-----BEGIN PGP SIGNATURE-----
iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCWxWzwwAKCRDorT+BmrEO
eEmGAJ9Y4YMBAgQmIsz5GjbvNk3Kqu3RGACdEcAsk2is8cSq1kKvF6Hmlappr3w=
=pyl6
-----END PGP SIGNATURE-----
Merge aosp tag 'android-8.1.0_r0.62' into lineage-15.1
June 2018 OPM6.171019.030.B1
f7affbf Revert "ion: ensure CMO target is valid"
71a0cf4 msm: ADSPRPC: Use ID in response to get context pointer
1c03a6d qcacld-2.0: Fix potential buffer overwrite in the htt_t2h_lp_msg_handler
0963d6e qcacld-2.0: Add data_len check to avoid OOB access
b85cb60 BACKPORT: ASN.1: fix out-of-bounds read when parsing indefinite length item
e26c230 UPSTREAM: KEYS: fix out-of-bounds read during ASN.1 parsing
758fa30 qcacld-2.0: Fix potential buffer overflow
88e7e58 ion: ensure CMO target is valid
8aae2ec crypto: hmac - require that the underlying hash algorithm is unkeyed
a343e34 qcacld-2.0: Move NBUF_UPDATE_TX_PKT_COUNT before freeing netbuf
7970e95 diag: dci: check signed values for negativity
58e7effd diag: Add conditional check for len in dci_process_ctrl_status()
1cc5ac5 diag: Validate copying length against source buffer length
7e15586 mm-camera2:isp2: Handle use after free buffer
2b052636 ANDROID: Bluetooth: hidp: buffer overflow in hidp_process_report
bbee8ff UPSTREAM: HID: Bluetooth: hidp: make sure input buffers are big enough
be5c4ba qcacld-2.0: Remove FW memory dump feature
04300ee BACKPORT: ipv6: fix udpv6 sendmsg crash caused by too small MTU
1d6da6b UPSTREAM: ipv4, ipv6: ensure raw socket message is big enough to hold an IP header
1748f845 msm: ADSPRPC: use access_ok to validate pointers
3607a99 ASoC: wcd_cpe_core: Add mutex lock for CPE session
cnss_genl driver creates a netlink family and multicast groups
to facilitate communication between WLAN driver and userspace.
Define flag CONFIG_CNSS_GENL and set to 'y'(yes) to enable
compilation of the cnss_genl driver inorder to use the same.
Change-Id: I9d81f933e4fe3c9383f213c777d335e1fe51bdd2
Signed-off-by: Srinivas Dasari <dasaris@codeaurora.org>
CRs-Fixed: 1117130
Bug: 32775496
Signed-off-by: Srinivas Girigowda <sgirigow@codeaurora.org>
enable /proc/device-tree to make sure early mount code can discover
android specific DT properties for fstab entries.
Bug: 27805372
Bug: 35803310
Test: Boot bullhead with early mount and also test sideloaded OTA
Change-Id: Id8b9198a546f114d9c2eabbcc3842d986f29e819
Signed-off-by: Sandeep Patil <sspatil@google.com>
/dev/port is not used as shown by previous SELinux policy changes to
blacklist it. It is being unset to reduce kernel size and attack
surface, mirroring the same chagnes done to DEVMEM and DEVKMEM.
Change-Id: I0a9e26fa3f234fd94a6d0521bc7edc7d5a84f4f6
Signed-off-by: Max Bires <jbires@google.com>
Bug: 33301618
Enable RCU boost to avoid risk of priority-inversion
and memory leaks when readers are preempted.
Bug: 32633926
Change-Id: I6de9b83c7f83646955e229a94078ae49c5962bc2
Signed-off-by: John Dias <joaodias@google.com>
Enable protection against stack corruption. (most) Functions with the
possibility of stack corruption are protected with a canary.
With this change, the bullhead kernel grows from 10636247 to 10878698
an increase of 2.3%. Performance loss is considered minimal. Security
against stack overflow is greatly improved. [1]
This is the improved version of CONFIG_CC_STACKPROTECTOR=y which is
enabled in shamu's kernel.
[1] https://lwn.net/Articles/584225
Bug: 28837708
Change-Id: I41e45451793d917a633160df093b73b81a9360e5
Disable the drivers/platform/msm/pft.c driver as it is unsupported by
Qualcomm, and opens us up to a wide range of potential attack surfaces
that has not been audited by anyone.
Qualcomm recommends that it be disabled, as it hooks into SELinux in
some "interesting" ways, and the userspace portion of the code is not
even part of the image.
Bug: 28588434
Change-Id: I932ff9f8e9bc3aff01585f210514f52958a508b4
Author: Greg Kroah-Hartman <gregkh@google.com>
Disable forcing socket error when rejecting with icmp* for now
due to frequent kernel crash.
Bug: 28424847
Change-Id: I3926b2b160fbafe8597d0442b297bd1accf70b4b
Signed-off-by: Thierry Strudel <tstrudel@google.com>
Remove the buspm module from msm_bus since it adds
no functionality to the bus bandwidth aggregation
driver. It is a loadable module used for profiling
purposes.
Bug: 26354602
Change-Id: I7d70a22f73a0c396a3d8e330d3207871546cbfe3
Signed-off-by: Yuan Lin <yualin@google.com>
Android userspace lmkd was disabled because it was suspected
to be the cause of performance issues. In the end we didn't
find any reason for userspace lmkd to be causing these issues,
so re-enable userspace lmkd by disabling the kernel one.
Change-Id: I7a06ce683d5d3975c0f50626a429acfc9312ea25
Separate the WLAN CNSS platform driver according to
the bus interface PCIe and SDIO. Add separate Kernel
Config file for the WLAN CNSS platform Driver and its
necessary module which has support for the CNSS
connectivity Subsystem.
Add Kernel Config flag to refactoring the CNSS platform Driver:
CONFIG_CNSS Kernel Config add support to CNSS Core
driver compilation and export Generic GPL wrappers.
CONFIG_CNSS_SDIO Kernel Config add support to CNSS
Platform Driver compilation for SDIO based WiFi Devices
and export platform driver API's based on the SDIO bus.
CONFIG_CNSS_PCI Kernel Config add support to CNSS
Platform Driver compilation for PCIe based WiFi Devices
and export platform driver API's based on the PCIe bus.
CRs-Fixed: 939171
Signed-off-by: Subhani Shaik <subhanis@codeaurora.org>
Signed-off-by: Srinivas Girigowda <sgirigow@codeaurora.org>
Separate the WLAN CNSS platform driver according to
the bus interface PCIe and SDIO. Add separate Kernel
Config file for the WLAN CNSS platform Driver and its
necessary module which has support for the CNSS
connectivity Subsystem.
Add Kernel Config flag to refactoring the CNSS platform Driver:
CONFIG_CNSS Kernel Config add support to CNSS Core
driver compilation and export Generic GPL wrappers.
CONFIG_CNSS_SDIO Kernel Config add support to CNSS
Platform Driver compilation for SDIO based WiFi Devices
and export platform driver API's based on the SDIO bus.
CONFIG_CNSS_PCI Kernel Config add support to CNSS
Platform Driver compilation for PCIe based WiFi Devices
and export platform driver API's based on the PCIe bus.
CRs-fixed: 939171
Change-Id: I8cce5bbc87e6742179a7967ccba295f55c444b28
Signed-off-by: Kai Liu <kaliu@codeaurora.org>
Signed-off-by: Sarada Prasanna Garnayak <sgarna@codeaurora.org>
Signed-off-by: Amarnath Hullur Subramanyam <amarnath@codeaurora.org>
Signed-off-by: Srinivas Girigowda <sgirigow@codeaurora.org>
revert back to chinook while tracking down power regression
Bug: 27122067
Change-Id: I87e77b26869eba7522faa5414f7bbb447297d579
Signed-off-by: Ben Fennema <fennema@google.com>
Adds nanohub kernel driver files as well as device tree configuration to
use nanohub instead of contexthub (spich)
Change-Id: I089dd5c3a08968a002e965e8d1ed260b93e32ce3
Signed-off-by: Ben Fennema <fennema@google.com>
1000Hz is still too aggressive from a power consumption point of
view. Set to 300Hz for now.
bug 26444620
Change-Id: I3d1ca38d518e5705b653487bfa95085873247f1c
Disable ALLOC_IN_4K_CHUNKS to try and keep unmovable pages
centralized. This should help avoid setting all pageblocks to unmovable.
bug 25392275
Change-Id: I95e3dd9aec9a772d85b54cf51764d31bf4d3be63
Increase CONFIG_HZ in order to improve UI responsiveness, especially
when there is significant background CPU work.
bug 25347271
Change-Id: If2d77233ea333d1be8facb8c35f8241aa9e2fd6e
SCHED_HRTICK seems to improve system responsiveness under load
significantly. Enable it for now while keeping CONFIG_HZ at 100.
Bug: 25745871
Change-Id: Ieb57610a3d513b727debee012301e9523bd4ec3c