summaryrefslogtreecommitdiff
path: root/drivers
AgeCommit message (Collapse)Author
2016-11-11icnss: Collect ramdump from MSA memory spaceYuanyuan Liu
Collect ramdump from MSA memory space when Modem SSR happens. WLAN FW runs on modem and stores some data on APPS MSA memory space. In order to collect full data of FW during Modem SSR, ICNSS platform listens for Modem SSR notification and collects MSA ramdump. CRs-Fixed: 1088608 Change-Id: I9c014261f5e25b3ec4585747d324ea2cb6ab18fb Signed-off-by: Yuanyuan Liu <yuanliu@codeaurora.org>
2016-11-01power: reset: Do not disable SDI during resetSatya Durga Srinivasu Prabhala
During reset if SDI is disabled, PIMEM gets zeroed out. Change-Id: I55bff36d8504f5fd3041f0dad42a077f25976966 Signed-off-by: Satya Durga Srinivasu Prabhala <satyap@codeaurora.org>
2016-11-01Merge "soc: qcom: signal buffer response after glink_rx_done()"Linux Build Service Account
2016-11-01Merge "drivers: cpuidle: lpm-levels: Enable Sleep prediction"Linux Build Service Account
2016-10-31Merge "spmi-pmic-arb: fix a possible null pointer dereference"Linux Build Service Account
2016-10-31Merge "msm: vidc: Add Colorspace in sequence change event"Linux Build Service Account
2016-10-31Merge "msm: mdss: Add Rec2020 YUV conversion to CSC tables"Linux Build Service Account
2016-10-31Merge "pmic-voter: Add the votable name in debugfs"Linux Build Service Account
2016-10-31spmi-pmic-arb: fix a possible null pointer dereferenceAbhijeet Dharmapurikar
If "core" memory resource is not specified, the driver could end up dereferencing a null pointer. Fix this by returning -EINVAL when core resource is missing. Change-Id: Id08f7b2e109b6b2963b19dfe07f07cbfb424202b Signed-off-by: Abhijeet Dharmapurikar <adharmap@codeaurora.org>
2016-10-31Merge "msm: ipa3: wait for uC load before USB disconnect"Linux Build Service Account
2016-10-31Merge "wil6210: prevent XTAL off in device bootloader"Linux Build Service Account
2016-10-31Merge "msm: ipa3: fix send_cmd_timeout logic"Linux Build Service Account
2016-10-31Merge "smb138x-charger: Fix FCC and FV parameters"Linux Build Service Account
2016-10-31msm: mdss: Add Rec2020 YUV conversion to CSC tablesBenet Clark
Rec2020 CSC type will be set by hwcomposer when incoming YUV data is of the same type. CRs-Fixed: 1081779 Change-Id: I321bd79d04e135030764dcdf83a58fee3c4e72c8 Signed-off-by: Benet Clark <benetc@codeaurora.org>
2016-10-31Merge "init: do_mounts: Add a dummy definition for dm_table_put"Linux Build Service Account
2016-10-31Merge "qseecom: check error return value of ion_map_kernel"Linux Build Service Account
2016-10-31Merge "clk: msm: clock-osm: Request Nominal Fmax frequency after OSM enable"Linux Build Service Account
2016-10-31Merge "binder: prevent kptr leak by using %pK format specifier"Linux Build Service Account
2016-10-31Merge "usb: dwc3: Turn on memory core and periphery upon resume"Linux Build Service Account
2016-10-31Merge "Bluetooth:Add ioctl to power control connectivity chip"Linux Build Service Account
2016-10-31Merge "msm: crypto: Fix integer over flow check in qce driver"Linux Build Service Account
2016-10-31Merge "leds: qpnp-wled: add support for configuring ILIM in pmicobalt"Linux Build Service Account
2016-10-31Merge "leds: qpnp-wled: Update AMOLED_VOUT programming"Linux Build Service Account
2016-10-31Merge "msm: kgsl: Clear the interrupt immediately"Linux Build Service Account
2016-10-31msm: ipa3: wait for uC load before USB disconnectSkylar Chang
In case RG10 workaround is in use, USB disconnect sequence needs to be delayed until uC image is loaded in order to allow to suspend and unsuspend pipes successfully. Change-Id: I0ba41c9564c12b0b2c419222b54fa0e05be93b75 CRs-Fixed: 1083675 Acked-by: Ady Abraham <adya@qti.qualcomm.com> Signed-off-by: Skylar Chang <chiaweic@codeaurora.org>
2016-10-31Merge "icnss: Shutdown Adrastea before remapping MSA0"Linux Build Service Account
2016-10-31Merge "msm: ADSPRPC: Do not pass offset for secure buffers"Linux Build Service Account
2016-10-31Merge "power: reset: add reboot mode driver"Linux Build Service Account
2016-10-31Merge "usb: xhci-plat: Enable wakeup for the root hubs"Linux Build Service Account
2016-10-31Merge "usb: pd: Observe PSHardResetTimer for source hard reset"Linux Build Service Account
2016-10-31Merge "msm: ipa3: Support IPA-USB suspend sequence without remote wake-up"Linux Build Service Account
2016-10-30wil6210: prevent XTAL off in device bootloaderMaya Erez
Device bootloader enters deep sleep and turns off its clock after 1 second of inactivity. Waking up from this stage takes several milliseconds and can cause PCIe timeout. To prevent that, we need to add HALP vote in the reset flow which will prevent the BL from turning off its XTAL. Change-Id: Id9273e546d3565935a7b1150c27993f02c5734e3 Signed-off-by: Maya Erez <merez@codeaurora.org>
2016-10-30Merge "icnss: Enable PMM_TCXO_CLK before switch to cxo"Linux Build Service Account
2016-10-28ANDROID: dm verity fec: initialize recursion levelSami Tolvanen
Explicitly initialize recursion level to zero at the beginning of each I/O operation. Bug: 28943429 Change-Id: I00c612be2b8c22dd5afb65a739551df91cb324fc Signed-off-by: Sami Tolvanen <samitolvanen@google.com> (cherry picked from commit 32ffb3a22d7fd269b2961323478ece92c06a8334) Git-commit: d053106b93363b77ef8ca60352069cbdc8fa0f87 Git-repo: https://android.googlesource.com/kernel/common Signed-off-by: Vikram Mulukutla <markivx@codeaurora.org>
2016-10-28ANDROID: dm verity fec: fix RS block calculationSami Tolvanen
A call to do_div was changed in Linux 4.5 to div64_u64 in verity_fec_decode, which broke RS block calculation due to incompatible semantics. This change fixes the computation. Bug: 21893453 Change-Id: Idb88b901e0209c2cccc9c0796689f780592d58f9 Signed-off-by: Sami Tolvanen <samitolvanen@google.com> (cherry picked from commit 879aac93eebcc2862d71afa9eca3a0c0f51b3b01) Git-commit: 8f9576b38193b8eb32d94d17f02baab436c3580a Git-repo: https://android.googlesource.com/kernel/common Signed-off-by: Vikram Mulukutla <markivx@codeaurora.org>
2016-10-28ANDROID: dm verity fec: add missing release from fec_ktypeSami Tolvanen
Add a release function to allow destroying the dm-verity device. Bug: 27928374 Signed-off-by: Sami Tolvanen <samitolvanen@google.com> Change-Id: Ic0f7c17e4889c5580d70b52d9a709a37165a5747 (cherry picked from commit 0039ccf47c8f99888f7b71b2a36a68a027fbe357) Git-commit: c4d8e3e8d2aa09f5826f517339baa7632f7873ea Git-repo: https://android.googlesource.com/kernel/common Signed-off-by: Vikram Mulukutla <markivx@codeaurora.org>
2016-10-28ANDROID: dm verity fec: limit error correction recursionSami Tolvanen
If verity tree itself is sufficiently corrupted in addition to data blocks, it's possible for error correction to end up in a deep recursive error correction loop that eventually causes a kernel panic as follows: [ 14.728962] [<ffffffc0008c1a14>] verity_fec_decode+0xa8/0x138 [ 14.734691] [<ffffffc0008c3ee0>] verity_verify_level+0x11c/0x180 [ 14.740681] [<ffffffc0008c482c>] verity_hash_for_block+0x88/0xe0 [ 14.746671] [<ffffffc0008c1508>] fec_decode_rsb+0x318/0x75c [ 14.752226] [<ffffffc0008c1a14>] verity_fec_decode+0xa8/0x138 [ 14.757956] [<ffffffc0008c3ee0>] verity_verify_level+0x11c/0x180 [ 14.763944] [<ffffffc0008c482c>] verity_hash_for_block+0x88/0xe0 This change limits the recursion to a reasonable level during a single I/O operation. Bug: 28943429 Signed-off-by: Sami Tolvanen <samitolvanen@google.com> Change-Id: I0a7ebff331d259c59a5e03c81918cc1613c3a766 (cherry picked from commit f4b9e40597e73942d2286a73463c55f26f61bfa7) Git-commit: 249d2baf9b494381f2ff4f21feeaaa47eaa78e7c Git-repo: https://android.googlesource.com/kernel/common Signed-off-by: Vikram Mulukutla <markivx@codeaurora.org>
2016-10-28ANDROID: dm: android-verity: Remove fec_header location constraintBadhri Jagan Sridharan
This CL removes the mandate of the fec_header being located right after the ECC data. (Cherry-picked from https://android-review.googlesource.com/#/c/280401) Bug: 28865197 Signed-off-by: Badhri Jagan Sridharan <Badhri@google.com> Change-Id: Ie04c8cf2dd755f54d02dbdc4e734a13d6f6507b5 Git-commit: 1daecfe215ea3379fdc842f264607d37dd8fe091 Git-repo: https://android.googlesource.com/kernel/common Signed-off-by: Vikram Mulukutla <markivx@codeaurora.org>
2016-10-28Revert "dm-verity: Add a temporary dummy opaque struct declaration"Vikram Mulukutla
The declaration that caused a compilation failure is not fixed. Remove the dummy opaque struct declaration. Change-Id: Id27cf5231aebcdd14f4fb25dd44052f829e0427e Signed-off-by: Vikram Mulukutla <markivx@codeaurora.org>
2016-10-28ANDROID: dm-verity: adopt changes made to dm callbacksBadhri Jagan Sridharan
v4.4 introduced changes to the callbacks used for dm-linear and dm-verity-target targets. Move to those headers in dm-android-verity. Verified on hikey while having BOARD_USES_RECOVERY_AS_BOOT := true BOARD_BUILD_SYSTEM_ROOT_IMAGE := true BUG: 27339727 Signed-off-by: Badhri Jagan Sridharan <Badhri@google.com> Change-Id: Ic64950c3b55f0a6eaa570bcedc2ace83bbf3005e Git-commit: aa3cda16a57e73e9fc269e1de1eb3c35f3f0ed20 Git-repo: https://android.googlesource.com/kernel/common Signed-off-by: Vikram Mulukutla <markivx@codeaurora.org>
2016-10-28ANDROID: dm: android-verity: Verify header before fetching tableBadhri Jagan Sridharan
Move header validation logic before reading the verity_table as an invalid header implies the table is invalid as well. (Cherry-picked from: https://partner-android-review.git.corp.google.com/#/c/625203) BUG: 29940612 Signed-off-by: Badhri Jagan Sridharan <Badhri@google.com> Change-Id: Ib34d25c0854202f3e70df0a6d0ef1d96f0250c8e Git-commit: ad2f6cf0be78107a2bf435b8a21f801658935719 Git-repo: https://android.googlesource.com/kernel/common Signed-off-by: Vikram Mulukutla <markivx@codeaurora.org>
2016-10-28ANDROID: dm: allow adb disable-verity only in userdebugBadhri Jagan Sridharan
adb disable-verity was allowed when the phone is in the unlocked state. Since the driver is now aware of the build variant, honor "adb disable-verity" only in userdebug builds. (Cherry-picked from https://partner-android-review.git.corp.google.com/#/c/622117) BUG: 29276559 Signed-off-by: Badhri Jagan Sridharan <Badhri@google.com> Change-Id: I7ce9f38d8c7a62361392c5a8ccebb288f8a3a2ea Git-commit: f74284f6c25dca79c052c3a1e1bd3fc58de4d4a0 Git-repo: https://android.googlesource.com/kernel/common Signed-off-by: Vikram Mulukutla <markivx@codeaurora.org>
2016-10-28ANDROID: dm: mount as linear target if eng buildBadhri Jagan Sridharan
eng builds dont have verity enabled i.e it does even have verity metadata appended to the parition. Therefore add rootdev as linear device and map the entire partition if build variant is "eng". (Cherry-picked based on https://partner-android-review.git.corp.google.com/#/c/618690/) BUG: 29276559 Signed-off-by: Badhri Jagan Sridharan <Badhri@google.com> Change-Id: I8f5c2289b842b820ca04f5773525e5449bb3f355 Git-commit: 58bae772a7018ebfa735c91af22e26474a1dfcc7 Git-repo: https://android.googlesource.com/kernel/common Signed-off-by: Vikram Mulukutla <markivx@codeaurora.org>
2016-10-28ANDROID: dm: use default verity public keyBadhri Jagan Sridharan
If the dm-android-verity target does not provide a default key try using the default public key from the system keyring. The defualt verity keyid is passed as a kernel command line argument veritykeyid=. The order of the dm-android-verity params have been reversed to facilitate the change. Old format example: dm="system none ro,0 1 android-verity Android:#7e4333f9bba00adfe0ede979e28ed1920492b40f /dev/mmcblk0p43" New formats supported: dm="system none ro,0 1 android-verity /dev/mmcblk0p43 Android:#7e4333f9bba00adfe0ede979e28ed1920492b40f" (or) dm="system none ro,0 1 android-verity /dev/mmcblk0p43" when veritykeyid= is set in the kernel command line. BUG: 28384658 Signed-off-by: Badhri Jagan Sridharan <Badhri@google.com> Change-Id: I506c89b053d835ab579e703eef2bc1f8487250de (cherry picked from commit c5c74d0327729f35b576564976885596c6d0e7fb) Git-commit: 051d4706c621a73d3622f0b0d91a444ab37a8f1a Git-repo: https://android.googlesource.com/kernel/common Signed-off-by: Vikram Mulukutla <markivx@codeaurora.org>
2016-10-28ANDROID: dm: fix signature verification flagBadhri Jagan Sridharan
The bug was that the signature verification was only happening when verity was disabled. It should always happen when verity is enabled. Signed-off-by: Badhri Jagan Sridharan <Badhri@google.com> Change-Id: I2d9354e240d36ea06fc68c2d18d8e87b823a4c2f (cherry picked from commit 5364b5ca0b1a12a58283b51408e43fc36d4e4fe7) Git-commit: 9c43aca47bbdf652fc0d05d8e94ee43aaeea2458 Git-repo: https://android.googlesource.com/kernel/common Signed-off-by: Vikram Mulukutla <markivx@codeaurora.org>
2016-10-28ANDROID: dm: use name_to_dev_tJeremy Compostella
This patch makes android_verity_ctr() parse its block device string parameter with name_to_dev_t(). It allows the use of less hardware related block device reference like PARTUUID for instance. Change-Id: Idb84453e70cc11abd5ef3a0adfbb16f8b5feaf07 Signed-off-by: Jeremy Compostella <jeremy.compostella@intel.com> Git-commit: a517817c1708dd9d762d37d7dd475d4728a4b34e Git-repo: https://android.googlesource.com/kernel/common Signed-off-by: Vikram Mulukutla <markivx@codeaurora.org>
2016-10-28ANDROID: dm: rename dm-linear methods for dm-android-verityBadhri Jagan Sridharan
This keeps linear_target as static variable and just exposes the linear target methods for android-verity Cherry-picked: https://android-review.googlesource.com/#/c/212858 Change-Id: I4a377e417b00afd9ecccdb3e605fea31a7df112e Signed-off-by: Badhri Jagan Sridharan <Badhri@google.com> (cherry picked from commit a6d1b091f40b25d97849487e29ec097bc5f568dd) Git-commit: 86fd82659f745b5fea48090fe320cb817e199805 Git-repo: https://android.googlesource.com/kernel/common Signed-off-by: Vikram Mulukutla <markivx@codeaurora.org>
2016-10-28ANDROID: dm: Minor cleanupBadhri Jagan Sridharan
Compacts the linear device arguments removing the unnecessary variables. Bug: 27175947 Change-Id: I157170eebe3c0f89a68ae05870a1060f188d0da0 Signed-off-by: Badhri Jagan Sridharan <Badhri@google.com> Git-commit: 438e162621ac7e80ec9c81bea3f0eaec0b801ff9 Git-repo: https://android.googlesource.com/kernel/common Signed-off-by: Vikram Mulukutla <markivx@codeaurora.org>
2016-10-28ANDROID: dm: Mounting root as linear device when verity disabledBadhri Jagan Sridharan
This CL makes android-verity target to be added as linear dm device if when bootloader is unlocked and verity is disabled. Bug: 27175947 Change-Id: Ic41ca4b8908fb2777263799cf3a3e25934d70f18 Signed-off-by: Badhri Jagan Sridharan <Badhri@google.com> Git-commit: 67ce481897e0656404fe0af42d563101a5629bbe Git-repo: https://android.googlesource.com/kernel/common Signed-off-by: Vikram Mulukutla <markivx@codeaurora.org>
2016-10-28ANDROID: dm-android-verity: Rebase on top of 4.1Badhri Jagan Sridharan
Following CLs in upstream causes minor changes to dm-android-verity target. 1. keys: change asymmetric keys to use common hash definitions 2. block: Abstract out bvec iterator Rebase dm-android-verity on top of these changes. Bug: 27175947 Signed-off-by: Badhri Jagan Sridharan <Badhri@google.com> Change-Id: Icfdc3e7b3ead5de335a059cade1aca70414db415 Git-commit: f42f971b7b59257a8610608b7f45a046c7c57b5d Git-repo: https://android.googlesource.com/kernel/common Signed-off-by: Vikram Mulukutla <markivx@codeaurora.org>