Skip to content
Snippets Groups Projects
  1. Jul 27, 2018
  2. Jul 25, 2018
    • Zhen Kong's avatar
      qseecom: abort all listener threads before listener unregistration · 8d2c5e2d
      Zhen Kong authored
      
      Wake up and abort all busy listener processing threads before listener
      unregistration, then to avoid deadlock between listener unregistration
      and listener processing threads, as mutex may be hold by another busy
      listener thread when qseecom gets a listener unregistration request or
      qseecom daemon is dead.
      
      Change-Id: I6b6ddb34eb6bcff763e3d13f026c4b2f4bcb32a9
      Signed-off-by: default avatarZhen Kong <zkong@codeaurora.org>
      8d2c5e2d
  3. Jul 23, 2018
  4. Jul 20, 2018
  5. Jul 19, 2018
  6. Jul 18, 2018
  7. Jul 17, 2018
  8. Jul 16, 2018
    • Sridhar Gujje's avatar
      Merge commit '6fe599d9' into msm-4.9.c2 - PC200.1 · 6c63047d
      Sridhar Gujje authored
      
      * commit '6fe599d9':
        msm: camera: icp: Dump hfi queues in case of FW timeout
        msm: camera: sensor: Correct spelling error
        msm: camera: icp: allow reconfig io during streaming
        msm: camera: sync: Protect row state read
        ARM: dts: msm: Add register base address for sdm670/sdm845
        msm: camera: reqmgr: Create workq based on driver requirement
        msm: camera: flash: Optimizing flash off operation
        msm: camera: isp: Fix TPG acquire error
        msm: camera: ife: Changes CSID acquire resource logic
        msm: camera: util: validate patch offset value
        msm: camera: isp: Initialize used_bytes to avoid corruption
        msm: camera: sensor: Unlock the mutex in case of error
        msm: camera: sensor: Assign power settings pointer to null
        ARM: dts: msm: Modify qdss region for sdm670/sdm845
        msm: camera: sync: use lock to protect row state read
      
      Change-Id: Ic8ecc6dc071d06307aca948eaa99b30ad035a32e
      Signed-off-by: default avatarSridhar Gujje <sgujje@codeaurora.org>
      6c63047d
    • Sachin Grover's avatar
      selinux: KASAN: slab-out-of-bounds in xattr_getsecurity · 51278498
      Sachin Grover authored
      
      Call trace:
       [<ffffff9203a8d7a8>] dump_backtrace+0x0/0x428
       [<ffffff9203a8dbf8>] show_stack+0x28/0x38
       [<ffffff920409bfb8>] dump_stack+0xd4/0x124
       [<ffffff9203d187e8>] print_address_description+0x68/0x258
       [<ffffff9203d18c00>] kasan_report.part.2+0x228/0x2f0
       [<ffffff9203d1927c>] kasan_report+0x5c/0x70
       [<ffffff9203d1776c>] check_memory_region+0x12c/0x1c0
       [<ffffff9203d17cdc>] memcpy+0x34/0x68
       [<ffffff9203d75348>] xattr_getsecurity+0xe0/0x160
       [<ffffff9203d75490>] vfs_getxattr+0xc8/0x120
       [<ffffff9203d75d68>] getxattr+0x100/0x2c8
       [<ffffff9203d76fb4>] SyS_fgetxattr+0x64/0xa0
       [<ffffff9203a83f70>] el0_svc_naked+0x24/0x28
      
      If user get root access and calls security.selinux setxattr() with an
      embedded NUL on a file and then if some process performs a getxattr()
      on that file with a length greater than the actual length of the string,
      it would result in a panic.
      
      To fix this, add the actual length of the string to the security context
      instead of the length passed by the userspace process.
      
      Change-Id: Ie0b8bfc7c96bc12282b955fb3adf41b3c2d011cd
      Signed-off-by: default avatarSachin Grover <sgrover@codeaurora.org>
      51278498
  9. Jul 12, 2018
  10. Jul 10, 2018
  11. Jul 09, 2018
  12. Jul 07, 2018
  13. Jul 06, 2018
  14. Jul 05, 2018
Loading