Skip to content
Snippets Groups Projects
  1. Aug 10, 2018
  2. Aug 09, 2018
  3. Aug 08, 2018
  4. Aug 07, 2018
  5. Aug 06, 2018
  6. Aug 03, 2018
  7. Aug 02, 2018
    • Sridhar Gujje's avatar
      Merge commit 'b469676f' into msm-4.9.c2 - PC212 · 03e09e93
      Sridhar Gujje authored
      
      * commit 'b469676f':
        Revert "msm: camera: isp: improve flush logic to prevent race condition"
        msm: camera: cpas: Modify error check
        msm: camera: Remove sysfs bind/unbind files
        msm: camera: isp: Fix race condition in tasklet stop
        msm: camera: sync: resolve race condition between merge and signal
        msm: camera: Check for valid per frame i2c data.
        msm: camera: jpeg: Fix flush with request id
        msm: camera: flash: Remove wrong bubble condition check
        msm: camera: eeprom: Memory allocation using vzalloc
        msm: camera: fix double free in jpeg mgr
        msm: camera: cpas: Update logic for reading hw version at runtime
        msm: camera: icp: icp log modification
        msm: camera: isp: Fix the return value for CDM timeout error
        msm: camera: cdm: Add log utility for CDM cmd buffers
        msm: camera: cci: Fix error check
        msm: camera: icp: Add release call
        msm: camera: Improve logging capability in kmd drivers
        msm: camera: Check for valid per frame i2c data.
        msm: camera: debugfs to update clk rates dynamically
        ARM: dts: msm: Add src clk name in csiphy node
        ARM: dts: msm: Add field to determine clock control
        msm: camera: Return IRQ_NONE from irq handlers
        msm: camera: Dynamically enable CSID SOF irq
        Revert "msm: camera: icp: removes reference input depedency"
        msm: camera: cpas: Add protection for concurrent execution
        msm: camera: sensor: Allocate buffer to be of DMA memory type
        msm: camera: Fix power related issues across sensor modules
        msm: camera: isp: acquire tasklet cmd before processing top half
        msm: camera: Fix for actuator manual move lens not working
        msm: camera: icp: removes reference input depedency
        msm: camera: isp: improve flush logic to prevent race condition
        msm: camera: sensor: Add support to vote for PWM mode
        msm: camera: icp: Handle Watchdog/subsystem failures
        msm: camera: reqmgr: Change state check in callbacks
        msm: camera: Correct check for rdi res_id
      
      Change-Id: Ifd92e6d8e8d1915c6fae5a2f6717c18b96f425cd
      Signed-off-by: default avatarSridhar Gujje <sgujje@codeaurora.org>
      03e09e93
    • AnilKumar Chimata's avatar
      qseecom: fix memory leak in qseecom_start_app() · fa91e2f0
      AnilKumar Chimata authored
      
      Fixes the incorrect return path in qseecom_start_app() function with
      proper clean-up. With out this patch, there are lot of memory leaks.
      
      Change-Id: Ied95480fa28b11efa3e53219102bfbe782921351
      Signed-off-by: default avatarAnilKumar Chimata <anilc@codeaurora.org>
      fa91e2f0
  8. Aug 01, 2018
  9. Jul 31, 2018
  10. Jul 30, 2018
  11. Jul 27, 2018
  12. Jul 26, 2018
    • Jigarkumar Zala's avatar
      msm: camera: Remove sysfs bind/unbind files · 8c26cab1
      Jigarkumar Zala authored
      
      This change disables dynamic bind/unbind capability for camera
      driver modules since it is not currently supported.
      
      Change-Id: I22a7490ae9670f6b4305356a2267a68d9781466b
      Signed-off-by: default avatarJigarkumar Zala <jzala@codeaurora.org>
      8c26cab1
    • Eric Biggers's avatar
      ASN.1: fix out-of-bounds read when parsing indefinite length item · af3f69ca
      Eric Biggers authored
      
      commit e0058f3a upstream.
      
      In asn1_ber_decoder(), indefinitely-sized ASN.1 items were being passed
      to the action functions before their lengths had been computed, using
      the bogus length of 0x80 (ASN1_INDEFINITE_LENGTH).  This resulted in
      reading data past the end of the input buffer, when given a specially
      crafted message.
      
      Fix it by rearranging the code so that the indefinite length is resolved
      before the action is called.
      
      This bug was originally found by fuzzing the X.509 parser in userspace
      using libFuzzer from the LLVM project.
      
      KASAN report (cleaned up slightly):
      
          BUG: KASAN: slab-out-of-bounds in memcpy ./include/linux/string.h:341 [inline]
          BUG: KASAN: slab-out-of-bounds in x509_fabricate_name.constprop.1+0x1a4/0x940 crypto/asymmetric_keys/x509_cert_parser.c:366
          Read of size 128 at addr ffff880035dd9eaf by task keyctl/195
      
          CPU: 1 PID: 195 Comm: keyctl Not tainted 4.14.0-09238-g1d3b78bbc6e9 #26
          Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-20171110_100015-anatol 04/01/2014
          Call Trace:
           __dump_stack lib/dump_stack.c:17 [inline]
           dump_stack+0xd1/0x175 lib/dump_stack.c:53
           print_address_description+0x78/0x260 mm/kasan/report.c:252
           kasan_report_error mm/kasan/report.c:351 [inline]
           kasan_report+0x23f/0x350 mm/kasan/report.c:409
           memcpy+0x1f/0x50 mm/kasan/kasan.c:302
           memcpy ./include/linux/string.h:341 [inline]
           x509_fabricate_name.constprop.1+0x1a4/0x940 crypto/asymmetric_keys/x509_cert_parser.c:366
           asn1_ber_decoder+0xb4a/0x1fd0 lib/asn1_decoder.c:447
           x509_cert_parse+0x1c7/0x620 crypto/asymmetric_keys/x509_cert_parser.c:89
           x509_key_preparse+0x61/0x750 crypto/asymmetric_keys/x509_public_key.c:174
           asymmetric_key_preparse+0xa4/0x150 crypto/asymmetric_keys/asymmetric_type.c:388
           key_create_or_update+0x4d4/0x10a0 security/keys/key.c:850
           SYSC_add_key security/keys/keyctl.c:122 [inline]
           SyS_add_key+0xe8/0x290 security/keys/keyctl.c:62
           entry_SYSCALL_64_fastpath+0x1f/0x96
      
          Allocated by task 195:
           __do_kmalloc_node mm/slab.c:3675 [inline]
           __kmalloc_node+0x47/0x60 mm/slab.c:3682
           kvmalloc ./include/linux/mm.h:540 [inline]
           SYSC_add_key security/keys/keyctl.c:104 [inline]
           SyS_add_key+0x19e/0x290 security/keys/keyctl.c:62
           entry_SYSCALL_64_fastpath+0x1f/0x96
      
      Fixes: 42d5ec27 ("X.509: Add an ASN.1 decoder")
      Reported-by: default avatarAlexander Potapenko <glider@google.com>
      Bug: 73827422
      Signed-off-by: default avatarEric Biggers <ebiggers@google.com>
      Signed-off-by: default avatarDavid Howells <dhowells@redhat.com>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      Change-Id: I1d286e1bd7d4a000d60420f7f8531161bdb35db3
      Git-repo: https://android.googlesource.com/kernel/msm
      
      
      Git-commit: 122b7139
      Signed-off-by: default avatarSrinivasa Rao Kuppala <srkupp@codeaurora.org>
      af3f69ca
    • Harsh Shah's avatar
      msm: camera: isp: Fix race condition in tasklet stop · e8c46e61
      Harsh Shah authored
      
      This change sets the atomic variable tasklet_active to 0 in
      stop before calling flush. This also adds call to tasklet_kill
      before tasklet_disable in stop. This will fix a race condition
      between tasklet stop/enqueue. And it will ensure the tasklet
      is correctly halted and will not be raised repeatedly.
      
      Change-Id: Ibf9f78b41e3201be50cdee8653dd4e64d2142fbd
      Signed-off-by: default avatarHarsh Shah <harshs@codeaurora.org>
      e8c46e61
    • Sameer Thalappil's avatar
      ARM: dts: msm: Add support for early assert indication · cc883ced
      Sameer Thalappil authored
      
      Add support for early WLAN FW assert indication thru smp2p.
      
      Change-Id: I38f0e42cf0f5e054e2c6d7caa58515842034bc48
      Signed-off-by: default avatarSameer Thalappil <sameert@codeaurora.org>
      cc883ced
  13. Jul 25, 2018
Loading