Enable secure context bank of smmu domain to facilitate the
secure display usecases.
Change-Id: I2dea0b7d7a57558070a3f9b726d8e2d3d541521b
Signed-off-by: Rahul Sharma <rahsha@codeaurora.org>
Update Client-id for sde_kms_hyp node in LA-GVM.
This is required for MTMD feature.
Change-Id: I97c4c55b94173f4cc08d739974a11b9dd3a80ea3
Signed-off-by: Vivek Kumar <vivekuma@codeaurora.org>
All guest VMs use the same HAB id for communication
with QCPE.
Change-Id: I01ed16376730276f13a734b82d387b1d30d14434
Signed-off-by: Amit Blay <ablay@codeaurora.org>
cnss_genl driver creates a netlink family and multicast groups
to facilitate communication between WLAN driver and userspace.
Define flag CONFIG_CNSS_GENL and set to 'y'(yes) to enable
compilation of the cnss_genl driver inorder to use the same
Change-Id: Ideb929ad36fd0dde38a10741a6bc288fa1949d8e
Signed-off-by: Srinivas Dasari <dasaris@codeaurora.org>
CRs-Fixed: 2124466
Fix place_marker function definition when MSM_BOOT_TIMER_MARKER is
disabled.
Change-Id: I201ea0a2b78e310016f847c615254f6ee8273b6f
Signed-off-by: Vivek Kumar <vivekuma@codeaurora.org>
defconfigs which are required for USB Passthrough
in LA-GVM are enabled.
Change-Id: I20805eb4ff082e69ac47ea16165004935e3a7b4a
Signed-off-by: Vivek Kumar <vivekuma@codeaurora.org>
Enable PMIC-GPIO clients in la-dts file which are on SMPI bus
for msm8996 GVM.These clients use virtual spmi-arb driver.
Change-Id: I6e6da2ac77a0fffea548e777b5dba9239cf76a18
Signed-off-by: Vivek Kumar <vivekuma@codeaurora.org>
Enable blsp_uart device node for uart-passthrough in
la-gvm specific DT file for msm8996 GVM.
Change-Id: I3907e982573f3052e56fcfdd19c76822d336aa14
Signed-off-by: Vivek Kumar <vivekuma@codeaurora.org>
Add USB device for android in USB specific DT file.
Enable required devices for USB pass-through in LA
specific DT file for msm8996 GVM.
Change-Id: Ic007607dcfb2dd8ee9839ad58d451b6a98c5fb06
Signed-off-by: Vivek Kumar <vivekuma@codeaurora.org>
The mac80211 support user configured wowlan enable/disable
feature using wlan utils, If the wowlan feature is not enabled
by user the mac80211 subsystem fallback to core stop instead
of wow suspend during system suspend even the wlan firmware
support wowlan feature.
So in driver load init wow and set the wlan device as a wakeup
capable device and deinit wow in driver unload.
CRs-Fixed: 2218083
Change-Id: I5ac5b6e0118f8a3dd01cfbdd706f56fa33b3e101
Signed-off-by: Sarada Prasanna Garnayak <sgarna@codeaurora.org>
This change adds the missing documentation related to
device tree bindings for android-usb functionality.
Change-Id: Iee24c0a6a333792983a5bea00adaa9a697ab70e3
Signed-off-by: Vivek Kumar <vivekuma@codeaurora.org>
This warning is causing unnecessary triage for any test reports.
Change-Id: Iec47d217264e1b98b1fbe62c0ba9ef47aa41af9c
Signed-off-by: Shiju Mathew <shijum@codeaurora.org>
On Mojave board, hotplug-able memory size is 256 MB. This depends
on DDR configuration. Configure HOTPLUG_SIZE_BITS to match this.
Change-Id: I014be9240f665cb1754fe701b4d57cf898b5f693
Signed-off-by: Arun KS <arunks@codeaurora.org>
voice_svc_dev is allocated as a device managed resource
and need not be freed since it is freed automatically.
Remove the logic to free voice_svc_dev in probe failure
and remove functions to avoid double free.
CRs-Fixed: 2204285
Change-Id: If4f9ca840b00448b987f5ce443f66b0923b01969
Signed-off-by: Aditya Bavanari <abavanar@codeaurora.org>
Virtual clock operations returned error when received signal.
Uninterruptible flag is added in receiving response to avoid
being interrupted by signal.
Change-Id: Id3b5b56432751ec5b49c36a028444c0360fe811f
Signed-off-by: Zhiqiang Tu <ztu@codeaurora.org>
In the blocking mode of habmm_socket_recv(), it is an
interruptible wait by default. Here, the uninterruptible
version is added.
Change-Id: Iba9ee10afb3f2529a99a9c90f6fc0cb56fb9cb08
Signed-off-by: Yong Ding <yongding@codeaurora.org>
On arm64, currently section size is hard-coded to 1G.
Make this configurable if hotplug is enabled to support
more finer granularity for hotplug-able memory.
Change-Id: I5327ead37069176f4ba34657133fab303fb15b82
Signed-off-by: Arun KS <arunks@codeaurora.org>
In case of poweroff charging mode, accessory function instance
is not created and due to this, _acc_dev will be NULL. If target
is connected to Accessory dock in poweroff charging mode, there
is a chance dev pointer is accessed, which is NULL. Hence add a
check before processing control request and return error if it is
NULL.
Change-Id: I4f1deb9d764b8c0bd1d7837cbc43a2933167f568
Signed-off-by: Vijayavardhan Vennapusa <vvreddy@codeaurora.org>
In IPV6 the neighbor solicitations are used by nodes to determine
the link layer address of a neighbor and neighbor advertisements
are used by nodes to respond to a neighbor solicitation message.
During WOW suspend offload the neighbor solicitation packet handling
method to WLAN firmware, this adds support to prevent the device
wakeup by neighbor solicitation packet.
CRs-Fixed: 2217590
Change-Id: I5d860e6651b7c62223d9d00886fc386dcf647cab
Signed-off-by: Sarada Prasanna Garnayak <sgarna@codeaurora.org>
Add device node qualcomm hardware random generator, so that to provide
real random number if qrng is enabled.
This is for security purpose for the application.
Change-Id: Ib359b39ec5c32cb05ed1e38c1ad377657e5c47ae
Signed-off-by: Parai Wang <fpwang@codeaurora.org>
sdcardfs_name_match gets a 'name' argument from the underlying FS.
This need not be null terminated string.
So in sdcardfs_name_match -> qstr_case_eq -> we should use
str_n_case_eq.
This happens because few of the entries in lower level FS may not be
NULL terminated and may have some garbage characters passed while
doing sdcardfs_name_match.
For e.g.
# dmesg |grep Download
[ 103.646386] sdcardfs_name_match: q1->name=.nomedia, q1->len=8,
q2->name=Download\x17\x80\x03, q2->len=8
[ 104.021340] sdcardfs_name_match: q1->name=.nomedia, q1->len=8,
q2->name=Download\x17\x80\x03, q2->len=8
[ 105.196864] sdcardfs_name_match: q1->name=.nomedia, q1->len=8,
q2->name=Download\x17\x80\x03, q2->len=8
[ 109.113521] sdcardfs_name_match: q1->name=logs, q1->len=4,
q2->name=Download\x17\x80\x03, q2->len=8
Now when we try to create a directory with different case for a such
files. SDCARDFS creates a entry if it could not find the underlying
entry in it's dcache.
To reproduce:-
1. bootup the device wait for some time after sdcardfs mounting to
complete.
2. cd /storage/emulated/0
3. echo 3 > /proc/sys/vm/drop_caches
4. mkdir download
We now start seeing two entries with name.
Download & download.
Change-Id: I976d92a220a607dd8cdb96c01c2041c5c2bc3326
Signed-off-by: Ritesh Harjani <riteshh@codeaurora.org>
Modified conditional checks to read lm_sequence so as to avoid
the possibility of pointer overflow.
CRs-Fixed: 2212443
Change-Id: I72b30e35996c40f23fc81739e27724b1188f1c05
Signed-off-by: Archana Sriram <apsrir@codeaurora.org>
Notify the frame drop using ioctl
VIDIOC_MSM_BUF_MNGR_BUF_ERROR
Change-Id: Ide54d98fd05e19f5e2d7e88b6b65e151aa257334
Signed-off-by: annamraj <annamraj@codeaurora.org>
page allocated in fuse_dentry_canonical_path to be handled in
fuse_dev_do_write is allocated using __get_free_pages(GFP_KERNEL).
This may not return a page with data filled with 0. Now this
page may not have a null terminator at all.
If this happens and userspace fuse daemon screws up by passing a string
to kernel which is not NULL terminated (or did not fill anything),
then inside fuse driver in kernel when we try to do
strlen(fuse_dev_write->kern_path->getname_kernel)
on that page data -> it may give us issue with kernel paging request.
Unable to handle kernel paging request at virtual address
------------[ cut here ]------------
<..>
PC is at strlen+0x10/0x90
LR is at getname_kernel+0x2c/0xf4
<..>
strlen+0x10/0x90
kern_path+0x28/0x4c
fuse_dev_do_write+0x5b8/0x694
fuse_dev_write+0x74/0x94
do_iter_readv_writev+0x80/0xb8
do_readv_writev+0xec/0x1cc
vfs_writev+0x54/0x64
SyS_writev+0x64/0xe4
el0_svc_naked+0x24/0x28
To avoid this we should ensure in case of FUSE_CANONICAL_PATH,
the page is null terminated.
Change-Id: I33ca7cc76b4472eaa982c67bb20685df451121f5
Bug: 75984715
[Daniel - small edit, using args size ]
Signed-off-by: Daniel Rosenberg <drosen@google.com>
Git-Repo: https://source.codeaurora.org/quic/la/kernel/msm-4.9/commit/?h=aosp-new/android-4.9&id=4fb542f2aa1414cea5686efcf72a411b7213c375
Git-Commit: 4fb542f2aa1414cea5686efcf72a411b7213c375
Signed-off-by: Ritesh Harjani <riteshh@codeaurora.org>