<feed xmlns='http://www.w3.org/2005/Atom'>
<title>xavi/android_kernel_m2note/drivers/misc/mediatek/videox, branch ng-7.1.2</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.
</subtitle>
<id>https://gitea.privatedns.org/xavi/android_kernel_m2note/atom?h=ng-7.1.2</id>
<link rel='self' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/atom?h=ng-7.1.2'/>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/'/>
<updated>2019-07-18T20:51:23+00:00</updated>
<entry>
<title>DISP: Printk too much</title>
<updated>2019-07-18T20:51:23+00:00</updated>
<author>
<name>Elvin Zhang</name>
<email>elvin.zhang@mediatek.com</email>
</author>
<published>2017-09-27T01:34:27+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=8c74456bfa3a19fb4e8f4e2a801a95ea14a6efb6'/>
<id>urn:sha1:8c74456bfa3a19fb4e8f4e2a801a95ea14a6efb6</id>
<content type='text'>
[Detail]
Replace DISPMSG() as DISPDBG() to
reduce printk log

MTK-Commit-Id: d9613f32bb286cea1ce1f4cd87a2af91557643fb

Change-Id: I2d072885b6c83113490dc27823c822860ec201a5
Signed-off-by: Elvin Zhang &lt;elvin.zhang@mediatek.com&gt;
CR-Id:ALPS03499038
Feature:Display Driver
</content>
</entry>
<entry>
<title>Replace &lt;asm/uaccess.h&gt; with &lt;linux/uaccess.h&gt; globally</title>
<updated>2018-11-29T16:49:05+00:00</updated>
<author>
<name>Linus Torvalds</name>
<email>torvalds@linux-foundation.org</email>
</author>
<published>2016-12-24T19:46:01+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=8588b01909e0145e5e84f5fe0a5353bd194f205c'/>
<id>urn:sha1:8588b01909e0145e5e84f5fe0a5353bd194f205c</id>
<content type='text'>
This was entirely automated, using the script by Al:

  PATT='^[[:blank:]]*#[[:blank:]]*include[[:blank:]]*&lt;asm/uaccess.h&gt;'
  sed -i -e "s!$PATT!#include &lt;linux/uaccess.h&gt;!" \
        $(git grep -l "$PATT"|grep -v ^include/linux/uaccess.h)

to do the replacement at the end of the merge window.

Requested-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
Signed-off-by: Moyster &lt;oysterized@gmail.com&gt;
</content>
</entry>
<entry>
<title>mtk: videox&amp;systracker: fix memset-transposed-args warnings</title>
<updated>2017-12-18T22:39:47+00:00</updated>
<author>
<name>Mister Oyster</name>
<email>oysterized@gmail.com</email>
</author>
<published>2017-12-18T22:39:47+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=d6b16200598a3d46852afedbb429d3d9a7ee79c2'/>
<id>urn:sha1:d6b16200598a3d46852afedbb429d3d9a7ee79c2</id>
<content type='text'>
</content>
</entry>
<entry>
<title>MediaTek: Elevation of privilege vulnerability in MediaTek video driver</title>
<updated>2017-11-20T17:13:41+00:00</updated>
<author>
<name>Cesar Matias</name>
<email>cesar.maximo@gmail.com</email>
</author>
<published>2017-02-13T23:49:46+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=431fc4f26f963e827fd1e3693b41e2dc853e9fbc'/>
<id>urn:sha1:431fc4f26f963e827fd1e3693b41e2dc853e9fbc</id>
<content type='text'>
CVE-2016-3936, CVE-2016-3937

An elevation of privilege vulnerability in the MediaTek video driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process

Signed-off-by: Moyster &lt;oysterized@gmail.com&gt;
</content>
</entry>
<entry>
<title>misc: replace __FUNCTION__ by __function__</title>
<updated>2017-09-23T01:10:48+00:00</updated>
<author>
<name>Moyster</name>
<email>oysterized@gmail.com</email>
</author>
<published>2017-09-23T01:10:48+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=b8d1e07edc8d57883bf4b6ca70228b5a9e6b98b2'/>
<id>urn:sha1:b8d1e07edc8d57883bf4b6ca70228b5a9e6b98b2</id>
<content type='text'>
result of :
git grep -l '__FUNCTION__' | xargs sed -i 's/__FUNCTION__/__func__/g'
</content>
</entry>
<entry>
<title>display: fbconfig use after free</title>
<updated>2017-09-16T12:57:48+00:00</updated>
<author>
<name>Qinglong Chai</name>
<email>qinglong.chai@mediatek.com</email>
</author>
<published>2017-06-08T12:47:33+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=aeeea98b629f16665a0cc3a84b5c28a720f1ba21'/>
<id>urn:sha1:aeeea98b629f16665a0cc3a84b5c28a720f1ba21</id>
<content type='text'>
[Detail]
add mutex protect list_add and list_del
to  avoid use after free

Change-Id: Ic7d02a5b97955eaee4d3684e13a4a67f3349b42b
Signed-off-by: Qinglong Chai &lt;qinglong.chai@mediatek.com&gt;
CR-Id: ALPS03275524
Feature: disp
</content>
</entry>
<entry>
<title>Fix "Information disclosure vulnerability in MediaTek driver"</title>
<updated>2017-05-28T16:00:31+00:00</updated>
<author>
<name>fire855</name>
<email>thefire855@gmail.com</email>
</author>
<published>2017-04-08T21:30:28+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=f5834ec25091ea265da4b8c486b92ebe83990b4a'/>
<id>urn:sha1:f5834ec25091ea265da4b8c486b92ebe83990b4a</id>
<content type='text'>
CVE-2017-0529
</content>
</entry>
<entry>
<title>Fix "Elevation of privilege vulnerability in MediaTek video driver"</title>
<updated>2017-04-11T08:59:46+00:00</updated>
<author>
<name>fire855</name>
<email>thefire855@gmail.com</email>
</author>
<published>2017-02-12T01:37:10+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=e8ffd61e293c240372e3d40c28f1719c4f4a9f85'/>
<id>urn:sha1:e8ffd61e293c240372e3d40c28f1719c4f4a9f85</id>
<content type='text'>
CVE-2016-3936, CVE-2016-3937

An elevation of privilege vulnerability in the MediaTek video driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process.
</content>
</entry>
<entry>
<title>mt6735: Add an RGB configuration sys attr driver for videox/corr10</title>
<updated>2016-11-07T12:46:51+00:00</updated>
<author>
<name>Diogo Ferreira</name>
<email>defer@cyngn.com</email>
</author>
<published>2016-04-07T14:11:28+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=78ddc4b367f75fe6e3f00155ff43f4dc42a50a4b'/>
<id>urn:sha1:78ddc4b367f75fe6e3f00155ff43f4dc42a50a4b</id>
<content type='text'>
Adds the RGB configuration node which leverages the gamma subsystem to
perform color correction.

The new node takes rgb triplets that range from 0-2000 each, computes
the gamma registers and dispatches them to the gamma correction
subsystem.

Change-Id: Iac9d3cbd4f423ccfffb8d665c29cfd251767a398
</content>
</entry>
<entry>
<title>Fix "arbitrary write-zero in mtkfb_ioctl() of Mediatek driver" issue</title>
<updated>2016-11-07T12:46:49+00:00</updated>
<author>
<name>yang-cy.chen</name>
<email>yang-cy.chen@mediatek.com</email>
</author>
<published>2016-05-05T11:15:31+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=7db3ae6a43aac5e1fb2feeee53ddc1123cec50ec'/>
<id>urn:sha1:7db3ae6a43aac5e1fb2feeee53ddc1123cec50ec</id>
<content type='text'>
Problem:
lack of boundary check of user input parameter to cause arbitrary write-zero.

Solution:
remove unused code from driver

Bug num:28175025,28175027

Signed-off-by: yang-cy.chen &lt;yang-cy.chen@mediatek.com&gt;
(cherry picked from commit c811910368f393068b343ebdcb6d515dc33cd710)

Change-Id: Ie59f5dd742b6b2295f63f76583a5cac2bdcf5d53
Ticket: PORRIDGE-398
</content>
</entry>
</feed>
