Permalink
Commits on Sep 8, 2015
  1. msm: HTC: Enable f2fs support for m4

    mdmower committed Apr 4, 2015
    Change-Id: I62f805a3a7b8901696ba9d654fc851cb74f4c2c7
Commits on Aug 25, 2015
  1. input: ewtzmu2: Lock I2C accesses

    intervigilium committed Aug 24, 2015
    * Attempting I2C transactions while the device has been powered down
      results in a device crash.
    * Force all functions which use the I2C bus to check device power status
      before execution.
    * Read lock all I2C accessing functions.
    * Write lock all device power up/down function.
    
    Change-Id: I5c22b550ab03f39d2f1f3ed3901a680dbf484e30
  2. Revert "input: ewtzmu2: Fix gyro off status checks"

    intervigilium committed Aug 24, 2015
    This reverts commit e75b9c0.
    
    Change-Id: I656e83f047cbd1df6458c465a788ce47d5cd1aa0
  3. input: ewtzmu2: Remove unused variable

    intervigilium committed Aug 24, 2015
    * This variable is not actually used for any real purpose.
    
    Change-Id: I8eddf527324c306b6474b46589beff4b64db2f35
  4. input: ewtzmu2: Add missing break

    intervigilium committed Aug 24, 2015
    * Sample rate IOCTL will fall through otherwise.
    
    Change-Id: Ic0b296650342a1ff519535c03c422865eea64ea0
  5. input: ewtzmu2: Use correct lock for data

    intervigilium authored and Gerrit Code Review committed Aug 24, 2015
    * Access to any of the non-controldata fields requires the datalock, not
      ctrllock.
    
    Change-Id: Ie408b7e6a0676cf544761c76bed2d877ed7777ba
Commits on Aug 24, 2015
  1. block: row: Remove warning massage from add_request

    Tatyana Brokhman authored and mdmower committed Jul 25, 2013
    Regular priority queues is marked as "starved" if it skipped a dispatch
    due to being empty. When a new request is added to a "starved" queue
    it will be marked as urgent.
    The removed WARN_ON was warning about an impossible case when a regular
    priority (read) queue was marked as starved but wasn't empty. This is
    a possible case due to the bellow:
    If the device driver fetched a read request that is pending for
    transmission and an URGENT request arrives, the fetched read will be
    reinserted back to the scheduler. Its possible that the queue it will be
    reinserted to was marked as "starved" in the meanwhile due to being empty.
    
    CRs-fixed: 517800
    Change-Id: Iaae642ea0ed9c817c41745b0e8ae2217cc684f0c
    Signed-off-by: Tatyana Brokhman <tlinder@codeaurora.org>
  2. block: row: change hrtimer_cancel to hrtimer_try_to_cancel

    Tatyana Brokhman authored and mdmower committed Jul 2, 2013
    Calling hrtimer_cancel with interrupts disabled can result in a livelock.
    When flushing plug list in the block layer interrupts are disabled and an
    hrtimer is used when adding requests from that plug list to the scheduler.
    In this code flow, if the hrtimer (which is used for idling) is set, it's
    being canceled by calling hrtimer_cancel. hrtimer_cancel will perform
    the following in an endless loop:
    1. try cancel the timer
    2. if fails - rest_cpu
    the cancellation can fail if the timer function already started. Since
    interrupts are disabled it can never complete.
    This patch reduced the number of times the hrtimer lock is taken while
    interrupts are disabled by calling hrtimer_try_co_cancel. the later will
    try to cancel the timer just once and return with an error code if fails.
    
    CRs-fixed: 499887
    Change-Id: I25f79c357426d72ad67c261ce7cb503ae97dc7b9
    Signed-off-by: Tatyana Brokhman <tlinder@codeaurora.org>
  3. block: row-iosched idling triggered by readahead pages

    Lee Susman authored and mdmower committed Jun 23, 2013
    In the current implementation idling is triggered only by request
    insertion frequency. This heuristic is not very accurate and may hit
    random requests that shouldn't trigger idling. This patch uses the
    PG_readahead flag in struct page's flags, which indicates that the page
    is part of a readahead window, to start idling upon dispatch of a request
    associated with a readahead page.
    
    The above readehead flag is used together with the existing
    insertion-frequency trigger. The frequency timer will catch read requests
    which are not part of a readahead window, but are still part of a
    sequential stream (and therefore dispatched in small time intervals).
    
    Change-Id: Icb7145199c007408de3f267645ccb842e051fd00
    Signed-off-by: Lee Susman <lsusman@codeaurora.org>
Commits on Aug 7, 2015
  1. bcmdhd_4335_mcc: Update from GPE 6.04.1700.6

    mdmower committed Aug 7, 2015
    Package m7ulstockui-3.4.10-ge0627be.zip
    
    Change-Id: I5adad7523a0a4a6d3c535ab20f78de3f855ee2bc
  2. ipv6: clean up anycast when an interface is destroyed

    qsn authored and mdmower committed Sep 10, 2014
    If we try to rmmod the driver for an interface while sockets with
    setsockopt(JOIN_ANYCAST) are alive, some refcounts aren't cleaned up
    and we get stuck on:
    
      unregister_netdevice: waiting for ens3 to become free. Usage count = 1
    
    If we LEAVE_ANYCAST/close everything before rmmod'ing, there is no
    problem.
    
    We need to perform a cleanup similar to the one for multicast in
    addrconf_ifdown(how == 1).
    
    BUG: 18902601
    Bug: 19100303
    
    Change-Id: I6d51aed5755eb5738fcba91950e7773a1c985d2e
    Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
    Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Patrick Tjin <pattjin@google.com>
  3. net: ipv6: allow choosing optimistic addresses with use_optimistic

    ekline authored and mdmower committed Dec 5, 2014
    The use_optimistic sysctl makes optimistic IPv6 addresses
    equivalent to preferred addresses for source address selection
    (e.g., when calling connect()), but it does not allow an
    application to bind to optimistic addresses. This behaviour is
    inconsistent - for example, it doesn't make sense for bind() to
    an optimistic address fail with EADDRNOTAVAIL, but connect() to
    choose that address outgoing address on the same socket.
    
    Bug: 17769720
    Bug: 18609055
    Change-Id: I9de0d6c92ac45e29d28e318ac626c71806666f13
    Signed-off-by: Erik Kline <ek@google.com>
    Signed-off-by: Lorenzo Colitti <lorenzo@google.com>
  4. net/ping: handle protocol mismatching scenario

    Jane Zhou authored and mdmower committed Nov 24, 2014
    ping_lookup() may return a wrong sock if sk_buff's and sock's protocols
    dont' match. For example, sk_buff's protocol is ETH_P_IPV6, but sock's
    sk_family is AF_INET, in that case, if sk->sk_bound_dev_if is zero, a wrong
    sock will be returned.
    the fix is to "continue" the searching, if no matching, return NULL.
    
    [cherry-pick of net 91a0b60]
    
    Bug: 18512516
    Change-Id: I520223ce53c0d4e155c37d6b65a03489cc7fd494
    Cc: "David S. Miller" <davem@davemloft.net>
    Cc: Alexey Kuznetsov <kuznet@ms2.inr.ac.ru>
    Cc: James Morris <jmorris@namei.org>
    Cc: Hideaki YOSHIFUJI <yoshfuji@linux-ipv6.org>
    Cc: Patrick McHardy <kaber@trash.net>
    Cc: netdev@vger.kernel.org
    Cc: stable@vger.kernel.org
    Signed-off-by: Jane Zhou <a17711@motorola.com>
    Signed-off-by: Yiwei Zhao <gbjc64@motorola.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Lorenzo Colitti <lorenzo@google.com>
    (cherry picked from commit 08a90f2f7ecbe6e03e43acfd7aaf26bc68c73354)
  5. net: ipv6: Add a sysctl to make optimistic addresses useful candidates

    ekline authored and mdmower committed Oct 28, 2014
    Add a sysctl that causes an interface's optimistic addresses
    to be considered equivalent to other non-deprecated addresses
    for source address selection purposes.  Preferred addresses
    will still take precedence over optimistic addresses, subject
    to other ranking in the source address selection algorithm.
    
    This is useful where different interfaces are connected to
    different networks from different ISPs (e.g., a cell network
    and a home wifi network).
    
    The current behaviour complies with RFC 3484/6724, and it
    makes sense if the host has only one interface, or has
    multiple interfaces on the same network (same or cooperating
    administrative domain(s), but not in the multiple distinct
    networks case.
    
    For example, if a mobile device has an IPv6 address on an LTE
    network and then connects to IPv6-enabled wifi, while the wifi
    IPv6 address is undergoing DAD, IPv6 connections will try use
    the wifi default route with the LTE IPv6 address, and will get
    stuck until they time out.
    
    Also, because optimistic nodes can receive frames, issue
    an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
    flag appropriately set).  A second RTM_NEWADDR is sent if DAD
    completes (the address flags have changed), otherwise an
    RTM_DELADDR is sent.
    
    Also: add an entry in ip-sysctl.txt for optimistic_dad.
    
    [backport of net-next 7fd2561]
    
    Signed-off-by: Erik Kline <ek@google.com>
    Acked-by: Lorenzo Colitti <lorenzo@google.com>
    Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Bug: 17769720
    Bug: 18180674
    Change-Id: I440a9b8c788db6767d191bbebfd2dff481aa9e0d
  6. net/compat.c,linux/filter.h: share compat_sock_fprog

    redpig authored and mdmower committed Feb 22, 2012
    Any other users of bpf_*_filter that take a struct sock_fprog from
    userspace will need to be able to also accept a compat_sock_fprog
    if the arch supports compat calls.  This change allows the existing
    compat_sock_fprog be shared.
    
    Signed-off-by: Will Drewry <wad@chromium.org>
    Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
    Acked-by: Eric Dumazet <eric.dumazet@gmail.com>
    Acked-by: Eric Paris <eparis@redhat.com>
    
    v18: tasered by the apostrophe police
    v14: rebase/nochanges
    v13: rebase on to 88ebdda
    v12: rebase on to linux-next
    v11: introduction
  7. sk_run_filter: add BPF_S_ANC_SECCOMP_LD_W

    redpig authored and mdmower committed Mar 9, 2012
    Introduces a new BPF ancillary instruction that all LD calls will be
    mapped through when skb_run_filter() is being used for seccomp BPF.  The
    rewriting will be done using a secondary chk_filter function that is run
    after skb_chk_filter.
    
    The code change is guarded by CONFIG_SECCOMP_FILTER which is added,
    along with the seccomp_bpf_load() function later in this series.
    
    This is based on http://lkml.org/lkml/2012/3/2/141
    
    Suggested-by: Indan Zupancic <indan@nul.nu>
    Signed-off-by: Will Drewry <wad@chromium.org>
    Acked-by: Eric Dumazet <eric.dumazet@gmail.com>
    Acked-by: Eric Paris <eparis@redhat.com>
    
    v18: rebase
    ...
    v15: include seccomp.h explicitly for when seccomp_bpf_load exists.
    v14: First cut using a single additional instruction
    ... v13: made bpf functions generic.
Commits on Aug 5, 2015
  1. android: drivers: workaround debugfs race in binder

    Riley Andrews Gerrit Code Review
    Riley Andrews authored and Gerrit Code Review committed May 28, 2015
    If a /d/binder/proc/[pid] entry is kept open after linux has
    torn down the associated process, binder_proc_show can deference
    an invalid binder_proc that has been stashed in the debugfs
    inode.  Validate that the binder_proc ptr passed into binder_proc_show
    has not been freed by looking for it within the global process list
    whilst the global lock is held. If the ptr is not valid, print nothing.
    
    Bug 19587483
    Change-Id: I4abc6443d96cca6500608976cded5ff3d1697d33
    Signed-off-by: Riley Andrews <riandrews@android.com>
  2. udp: fix behavior of wrong checksums

    Eric Dumazet authored and intervigilium committed May 30, 2015
    We have two problems in UDP stack related to bogus checksums :
    
    1) We return -EAGAIN to application even if receive queue is not empty.
       This breaks applications using edge trigger epoll()
    
    2) Under UDP flood, we can loop forever without yielding to other
       processes, potentially hanging the host, especially on non SMP.
    
    This patch is an attempt to make things better.
    
    We might in the future add extra support for rt applications
    wanting to better control time spent doing a recv() in a hostile
    environment. For example we could validate checksums before queuing
    packets in socket receive queue.
    
    Change-Id: I9355321ac7ee564d56c342fa7738b918052bf308
    Signed-off-by: Eric Dumazet <edumazet@google.com>
    Cc: Willem de Bruijn <willemb@google.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
  3. fs: take i_mutex during prepare_binprm for set[ug]id executables

    thejh authored and intervigilium committed Apr 19, 2015
    This prevents a race between chown() and execve(), where chowning a
    setuid-user binary to root would momentarily make the binary setuid
    root.
    
    This patch was mostly written by Linus Torvalds.
    
    Signed-off-by: Jann Horn <jann@thejh.net>
    Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
    
    Conflicts:
    	fs/exec.c
    
    Change-Id: Iecebf23d07e299689e4ba4fd74ea8821ef96e72b
Commits on Jul 27, 2015
Commits on Jul 26, 2015
  1. staging: prima: Merge LA.AF.1.1_rb1.18

    Flyhalf205 committed Jul 26, 2015
    Merge "wlan: Send the actual SSN in BA req instead of modified one."
    Merge "wlan: Fix arp offload filtering issue with static ip."
    wlan: Send the actual SSN in BA req instead of modified one.
    
    Change-Id: I64e19c4d84f080e7505bee4426584eef48144656
Commits on Jul 12, 2015
  1. msm: HTC: t6: Update board file

    Flyhalf205 committed Jul 12, 2015
    * HTC kernel version: t6ul-3.4.10-g8a18964
    
    Change-Id: I8ca175c214eefd49a0820d7d4e65ca8c8db39d12
Commits on Jun 22, 2015
  1. msm8960: disable logger

    nardholio authored and JoseGalRe committed May 28, 2015
    As of L this is no longer required
    
    Change-Id: Ia013cb90afe525ae1915f5c2caf7991933ebbb73
Commits on May 22, 2015
  1. Merge AU_LINUX_ANDROID_LA.AF.1.1_RB1.05.01.00.006.027 on remote branch

    Linux Build Service Account
    Linux Build Service Account committed May 22, 2015
    Change-Id: I2796633dd485fd9bb803b8dfcb2db788f8e8a292
Commits on May 21, 2015
  1. Merge "msm: msm_fb: wait for VSYNC instead of DMA_P for LCDC"

    Linux Build Service Account Gerrit - the friendly Code Review server
    Linux Build Service Account authored and Gerrit - the friendly Code Review server committed May 21, 2015
Commits on May 20, 2015
  1. esoc: Add external soc control framework

    Hanumant Singh Sashidhar Ganiga
    Hanumant Singh authored and Sashidhar Ganiga committed Nov 2, 2013
    External slave soc can be powered on/off and monitored
    for power states and crash events.
    
    Change-Id: I9c3317f798b204b754d612a3115dcd71935b5ef2
    Signed-off-by: Hanumant Singh <hanumant@codeaurora.org>
    sganig@codeaurora.org: Added ESOC_REQ_SHUTDOWN to header
    file esoc.h in additon to base gerrit changes for
    enabling the mdm-detect feature in A-Family
    Signed-off-by: Sashidhar Ganiga <sganig@codeaurora.org>
Commits on May 19, 2015
  1. msm: msm_fb: wait for VSYNC instead of DMA_P for LCDC

    Justin Philip
    Justin Philip committed May 15, 2015
    This is a follow up to previous changes:-
    "Replace wait for DMA_P with VSYNC in Pan_display Path" and
    "wait for VSYNC instead of DMA_P for commit completion" extending
    for LCDC/LVDS display.
    
    Change-Id: I1613f6196bf115b396bb9536283d9e95615c4a28
    Signed-off-by: Justin Philip <jphili@codeaurora.org>
Commits on May 13, 2015
  1. msm: camera: Reduce log spam

    intervigilium committed May 12, 2015
    * Excessive log spam leads to watchdog reset
    
    Change-Id: I8ac25f9c4b1708305819d528540e292c5751faa4
Commits on May 12, 2015
  1. Merge "usb: ks_bridge: Ignore completion error in RX path"

    Linux Build Service Account Gerrit - the friendly Code Review server
    Linux Build Service Account authored and Gerrit - the friendly Code Review server committed May 12, 2015
Commits on May 9, 2015
  1. msm: HTC: m7: Disable continuous splash for Renesas panel

    intervigilium committed May 9, 2015
    Change-Id: I03843d16b674185001e48b59b19c22cd6ff0912a
Commits on May 8, 2015
  1. ipv4: Missing sk_nulls_node_init() in ping_unhash().

    davem330 authored and Gerrit - the friendly Code Review server committed May 2, 2015
    If we don't do that, then the poison value is left in the ->pprev
    backlink.
    
    This can cause crashes if we do a disconnect, followed by a connect().
    
    Change-Id: I8ce5297bbde2de3c3d917a690bf5de1b2dc566e8
    Tested-by: Linus Torvalds <torvalds@linux-foundation.org>
    Reported-by: Wen Xu <hotdog3645@gmail.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Git-commit: a134f083e79fb4c3d0a925691e732c56911b4326
    Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
    Signed-off-by: Avijit Kanti Das <avijitnsec@codeaurora.org>
  2. msm: HTC: zara: enable zram, zsmalloc, lz4 and f2fs

    PatrikKT authored and Gerrit Code Review committed May 8, 2015
    Change-Id: I59fcfdbcbeb276441d04812ccfe6801614459783
Commits on May 7, 2015
  1. usb: ks_bridge: Ignore completion error in RX path

    ChandanaKishori Chiluveru
    ChandanaKishori Chiluveru committed May 4, 2015
    Ignore -EPROTO completion error and deliver the packet to client.
    This will help avoid missing data packets on clients.
    
    Change-Id: Iac6e9106f13b332642a54ed1f1ecf41639a70947
    Signed-off-by: ChandanaKishori Chiluveru <cchilu@codeaurora.org>
Commits on May 6, 2015
  1. msm: HTC: m7: Fix Sharp Renesas panel init

    mdmower committed May 6, 2015
    The panel on commands from PANEL_ID_DLXJ_SHARP_RENESAS were errantly
    being used for PANEL_ID_M7_SHARP_RENESAS due to a bad if/else block.
    
    Change-Id: I8b4cfc1f0a0bc96accb31018f69cd8372bc95851
Commits on May 3, 2015
  1. ipv4: Missing sk_nulls_node_init() in ping_unhash().

    davem330 authored and intervigilium committed May 2, 2015
    If we don't do that, then the poison value is left in the ->pprev
    backlink.
    
    This can cause crashes if we do a disconnect, followed by a connect().
    
    Change-Id: I021261c6639339a0d027ee5cb086ba7301db334a
    Tested-by: Linus Torvalds <torvalds@linux-foundation.org>
    Reported-by: Wen Xu <hotdog3645@gmail.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    (cherry picked from commit f1c984d)