachan <astrachan@google.com>
Signed-off-by: Laurent Pinchart <laurent.pinchart@ideasonboard.com>
Signed-off-by: Mauro Carvalho Chehab <mchehab+samsung@kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2019-08-09 17:59:09 +02:00
codeworkx
2b6f677357 Update wifi stack from LA.UM.7.4.r1-05400-8x98.0
Change-Id: I7e46d6e7c3c73ead5c66d10ee2955c8a8f3f5292
2019-07-20 07:14:53 +02:00
Tyler Nijmeh
a84f38de6b qcacld-3.0: Do not allow any wakelocks to be held
These contribute to a great amount of idle drain.

Tests: 30 minutes of playing Spotify with the screen off, unplugged.

Change-Id: Ibe62c631fd93de99d71d56ee6cb2387571f71d34
Signed-off-by: Tyler Nijmeh <tylernij@gmail.com>
2019-07-09 15:13:32 -07:00
Sultan Alsawaf
c9d0aae63a qcacld-3.0: Fix null pointer dereference in htt_rx_amsdu_rx_in_order_pop_ll()
Change-Id: Idde12e970e4915f038ed6bccf3a8d7012d7cff11
2019-07-09 15:12:08 -07:00
Linux Build Service Account
5ef8738b63 Merge commit '7b96ca1e7fcd95dbd20d460d19b52675edbe906f' into HEAD
Change-Id: I7a812ced03187bac71f367c9da461676237c5aa8
2019-07-05 17:03:31 +05:30