<feed xmlns='http://www.w3.org/2005/Atom'>
<title>xavi/android_kernel_m2note/drivers/misc/mediatek/connectivity/common, branch ng-7.1.2</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.
</subtitle>
<id>https://gitea.privatedns.org/xavi/android_kernel_m2note/atom?h=ng-7.1.2</id>
<link rel='self' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/atom?h=ng-7.1.2'/>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/'/>
<updated>2018-11-29T16:49:05+00:00</updated>
<entry>
<title>Replace &lt;asm/uaccess.h&gt; with &lt;linux/uaccess.h&gt; globally</title>
<updated>2018-11-29T16:49:05+00:00</updated>
<author>
<name>Linus Torvalds</name>
<email>torvalds@linux-foundation.org</email>
</author>
<published>2016-12-24T19:46:01+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=8588b01909e0145e5e84f5fe0a5353bd194f205c'/>
<id>urn:sha1:8588b01909e0145e5e84f5fe0a5353bd194f205c</id>
<content type='text'>
This was entirely automated, using the script by Al:

  PATT='^[[:blank:]]*#[[:blank:]]*include[[:blank:]]*&lt;asm/uaccess.h&gt;'
  sed -i -e "s!$PATT!#include &lt;linux/uaccess.h&gt;!" \
        $(git grep -l "$PATT"|grep -v ^include/linux/uaccess.h)

to do the replacement at the end of the merge window.

Requested-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
Signed-off-by: Moyster &lt;oysterized@gmail.com&gt;
</content>
</entry>
<entry>
<title>wmt:fix an invalid condition check</title>
<updated>2018-11-27T16:03:00+00:00</updated>
<author>
<name>danielhk</name>
<email>daniel.p6800@gmail.com</email>
</author>
<published>2018-01-21T03:08:53+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=ca09ff448f7c573d14d30d46bdcce2afba371f9b'/>
<id>urn:sha1:ca09ff448f7c573d14d30d46bdcce2afba371f9b</id>
<content type='text'>
Signed-off-by: Moyster &lt;oysterized@gmail.com&gt;
</content>
</entry>
<entry>
<title>Security Patch: fix ioctl vulnerability for WMT_IOCTL_SET_PATCH_INFO</title>
<updated>2018-11-27T15:28:19+00:00</updated>
<author>
<name>David Chu</name>
<email>david.chu@mediatek.com</email>
</author>
<published>2018-08-07T00:58:30+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=68cd0ffd58c19350e772dd8e39793159c1e07a2d'/>
<id>urn:sha1:68cd0ffd58c19350e772dd8e39793159c1e07a2d</id>
<content type='text'>
[Detail]
If dowloadSeq is 0, it'll pass the error handle and cause KE issue.

[Solution]
Add condition that downloadSeq can not equal to zero.

CVE-2018-9397

Change-Id: I68a2d501c873c4d665634893066b6c0f03e1537c
Signed-off-by: Ben Fennema &lt;fennema@google.com&gt;
</content>
</entry>
<entry>
<title>drivers: mtk: move to /vendor/etc/firmware</title>
<updated>2017-12-08T12:44:57+00:00</updated>
<author>
<name>Mister Oyster</name>
<email>oysterized@gmail.com</email>
</author>
<published>2017-12-07T19:13:59+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=e17fca6a8459d306dc40ab203c52f2f165234417'/>
<id>urn:sha1:e17fca6a8459d306dc40ab203c52f2f165234417</id>
<content type='text'>
partially revert moving wifi to vendor/firmware :

https://github.com/Moyster/android_kernel_m2note/commit/7bafe483fbd70668252f724ec04fa950fec4db3f
</content>
</entry>
<entry>
<title>drivers: mtk: connectivity: move wifi firmware to /vendor/firmware</title>
<updated>2017-10-01T17:35:23+00:00</updated>
<author>
<name>Mister Oyster</name>
<email>oysterized@gmail.com</email>
</author>
<published>2017-09-30T15:58:54+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=7bafe483fbd70668252f724ec04fa950fec4db3f'/>
<id>urn:sha1:7bafe483fbd70668252f724ec04fa950fec4db3f</id>
<content type='text'>
</content>
</entry>
<entry>
<title>misc: replace __FUNCTION__ by __function__</title>
<updated>2017-09-23T01:10:48+00:00</updated>
<author>
<name>Moyster</name>
<email>oysterized@gmail.com</email>
</author>
<published>2017-09-23T01:10:48+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=b8d1e07edc8d57883bf4b6ca70228b5a9e6b98b2'/>
<id>urn:sha1:b8d1e07edc8d57883bf4b6ca70228b5a9e6b98b2</id>
<content type='text'>
result of :
git grep -l '__FUNCTION__' | xargs sed -i 's/__FUNCTION__/__func__/g'
</content>
</entry>
<entry>
<title>mt6735: Add an option to multiplex AP and STA on wlan0</title>
<updated>2017-06-04T17:23:39+00:00</updated>
<author>
<name>Diogo Ferreira</name>
<email>defer@cyngn.com</email>
</author>
<published>2016-04-15T17:34:08+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=e5141469bf3130a2f309e57e93fec46e210b1353'/>
<id>urn:sha1:e5141469bf3130a2f309e57e93fec46e210b1353</id>
<content type='text'>
This adds CONFIG_MTK_COMBO_AOSP_TETHERING_SUPPORT which, when enabled,
allows ap and wlan to co-exist in the same interface, as Android
expects.

Most of this functionality is also available (albeit not compilable broken)
under CFG_TC1_FEATURE but that has larger implications around the radio
and usb stack that we do not want to adopt.

Change-Id: Ib1d1be40566f1bb9ccc7be45b49ec8d1f3b3ba58
Ticket: PORRIDGE-30
</content>
</entry>
<entry>
<title>conn_soc: Security Vulnerability in Mediatek driver : arbitrary kernel write</title>
<updated>2017-04-13T10:35:34+00:00</updated>
<author>
<name>Eddie Chen</name>
<email>eddie.chen@mediatek.com</email>
</author>
<published>2016-06-22T03:36:23+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=81bcdfb07fd402a908a848e327652d433972412c'/>
<id>urn:sha1:81bcdfb07fd402a908a848e327652d433972412c</id>
<content type='text'>
google security issue fix

Bug num:25873324

Change-Id: I2eb8e03dc67209d9a709fc4a27976f986f0b7606
Signed-off-by: Eddie Chen &lt;eddie.chen@mediatek.com&gt;
Signed-off-by: Mister Oyster &lt;oysterized@gmail.com&gt;
</content>
</entry>
<entry>
<title>Security Vulnerability in Mediatek driver : arbitrary kernel write</title>
<updated>2017-04-13T10:35:28+00:00</updated>
<author>
<name>Eddie Chen</name>
<email>eddie.chen@mediatek.com</email>
</author>
<published>2016-06-22T03:36:23+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=082980248cf1b95608086201c76dffb644fa99f0'/>
<id>urn:sha1:082980248cf1b95608086201c76dffb644fa99f0</id>
<content type='text'>
google security issue fix

Bug num:25873324

Change-Id: I2eb8e03dc67209d9a709fc4a27976f986f0b7606
Signed-off-by: Eddie Chen &lt;eddie.chen@mediatek.com&gt;
</content>
</entry>
<entry>
<title>wifi: fix merge</title>
<updated>2017-04-13T10:35:28+00:00</updated>
<author>
<name>Mister Oyster</name>
<email>oysterized@gmail.com</email>
</author>
<published>2017-04-08T13:25:38+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=d9e65f7fa127746f4deabd3cbc223f56ee21029a'/>
<id>urn:sha1:d9e65f7fa127746f4deabd3cbc223f56ee21029a</id>
<content type='text'>
</content>
</entry>
</feed>
