Browse Source

Remove unused patches

master
Felix 4 months ago
parent
commit
6e63b87953

+ 0
- 55
patches/add-radio-audio-hal.patch View File

@@ -1,55 +0,0 @@
From 755c27fa8ff011fa541475185faebc8d405ce67d Mon Sep 17 00:00:00 2001
From: local__hero <none@none.none>
Date: Wed, 14 Nov 2018 10:22:36 +0100
Subject: [PATCH] TESTING: Add radio audio hal

---
Android.bp | 5 +++++
radio/am/1.0/IQcRilAudio.hal | 6 ++++++
radio/am/1.0/IQcRilAudioCallback.hal | 5 +++++
3 files changed, 16 insertions(+)
create mode 100644 radio/am/1.0/IQcRilAudio.hal
create mode 100644 radio/am/1.0/IQcRilAudioCallback.hal

diff --git a/Android.bp b/Android.bp
index 4dfd4c8..b37900c 100644
--- a/Android.bp
+++ b/Android.bp
@@ -11,6 +11,11 @@ hidl_package_root {
path: "vendor/qcom/opensource/interfaces/display",
}

+hidl_package_root {
+ name: "vendor.qti.hardware.radio.am",
+ path: "vendor/qcom/opensource/interfaces/radio/am",
+}
+
hidl_package_root {
name: "vendor.qti.hardware.wifi",
path: "vendor/qcom/opensource/interfaces/wifi",
diff --git a/radio/am/1.0/IQcRilAudio.hal b/radio/am/1.0/IQcRilAudio.hal
new file mode 100644
index 0000000..3828a94
--- /dev/null
+++ b/radio/am/1.0/IQcRilAudio.hal
@@ -0,0 +1,6 @@
+package vendor.qti.hardware.radio.am@1.0;
+import vendor.qti.hardware.radio.am@1.0::IQcRilAudioCallback;
+interface IQcRilAudio {
+ oneway setCallback(IQcRilAudioCallback iQcRilAudioCallback);
+ oneway setError(int32_t error);
+};
diff --git a/radio/am/1.0/IQcRilAudioCallback.hal b/radio/am/1.0/IQcRilAudioCallback.hal
new file mode 100644
index 0000000..d11d2c4
--- /dev/null
+++ b/radio/am/1.0/IQcRilAudioCallback.hal
@@ -0,0 +1,5 @@
+package vendor.qti.hardware.radio.am@1.0;
+interface IQcRilAudioCallback {
+ getParameters(string str) generates (string result);
+ setParameters(string str) generates (int32_t success);
+};
--
2.19.1


+ 0
- 32
patches/defconfig-tone-kagura.patch View File

@@ -1,33 +0,0 @@
From 824ea928641faafd18ae589be1ad88f596de0a6b Mon Sep 17 00:00:00 2001
From: Felix <none@none.none>
Date: Thu, 8 Nov 2018 02:04:48 +0100
Subject: [PATCH 2/2] Update kagura defconfig for SDE

---
arch/arm64/configs/aosp_tone_kagura_defconfig | 15 +++++----------
1 file changed, 5 insertions(+), 10 deletions(-)

diff --git a/arch/arm64/configs/aosp_tone_kagura_defconfig b/arch/arm64/configs/aosp_tone_kagura_defconfig
index 7e7caa52e6e2..93e8bf48edca 100644
--- a/arch/arm64/configs/aosp_tone_kagura_defconfig
+++ b/arch/arm64/configs/aosp_tone_kagura_defconfig
@@ -482,11 +480,11 @@ CONFIG_MSM_VIDC_VMEM=y
CONFIG_MSM_VIDC_3X_GOVERNORS=y
CONFIG_MSM_SDE_ROTATOR=y
CONFIG_QCOM_KGSL=y
-CONFIG_FB=y
-CONFIG_FB_MSM=y
-CONFIG_FB_MSM_MDSS=y
-CONFIG_FB_MSM_MDSS_WRITEBACK=y
-CONFIG_FB_MSM_MDSS_SPECIFIC_PANEL=y
+CONFIG_DRM=y
+CONFIG_DRM_SDE_EVTLOG_DEBUG=y
+CONFIG_DRM_SDE_RSC=y
+CONFIG_DRM_MSM_DSI_SOMC_PANEL=y
+CONFIG_FB_VIRTUAL=y
CONFIG_BACKLIGHT_LCD_SUPPORT=y
CONFIG_LCD_CLASS_DEVICE=y
CONFIG_BACKLIGHT_CLASS_DEVICE=y
2.19.1


+ 0
- 24
patches/defconfig-tone-use-drm.patch View File

@@ -1,25 +0,0 @@
From b1be5af3d240cc8f23c8a7d774e3042ac9668b33 Mon Sep 17 00:00:00 2001
From: Felix <none@none.none>
Date: Wed, 7 Nov 2018 09:37:35 +0100
Subject: [PATCH] Tone: use DRM for display

---
update_defconfig.sh | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/update_defconfig.sh b/update_defconfig.sh
index ee89f33..cb09359 100755
--- a/update_defconfig.sh
+++ b/update_defconfig.sh
@@ -37,7 +37,7 @@ loire)
DRM="false";;
tone)
DEVICE=$TONE;
- DRM="false";;
+ DRM="true";;
yoshino)
DEVICE=$YOSHINO;
DRM="false";;
2.19.1


+ 30
- 0
patches/kernel-fix-fib-rules.patch View File

@@ -0,0 +1,30 @@
From 40e188dc8fc37e7782dfaa0103c50a223470be59 Mon Sep 17 00:00:00 2001
From: Anonymous <none@none.none>
Date: Sun, 16 Jun 2019 23:52:16 +0200
Subject: [PATCH] Fix fib_rules.c

---
net/core/fib_rules.c | 7 +++----
1 file changed, 3 insertions(+), 4 deletions(-)

diff --git a/net/core/fib_rules.c b/net/core/fib_rules.c
index 268e32005273..31c4041f7586 100644
--- a/net/core/fib_rules.c
+++ b/net/core/fib_rules.c
@@ -486,10 +486,9 @@ int fib_nl_newrule(struct sk_buff *skb, struct nlmsghdr *nlh)
rule->uid_range = fib_kuid_range_unset;
}
- if (rule_exists(ops, frh, tb, rule)) {
- err = 0;
- if (nlh->nlmsg_flags & NLM_F_EXCL)
- err = -EEXIST;
+ if ((nlh->nlmsg_flags & NLM_F_EXCL) &&
+ rule_exists(ops, frh, tb, rule)) {
+ err = -EEXIST;
goto errout_free;
}
--
2.22.0


+ 0
- 111
patches/kernel-perf-core-avoid-race-condition-when-releasing-perf-e.patch View File

@@ -1,112 +0,0 @@
From 156b158a5cb8adc340acfb0409e227649d0a35a2 Mon Sep 17 00:00:00 2001
From: Raghavendra Rao Ananta <rananta@codeaurora.org>
Date: Fri, 14 Sep 2018 17:06:11 -0700
Subject: [PATCH] perf: core: Avoid race condition when releasing perf-events

The function, perf_event_release_kernel(), that's used to free the
perf events is dependent on the CPU associated to this event be
online. The function checks at the beginning: if the CPU is offline,
put it in a zombie list and return immediately. Else, proceed and
make a cross-cpu call (from perf_remove_from_context()) to complete
the functionality.

However, there's a potential chance of a race if the CPU went
offline between the initial check and the cross-cpu call. The
cross-cpu call deletes the event from the context's list, but
if the CPU is offline, this deletion doesn't happen. Later
the event is freed irrespective of this failure and the event
still exists in the list. Now, when the list is traversed, it
would try to access the memory which is freed, resulting in a
memory abort.

As a result, before calling perf_event_release_kernel(), capture
the perf's pmus_mutex lock to prevent the CPU from going offline
during the operation.

Change-Id: I20241639ea9a8dc87e5a88cf81e940b3d6cb773c
Signed-off-by: Raghavendra Rao Ananta <rananta@codeaurora.org>
Signed-off-by: Swetha Chikkaboraiah <schikk@codeaurora.org>
---
kernel/events/core.c | 22 +++++++++++++++++++---
1 file changed, 19 insertions(+), 3 deletions(-)

diff --git a/kernel/events/core.c b/kernel/events/core.c
index 87f33e4080f2..96545cbf9be5 100644
--- a/kernel/events/core.c
+++ b/kernel/events/core.c
@@ -4289,7 +4289,7 @@ static DEFINE_SPINLOCK(zombie_list_lock);
* object, it will not preserve its functionality. Once the last 'user'
* gives up the object, we'll destroy the thing.
*/
-int perf_event_release_kernel(struct perf_event *event)
+static int __perf_event_release_kernel(struct perf_event *event)
{
struct perf_event_context *ctx = event->ctx;
struct perf_event *child, *tmp;
@@ -4300,7 +4300,7 @@ int perf_event_release_kernel(struct perf_event *event)
* back online.
*/
#if defined CONFIG_HOTPLUG_CPU || defined CONFIG_KEXEC_CORE
- if (event->cpu != -1 && !cpu_online(event->cpu)) {
+ if (event->cpu != -1 && per_cpu(is_hotplugging, event->cpu)) {
if (event->state == PERF_EVENT_STATE_ZOMBIE)
return 0;
@@ -4417,6 +4417,17 @@ int perf_event_release_kernel(struct perf_event *event)
put_event(event); /* Must be the 'last' reference */
return 0;
}
+
+int perf_event_release_kernel(struct perf_event *event)
+{
+ int ret;
+
+ mutex_lock(&pmus_lock);
+ ret = __perf_event_release_kernel(event);
+ mutex_unlock(&pmus_lock);
+
+ return ret;
+}
EXPORT_SYMBOL_GPL(perf_event_release_kernel);
/*
@@ -11159,7 +11170,7 @@ static void perf_event_zombie_cleanup(unsigned int cpu)
* PMU expects it to be in an active state
*/
event->state = PERF_EVENT_STATE_ACTIVE;
- perf_event_release_kernel(event);
+ __perf_event_release_kernel(event);
spin_lock(&zombie_list_lock);
}
@@ -11174,6 +11185,7 @@ static int perf_event_start_swevents(unsigned int cpu)
struct perf_event *event;
int idx;
+ mutex_lock(&pmus_lock);
perf_event_zombie_cleanup(cpu);
idx = srcu_read_lock(&pmus_srcu);
@@ -11188,6 +11200,8 @@ static int perf_event_start_swevents(unsigned int cpu)
}
srcu_read_unlock(&pmus_srcu, idx);
per_cpu(is_hotplugging, cpu) = false;
+ mutex_unlock(&pmus_lock);
+
return 0;
}
@@ -11261,8 +11275,10 @@ static void perf_event_exit_cpu_context(int cpu) { }
int perf_event_exit_cpu(unsigned int cpu)
{
+ mutex_lock(&pmus_lock);
per_cpu(is_hotplugging, cpu) = true;
perf_event_exit_cpu_context(cpu);
+ mutex_unlock(&pmus_lock);
return 0;
}
2.22.0


Loading…
Cancel
Save