Tags: jcadduono/nethunter_kernel_mako
Tags
Enable setting security contexts on rootfs inodes. rootfs (ramfs) can support setting of security contexts by userspace due to the vfs fallback behavior of calling the security module to set the in-core inode state for security.* attributes when the filesystem does not provide an xattr handler. No xattr handler required as the inodes are pinned in memory and have no backing store. This is useful in allowing early userspace to label individual files within a rootfs while still providing a policy-defined default via genfs. Signed-off-by: Stephen Smalley <[email protected]> Change-Id: I3436cf9ae27ade445e37376d7b9125746b1e506f
Enable setting security contexts on rootfs inodes. rootfs (ramfs) can support setting of security contexts by userspace due to the vfs fallback behavior of calling the security module to set the in-core inode state for security.* attributes when the filesystem does not provide an xattr handler. No xattr handler required as the inodes are pinned in memory and have no backing store. This is useful in allowing early userspace to label individual files within a rootfs while still providing a policy-defined default via genfs. Signed-off-by: Stephen Smalley <[email protected]> Change-Id: I3436cf9ae27ade445e37376d7b9125746b1e506f
Enable setting security contexts on rootfs inodes. rootfs (ramfs) can support setting of security contexts by userspace due to the vfs fallback behavior of calling the security module to set the in-core inode state for security.* attributes when the filesystem does not provide an xattr handler. No xattr handler required as the inodes are pinned in memory and have no backing store. This is useful in allowing early userspace to label individual files within a rootfs while still providing a policy-defined default via genfs. Signed-off-by: Stephen Smalley <[email protected]> Change-Id: I3436cf9ae27ade445e37376d7b9125746b1e506f
msm: msm_fb: remove mmio access through mmap Disable access to mm io and add appropriate range checks to ensure valid accesses through framebuffer mmap. This prevents illegal access into memory. CRs-Fixed: 474706 Change-Id: If25166f2732433ef967e99c716440030b567aae9 Signed-off-by: Manoj Rao <[email protected]>
msm: msm_fb: remove mmio access through mmap Disable access to mm io and add appropriate range checks to ensure valid accesses through framebuffer mmap. This prevents illegal access into memory. CRs-Fixed: 474706 Change-Id: If25166f2732433ef967e99c716440030b567aae9 Signed-off-by: Manoj Rao <[email protected]>
msm: audio: qdsp6v2: Add size safety check to ACDB driver Check that the size sent by userspace is not larger then the internal amount allowed. This protects against overflowing the stack due to an invalid size. Change-Id: I8230fdb00a7b57d398929e8ab0eb6587476f3db1 CRs-fixed: 470222 Signed-off-by: Ben Romberger <[email protected]>
Revert "msm_fb: display: remove background invert alpha option for al… …pha drop pipe" This reverts commit 0119007a18aae8a8fb43f4320509bda161da4167. CRs-fixed: 461574 Change-Id: Ia768030ec859a4ff38549686936789413826df32 Signed-off-by: Mayank Chopra <[email protected]>
Revert "msm_fb: display: remove background invert alpha option for al… …pha drop pipe" This reverts commit 0119007a18aae8a8fb43f4320509bda161da4167. CRs-fixed: 461574 Change-Id: Ia768030ec859a4ff38549686936789413826df32 Signed-off-by: Mayank Chopra <[email protected]>
Revert "msm_fb: display: remove background invert alpha option for al… …pha drop pipe" This reverts commit 0119007a18aae8a8fb43f4320509bda161da4167. CRs-fixed: 461574 Change-Id: Ia768030ec859a4ff38549686936789413826df32 Signed-off-by: Mayank Chopra <[email protected]>
msm: camera: Remove unused code used to map userspace buffers. Remove MSM_CAM_IOCTL_SET_MEM_MAP_INFO IOCTL support, since the usage of this IOCTL is now depreciated. Change-Id: I2ca8477fc804a80587bf40dba38904347e9b25aa Signed-off-by: Kiran Kumar H N <[email protected]>
PreviousNext