aboutsummaryrefslogtreecommitdiff
path: root/drivers/misc/mediatek
Commit message (Collapse)AuthorAgeFilesLines
...
* fm: get rid of Kconfig FM propsMister Oyster2017-04-111-25/+0
|
* wlan: get rid of Meizu's CONFIG_NL80211_FASTSCANMister Oyster2017-04-117-104/+0
|
* Security Vulnerability: I2C debug interfaceDavid Chu2017-04-111-1/+1
| | | | | | | | [Solution] Removed the debug device driver Bug: ALPS02943467 Change-Id: I4fd2751ed3832d09355457f104ae8f936f9c1240
* cleanup: remove ANT remnantsMister Oyster2017-04-112-10/+1
|
* sensor: modify lsm6ds0(gyro&acc) for gyro input data overflow and wrongwenhao.deng2017-01-232-7/+7
| | | | Change-Id: I8016cfbc631d4d516bd42e7cb24623593a6fec08
* sensor: lsm6ds0 acc&gyro work together in PowerMode, and change to 2000DPSwenhao.deng2017-01-235-9/+132
| | | | Change-Id: I19c5e9ea5234d81f8769526a06796f1886eb28c6
* sensor: gyro lsm6ds0 modify PowerModewenhao.deng2017-01-233-131/+42
| | | | Change-Id: I0a94400d7625378fda99b37a3e5479f42fe2d524
* remove FM code because FM is not usedXueqin Wang2017-01-2397-37509/+0
| | | | | | | | | | BUG=23460645 [Feature] FM radio Change-Id: Ie5279ade9858007fe4e93f9d9a99346fae859f52 Signed-off-by: Xueqin Wang <xueqin.wang@mediatek.com> CR-Id: ALPS02370452
* devinfo: remove pr_info in k-3.18Anmin Hsu2016-12-251-3/+3
| | | | | | | | | | | | | | | | [Detail] remove pr_info in devinfo.c and replace it with pr_debug/pr_warn [Solution] remove pr_info and replace it with pr_debug/pr_warn [Feature] devinfo MTK-Commit-Id: 86186d4992c89906baef8003ec745f5695587b80 Signed-off-by: Rex Chao <rex.chao@mediatek.com> Change-Id: I7b7097afb3a0805819dc9f5a16e0f6dc5c355564 CR-Id: ALPS02299710
* gps: gps kernel log reduceAnmin Hsu2016-12-251-15/+14
| | | | | | | | | | | | | | [Detail] reduce gps kernel print log [Solution] reduce gps printk log [Feature] Assisted GPS MTK-Commit-Id: a1820fe32d68e0f0a95624afab8cfd4f201be9ca Change-Id: I9768fa46cefc0df401592cf60a2b7496a4013815 Signed-off-by: Lockie Liu <Lockie.Liu@mediatek.com> CR-Id: ALPS02225137
* c2k_ccci: mediatek: sdio timeoutAnmin Hsu2016-12-251-0/+26
| | | | | | | | | | | | | | | | | [Detail] after suspend/resume, there may be sdio transfer timeout [Solution] add suspend/resume callback function in sdio client driver to avoid sd card remount after suspend/resume [Feature] SVLTE - C2K MTK-Commit-Id: d4c3967cdc7ac140c042e9f774f90a175783a257 Change-Id: I4173b2759886e4ca5d007a57c38fc64f5a65f885 Signed-off-by: Haow Wang <haow.wang@mediatek.com> CR-Id: ALPS02288503
* AEE: remove filp_open callMin Kuang2016-12-253-80/+0
| | | | | | | | | | Remove filp_open call and defeature related feature BUG=23460645 Change-Id: Ifa385249525fb4a7a14a6626ea3ca291fefdebc7 CR-Id:ALPS02341920 Signed-off-by: Min Kuang <min.kuang@mediatek.com>
* ANT:remove ANT+ kernel driver codeJun Wu2016-12-254-831/+0
| | | | | | | | | BUG=23460645 Change-Id: I303e1f49f6a5ae0bf8e9ae92de7403b9915298ca CR-Id:ALPS02268730 Feature: MTK ANT+ Solution Signed-off-by: Jun Wu <jun.wu@mediatek.com>
* mediatek drv_wlan: WLAN/WIFI RX EnhanceDerTeufel2016-12-191-1/+1
| | | | | dragonpt committed 9e6b229 2015-05-15
* net: dhcpv6: remove MTK_DHCPV6C_WIFI featureYingjoe Chen2016-12-191-5/+0
| | | | | | | | | | | | MTK extension MTK_DHCPV6C_WIFI is no longer necessary. Remove option and functionality. This reverts commit ccd52552b0ef ("HPV6: fix HPv6 onfig Error") and 4996bbf5c24b ("DHCPV6:Support DHCPV6 to Assign IPV6 Address") Change-Id: I3a1ea546bd4006546a301e0fc0fed721ae5c507f CR-Id: ALPS02210363 Signed-off-by: Yingjoe Chen <yingjoe.chen@mediatek.com>
* mediatek: update asf driverfire8552016-12-1134-58/+3619
| | | | Backported from 3.18 MM kernel
* mlog_logger.c: fix build after removing zram->init_done structDerTeufel2016-12-111-1/+1
|
* zram: promote zram from stagingMinchan Kim2016-12-111-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Zram has lived in staging for a LONG LONG time and have been fixed/improved by many contributors so code is clean and stable now. Of course, there are lots of product using zram in real practice. The major TV companys have used zram as swap since two years ago and recently our production team released android smart phone with zram which is used as swap, too and recently Android Kitkat start to use zram for small memory smart phone. And there was a report Google released their ChromeOS with zram, too and cyanogenmod have been used zram long time ago. And I heard some disto have used zram block device for tmpfs. In addition, I saw many report from many other peoples. For example, Lubuntu start to use it. The benefit of zram is very clear. With my experience, one of the benefit was to remove jitter of video application with backgroud memory pressure. It would be effect of efficient memory usage by compression but more issue is whether swap is there or not in the system. Recent mobile platforms have used JAVA so there are many anonymous pages. But embedded system normally are reluctant to use eMMC or SDCard as swap because there is wear-leveling and latency issues so if we do not use swap, it means we can't reclaim anoymous pages and at last, we could encounter OOM kill. :( Although we have real storage as swap, it was a problem, too. Because it sometime ends up making system very unresponsible caused by slow swap storage performance. Quote from Luigi on Google "Since Chrome OS was mentioned: the main reason why we don't use swap to a disk (rotating or SSD) is because it doesn't degrade gracefully and leads to a bad interactive experience. Generally we prefer to manage RAM at a higher level, by transparently killing and restarting processes. But we noticed that zram is fast enough to be competitive with the latter, and it lets us make more efficient use of the available RAM. " and he announced. http://www.spinics.net/lists/linux-mm/msg57717.html Other uses case is to use zram for block device. Zram is block device so anyone can format the block device and mount on it so some guys on the internet start zram as /var/tmp. http://forums.gentoo.org/viewtopic-t-838198-start-0.html Let's promote zram and enhance/maintain it instead of removing. Signed-off-by: Minchan Kim <minchan@kernel.org> Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com> Acked-by: Nitin Gupta <ngupta@vflare.org> Acked-by: Pekka Enberg <penberg@kernel.org> Cc: Bob Liu <bob.liu@oracle.com> Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org> Cc: Hugh Dickins <hughd@google.com> Cc: Jens Axboe <axboe@kernel.dk> Cc: Luigi Semenzato <semenzato@google.com> Cc: Mel Gorman <mgorman@suse.de> Cc: Rik van Riel <riel@redhat.com> Cc: Seth Jennings <sjenning@linux.vnet.ibm.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org> Conflicts: drivers/block/Makefile
* zsmalloc: move it under mmMinchan Kim2016-12-111-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This patch moves zsmalloc under mm directory. Before that, description will explain why we have needed custom allocator. Zsmalloc is a new slab-based memory allocator for storing compressed pages. It is designed for low fragmentation and high allocation success rate on large object, but <= PAGE_SIZE allocations. zsmalloc differs from the kernel slab allocator in two primary ways to achieve these design goals. zsmalloc never requires high order page allocations to back slabs, or "size classes" in zsmalloc terms. Instead it allows multiple single-order pages to be stitched together into a "zspage" which backs the slab. This allows for higher allocation success rate under memory pressure. Also, zsmalloc allows objects to span page boundaries within the zspage. This allows for lower fragmentation than could be had with the kernel slab allocator for objects between PAGE_SIZE/2 and PAGE_SIZE. With the kernel slab allocator, if a page compresses to 60% of it original size, the memory savings gained through compression is lost in fragmentation because another object of the same size can't be stored in the leftover space. This ability to span pages results in zsmalloc allocations not being directly addressable by the user. The user is given an non-dereferencable handle in response to an allocation request. That handle must be mapped, using zs_map_object(), which returns a pointer to the mapped region that can be used. The mapping is necessary since the object data may reside in two different noncontigious pages. The zsmalloc fulfills the allocation needs for zram perfectly [sjenning@linux.vnet.ibm.com: borrow Seth's quote] Signed-off-by: Minchan Kim <minchan@kernel.org> Acked-by: Nitin Gupta <ngupta@vflare.org> Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com> Cc: Bob Liu <bob.liu@oracle.com> Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org> Cc: Hugh Dickins <hughd@google.com> Cc: Jens Axboe <axboe@kernel.dk> Cc: Luigi Semenzato <semenzato@google.com> Cc: Mel Gorman <mgorman@suse.de> Cc: Pekka Enberg <penberg@kernel.org> Cc: Rik van Riel <riel@redhat.com> Cc: Seth Jennings <sjenning@linux.vnet.ibm.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org> Conflicts: mm/Kconfig mm/Makefile
* FmRadio: fix it, by adding definition for COMPAT_FM_IOCTL_GET_AUDIO_INFODerTeufel2016-11-172-2/+11
| | | | fixes ioctl fail
* mediatek: aee: remove dependencies on deprecated android loggerfire8552016-11-172-6/+6
|
* Revert "hand-pick: mediatek:remove unnecessary sido call flow"Moyster2016-11-111-0/+12
| | | | This reverts commit 9a7858491639342b5d3c8d496d3b9370d2330591.
* wlan: WiFi Direct CTS fixsdragonpt2016-11-116-11/+66
| | | | | | | | | | | | | | | | | | | | | | Cylen Yao <cylen.yao@mediatek.com> Details: 1. WiFi Direct CTS tests will fail as supplicant and driver could not keep sync in following case: 1.1 supplicant will request channel when do p2p listen, but driver/firmware has not switch to the target channel when supplicant get remain on channel credit by call driver API of remain on channel; This will make supplicant and driver in unsync state which will make supplicant fail to go to listen state randomly. 1.2 Supplicant and driver will also keep unsync when do mgmt frame TX; supplicant will do other task once mgmt frame TX is returned by calling driver API mgmt_tx, but, driver has not actually TX the mgmt frame out. In extremely case, driver will drop the second mgmt frame if the previous on has not been TX out, just as the group owner test case.
* Fix "Security Vulnerability - kernel info leak of wifi driver"cm2016-11-111-7/+14
|
* Fix compilingfire8552016-11-071-1/+1
|
* mt6735: Add an RGB configuration sys attr driver for videox/corr10Diogo Ferreira2016-11-074-4/+111
| | | | | | | | | | | Adds the RGB configuration node which leverages the gamma subsystem to perform color correction. The new node takes rgb triplets that range from 0-2000 each, computes the gamma registers and dispatches them to the gamma correction subsystem. Change-Id: Iac9d3cbd4f423ccfffb8d665c29cfd251767a398
* Fix "arbitrary write-zero in mtkfb_ioctl() of Mediatek driver" issueyang-cy.chen2016-11-072-97/+2
| | | | | | | | | | | | | | | | Problem: lack of boundary check of user input parameter to cause arbitrary write-zero. Solution: remove unused code from driver Bug num:28175025,28175027 Signed-off-by: yang-cy.chen <yang-cy.chen@mediatek.com> (cherry picked from commit c811910368f393068b343ebdcb6d515dc33cd710) Change-Id: Ie59f5dd742b6b2295f63f76583a5cac2bdcf5d53 Ticket: PORRIDGE-398
* Fix "stack overflow in Mediatek Thermal driver" issueyang-cy.chen2016-11-071-0/+3
| | | | | | | | | | | | | | Problem: lack of boundary check of user input parameter before copy_from_user. Solution: Add boundary protection to prevent buffer overflow Bug num:28332766 Change-Id: I8536ae241070e59fbb15449bd3bca00d895e0b3f Signed-off-by: yang-cy.chen <yang-cy.chen@mediatek.com> Ticket: PORRIDGE-398
* Fix "Security Vulnerability - arbitrary address write ddp_drv.c" issueyang-cy.chen2016-11-074-52/+0
| | | | | | | | | | | | | | | | Problem: user input parameter without validation Solution: Remove legacy code to prevent buffer overflow Bug num:28402341 Signed-off-by: yang-cy.chen <yang-cy.chen@mediatek.com> (cherry picked from commit 76884c3948a5896c7d724a6852e9f8d1403fa9d0) Change-Id: I77467ae0c0652c7f44238b0320a1a6fef71c0d97 Ticket: PORRIDGE-398
* Fix "Security Vulnerability - kernel info leak ddp_drv.c" issueyang-cy.chen2016-11-071-1/+0
| | | | | | | | | | | | | | | | Problem: user input parameter without validation Solution: Remove legacy code to prevent buffer overflow Bug num:28402240 Signed-off-by: yang-cy.chen <yang-cy.chen@mediatek.com> (cherry picked from commit a8a18e931e3772d1bef10ec0b4611aa25831f0c0) Change-Id: I046968817190fc054225fb8c73f87574ec8db511 Ticket: PORRIDGE-398
* hand-pick: mediatek:remove unnecessary sido call flowMoyster2016-11-071-12/+0
| | | | | | | | | | | | | Problem: unnecessary sido call flow cause watchdog timeout Solution: remove unnecessary part that cause the issue Bug num:20566147 Change-Id: Iee332f38d339808f7245b4b0271b0f353f4081c4 Signed-off-by: yang-cy.chen <yang-cy.chen@mediatek.com>
* fix partition pathMoyster2016-09-101-1/+1
|
* somewhat arbitrary value ported from Vernee Thor. 0x0153 is likely wrongMoyster2016-08-261-0/+1
|
* fix invalid ipv6 reference on disabled ipv6Stefan Guendhoer2016-08-262-2/+8
|
* Fix some kernel mismatch errorsJan Magnus Brevik2016-08-264-7/+7
| | | | Signed-off-by: Stefan Guendhoer <stefan@guendhoer.com>
* 3.10.76 -> 3.10.77Jan Engelmohr2016-08-263-0/+0
|
* fixed ThunderQuake Engine to work with MT6753visi0nary2016-08-261-2/+3
| | | | Change-Id: Id13b248fef9425cfc1fb3352bb36446c4e8a8513
* update for mt6753Jan Magnus Brevik2016-08-261-4/+4
|
* implemented thunderquake engineVarun Chitre2016-08-262-0/+122
|
* Compiling fixesfire8552016-08-262-6/+6
|
* Fix "Buffer overflow in Mediatek WIFI driver" issueyang-cy.chen2016-08-261-6/+6
| | | | | | | | | | | | | | Problem: lack of boundary check of user input parameter Solution: Add boundary protection to prevent buffer overflow Bug num:28175522 Change-Id: Id3cdc5b073e88d5e31884e58026d51848852f9db Signed-off-by: yang-cy.chen <yang-cy.chen@mediatek.com> (cherry picked from commit f341365df14fc82fc778b64f954d572bc1590694)
* Fix "stack overflow in Mediatek WIFI driver" issue Based on: ↵fire8552016-08-261-821/+3
| | | | https://android.googlesource.com/kernel/mediatek/+/13a29ccea87ae65cbaaa40f22a16469cd5cd8c27
* Security vulnerability in Mediatek Wifi driveryang-cy.chen2016-08-262-35/+26
| | | | | | | | | | | | | | | Problem: Security vulnerability of directly using user space pointer in kernel space Solution: Using copy_from_user and boundary protection to prevent such issue in kernel Bug num:27677942 Change-Id: I410171377fda5b841523d4b5a35d53baee2d35ab Signed-off-by: yang-cy.chen <yang-cy.chen@mediatek.com>
* Security vulnerability in Mediatek WIFI driveryang-cy.chen2016-08-267-99/+167
| | | | | | | | | | | | | Problem: No boundary protection of the copy length when call copy_from_user() Solution: add boundary check to prevent buffer overflow Bug num:27549705 Change-Id: I31fc82c3328d017ca9d7c6232a9699538ff3a398 Signed-off-by: yang-cy.chen <yang-cy.chen@mediatek.com>
* Fix "[Security Vulnerability]mt_wifi IOCTL_GET_STRUCT EOP" issueyang-cy.chen2016-08-261-3/+6
| | | | | | | | | | | | | | | | Problem: prNdisReq->ndisOidContent is in a static allocation of size 0x1000, and prIwReqData->data.length is a usermode controlled unsigned short ,so the copy_from_user results in memory corruption. Solution: Add boundary protection to prevent buffer overflow Bug num:26267358 Change-Id: I70f9d2affb9058e2e80b6b9f8278d538186283d3 Signed-off-by: yang-cy.chen <yang-cy.chen@mediatek.com> (cherry picked from commit 9c112c7344a2642a6e7ee29ee920900248a29e8a)
* Fix "buffer overflow in Mediatek HWMON driver" issuefire8552016-08-261-0/+15
| | | | Based on: https://android.googlesource.com/kernel/mediatek/+/30890de84da3870678450ff1e4b5a7f9afb38b00
* Fix "stack overflow in Mediatek Thermal driver" issuefire8552016-08-261-0/+1
| | | | Based on: https://android.googlesource.com/kernel/mediatek/+/5b3055f1c7ef9eb9fc703b4ffdbbd1bbee68a980
* Fix "stack overflow in Mediatek Thermal driver" issueyang-cy.chen2016-08-261-0/+3
| | | | | | | | | | | | | Problem: lack of boundary check of user input parameter before copy_from_user. Solution: Add boundary protection to prevent buffer overflow Bug num:28333002 Change-Id: I8364a6cbf69527d4b2f2fa7874c8c01720febd5d Signed-off-by: yang-cy.chen <yang-cy.chen@mediatek.com>
* Fix "buffer overflow in mt3326_gps_write() of Mediatek driver" issueyang-cy.chen2016-08-261-1/+3
| | | | | | | | | | | | | Problem: lack of boundary check of user input parameter before copy_from_user. Solution: Add boundary protection to prevent buffer overflow Bug num:28174914 Change-Id: Ieb439cba0ed9c9304b14a319515472eb09dc17dd Signed-off-by: yang-cy.chen <yang-cy.chen@mediatek.com>
* Fix "[Security Vulnerability] Thermal:potential buffer overflow" issueyang-cy.chen2016-08-262-0/+4
| | | | | | | | | | | | | | Problem: lack of boundary check of user input parameter before copy_from_user. Solution: Add boundary protection to prevent buffer overflow Bug num:28085410 Change-Id: I178730c373ed3eab3e197b10362c987df659e4c3 Signed-off-by: yang-cy.chen <yang-cy.chen@mediatek.com> (cherry picked from commit e2c408685e93f73ca16b9d5bc23a186f258a1617)