Android-x86
Fork
Spenden

  • R/O
  • HTTP
  • SSH
  • HTTPS

hardware-libhardware: Liste der Commits

hardware/libhardware


RSS
Rev. Zeit Autor
81a42e8 nougat-x86 android-x86-7.1-r1 android-x86-7.1-r2 android-x86-7.1-r3 android-x86-7.1-r4 android-x86-7.1-r5 2017-05-05 02:10:08 Paulo Sergio Travaglia

HACK - Avoid crashes on SurfaceFlinger when using software rendering

When using sw rendering, depending user action (pressing HOME button after
lauching an app, for instance) there's an attempt do map a vaddr that has
already been mapped. And this is done by the process that created it.
This triggers a kernel trap and surfaceflinger is destroyed:

=========================================================================
10-30 18:14:11.474 1096 1645 D gralloc : gralloc_map() succeeded fd=59,
off=0, size=1028096, vaddr=0xaac21000

10-30 18:14:11.474 1355 1389 D gralloc : gralloc_map() succeeded fd=202,
off=0, size=1028096, vaddr=0x8d0f2000

10-30 18:14:11.475 1096 1096 D gralloc : Registering a buffer in the
process that created it. This may cause memory ordering problems.

10-30 18:14:11.475 1096 1096 D gralloc : gralloc_map() succeeded
fd=60, off=0, size=1028096, vaddr=0xaac21000

10-30 18:14:11.574 1095 1095 I ServiceManager: service 'gpu' died
=========================================================================

In order to avoid this, the patch avoids mapping a buffer when the
mapping process is the creator process.

This should be threated as a workaround and removed when the real
root cause is discovered.

e0f9e2b 2017-05-05 02:10:08 Chih-Wei Huang

gralloc: auto select pixel format according to color depth

Change-Id: I1e6db2bbe03260d156644ca0700eb2e3e02956dc

d6aebac 2016-12-15 06:31:01 Jongrak Kwon

hw_auth_token: use macro for HW_AUTH_TOKEN_VERSION

This is to support FPC SW20.6

Bug: 33251689
Change-Id: I9abbf7f9d21c7c8ed21920d94fcf5bf889d4b3f7

5e4e9f1 2016-12-03 05:14:05 Jakub Pawlowski

Merge "BLE OOB Pairing - parse address type (2/5)" into nyc-mr2-dev

25dcc1d 2016-12-01 05:21:30 rago

Fix security vulnerability: potential OOB write in audioserver am: 3f9a6d3bd9 am: 28d8817df3 am: 750a6a4ed8 am: 559dbde531 am: 4654f9ab8b am: 4154f08e79 am: 2ebeab8c6b am: c196433170 am: cd6ebe9b27 am: 21c9c6dc69 am: 3110aeafeb am: c5ced57319 am: 66b8752e83
am: ecab7b6547

Change-Id: I3fb3598eb11bab1860a55762ba26700bece207aa

ecab7b6 2016-12-01 05:16:28 rago

Fix security vulnerability: potential OOB write in audioserver am: 3f9a6d3bd9 am: 28d8817df3 am: 750a6a4ed8 am: 559dbde531 am: 4654f9ab8b am: 4154f08e79 am: 2ebeab8c6b am: c196433170 am: cd6ebe9b27 am: 21c9c6dc69 am: 3110aeafeb am: c5ced57319
am: 66b8752e83

Change-Id: I1aa2ef6f03391f9f53630f030b6bbef12e1a019d

66b8752 2016-12-01 05:10:57 rago

Fix security vulnerability: potential OOB write in audioserver am: 3f9a6d3bd9 am: 28d8817df3 am: 750a6a4ed8 am: 559dbde531 am: 4654f9ab8b am: 4154f08e79 am: 2ebeab8c6b am: c196433170 am: cd6ebe9b27 am: 21c9c6dc69 am: 3110aeafeb
am: c5ced57319

Change-Id: Ie3a728280f0eb897f4cff39f1f97c24d62989f4e

c5ced57 2016-12-01 05:05:25 rago

Fix security vulnerability: potential OOB write in audioserver am: 3f9a6d3bd9 am: 28d8817df3 am: 750a6a4ed8 am: 559dbde531 am: 4654f9ab8b am: 4154f08e79 am: 2ebeab8c6b am: c196433170 am: cd6ebe9b27 am: 21c9c6dc69
am: 3110aeafeb

Change-Id: I5f6830b3d713fa9836065ef4101317f4d17488c2

3110aea 2016-12-01 05:00:25 rago

Fix security vulnerability: potential OOB write in audioserver am: 3f9a6d3bd9 am: 28d8817df3 am: 750a6a4ed8 am: 559dbde531 am: 4654f9ab8b am: 4154f08e79 am: 2ebeab8c6b am: c196433170 am: cd6ebe9b27
am: 21c9c6dc69

Change-Id: I199ff9b65f50ab98676c4e449fa7cfc1ebb8ec85

21c9c6d 2016-12-01 04:55:25 rago

Fix security vulnerability: potential OOB write in audioserver am: 3f9a6d3bd9 am: 28d8817df3 am: 750a6a4ed8 am: 559dbde531 am: 4654f9ab8b am: 4154f08e79 am: 2ebeab8c6b am: c196433170
am: cd6ebe9b27

Change-Id: Ia1c55db37373474552543c3a0f4fad7b6305a2a0

cd6ebe9 2016-12-01 04:49:23 rago

Fix security vulnerability: potential OOB write in audioserver am: 3f9a6d3bd9 am: 28d8817df3 am: 750a6a4ed8 am: 559dbde531 am: 4654f9ab8b am: 4154f08e79 am: 2ebeab8c6b
am: c196433170

Change-Id: Ib2c430673490d56347b7c5719ae9ac222129d046

c196433 2016-12-01 04:44:52 rago

Fix security vulnerability: potential OOB write in audioserver am: 3f9a6d3bd9 am: 28d8817df3 am: 750a6a4ed8 am: 559dbde531 am: 4654f9ab8b am: 4154f08e79
am: 2ebeab8c6b

Change-Id: I8ee48760ca62d1e9002a53694be8f39ff47a7b33

2ebeab8 2016-12-01 04:38:52 rago

Fix security vulnerability: potential OOB write in audioserver am: 3f9a6d3bd9 am: 28d8817df3 am: 750a6a4ed8 am: 559dbde531 am: 4654f9ab8b
am: 4154f08e79

Change-Id: I810091a4bc2713ec688e01f8656d581018e767dd

4154f08 2016-12-01 04:34:22 rago

Fix security vulnerability: potential OOB write in audioserver am: 3f9a6d3bd9 am: 28d8817df3 am: 750a6a4ed8 am: 559dbde531
am: 4654f9ab8b

Change-Id: I6b12abacd19b3ac06c054d05c5f381d234756593

4654f9a 2016-12-01 04:28:51 rago

Fix security vulnerability: potential OOB write in audioserver am: 3f9a6d3bd9 am: 28d8817df3 am: 750a6a4ed8
am: 559dbde531

Change-Id: I800e527ba948c4416aeee1375e909f7da6f42a71

559dbde 2016-12-01 04:23:23 rago

Fix security vulnerability: potential OOB write in audioserver am: 3f9a6d3bd9 am: 28d8817df3
am: 750a6a4ed8

Change-Id: I9254658ce47758df06c15c049d80862e7e774847

750a6a4 2016-12-01 04:17:50 rago

Fix security vulnerability: potential OOB write in audioserver am: 3f9a6d3bd9
am: 28d8817df3

Change-Id: Icd0c6917e987c5a5cbb1fb540a4d34e2032d6081

28d8817 2016-12-01 04:12:19 rago

Fix security vulnerability: potential OOB write in audioserver
am: 3f9a6d3bd9

Change-Id: Ia7aefc3e6e49f9e0105acc5fc816cd8e0bdd9cd9

3f9a6d3 2016-11-30 07:56:45 rago

Fix security vulnerability: potential OOB write in audioserver

Bug: 32705438
Bug: 32703959
Test: cts security test
Change-Id: I920a74cb0a809c623ddf802f3d2808f0f1bd537c

93bd76b 2016-11-11 05:19:38 Jakub Pawlowski

BLE OOB Pairing - parse address type (2/5)

When address type is not parsed, creating bond to devices not using
random address is impossible.

Bug: 32780409
Test: try pairing with nRF52DK using random address
Change-Id: I1265b6abdefa12dc024d00ecf232f7fc7722d178
(cherry picked from commit d82fbad4aa900a6187525bc0f779de76f47cccb5)

c1ded2a 2016-10-15 02:31:56 Nick Vaccaro

Sensors: MultiHal: support sensor API version 1.4

Add ability to support HALs with an API version of
SENSORS_DEVICE_API_VERSION_1_4.

Bug: 32113642
Change-Id: If61ff54faa9aefc959102a097df60e75a230cae3

28a872e 2016-10-06 03:39:39 Tucker Sylvestro

Treat all tags as unsigned when comparing them

All tags are presumed to be unsigned, but some of them have signed
representations that are negative. This caused problems in
AuthorizationSet.Deduplicate, where TAG_APPLICATION_DATA (signed rep
of -1879047492) was being sorted before TAG_INVALID (0), which was
presumed to always be first in the list.

BUG: 30701680
Change-Id: I67047cee21fd7617248022a4674779fe80d5ddfd

5982d8f 2016-09-17 01:34:17 Eric Laurent

audio effect: add flag for effects without actual processing
am: 4725741d0e

Change-Id: I74e8ca3a0670bb49ec69813a2f5bf91994c61515

4725741 2016-09-16 03:52:22 Eric Laurent

audio effect: add flag for effects without actual processing

Add a flag for effect descriptor indicating that the effect does not
implement a process function. This tells the framework that no
latency or performance penalty comes with enabling this effect.
When this flag is set, the process function does not have to be implemented
by the effect implementation.

Bug: 31491112
Change-Id: I69e6959eb17e04266f4de3f2943c226e34868b1f

59d9fb4 2016-08-06 13:04:24 Nick Vaccaro

Sensors: MultiHal: ignore errors from poll calls

MultiHal was not properly fielding errors from the poll() calls of
sub-HALs. Propagating errors received from sub-HALs up to Sensor
Services causes Sensor Services to abort, so instead of propagating
the error up to Sensor Services, the MultiHal logs a message to
logcat to fix the sub-HAL problem.

Bug: 30060537
Change-Id: I6e20c193a2f2d228da48cf3d5a23e439eaf663df

890a976 2016-07-20 09:37:41 Nick Vaccaro

Merge \\\"DO NOT MERGE ANYWHERE Sensors: MultiHal: ignore errors from poll calls\\\" into cw-e-dev am: f7eed1ea07 -s ours am: df20006a10 -s ours
am: 2537c546f3 -s ours

Change-Id: I135fc8f84e358a0af581a8b10632035372c5450d

2537c54 2016-07-20 09:35:07 Nick Vaccaro

Merge \\"DO NOT MERGE ANYWHERE Sensors: MultiHal: ignore errors from poll calls\\" into cw-e-dev am: f7eed1ea07 -s ours
am: df20006a10 -s ours

Change-Id: I2e73c8d4a4fd201a4e8ec1040b229440a4b365c9

df20006 2016-07-20 09:32:34 Nick Vaccaro

Merge \"DO NOT MERGE ANYWHERE Sensors: MultiHal: ignore errors from poll calls\" into cw-e-dev
am: f7eed1ea07 -s ours

Change-Id: I48415c2c6aed8f18212b239469a9c66894f753af

f7eed1e 2016-07-20 08:55:21 Nick Vaccaro

Merge "DO NOT MERGE ANYWHERE Sensors: MultiHal: ignore errors from poll calls" into cw-e-dev

877af59 2016-07-20 08:43:21 Nick Vaccaro

DO NOT MERGE ANYWHERE Sensors: MultiHal: ignore errors from poll calls

MultiHal was not properly fielding errors from the poll() calls of
sub-HALs. Propagating errors received from sub-HALs up to Sensor
Services causes Sensor Services to abort, so instead of propagating
the error up to Sensor Services, the MultiHal logs a message to
logcat to fix the sub-HAL problem.

Bug: 30060537
Change-Id: I6e20c193a2f2d228da48cf3d5a23e439eaf663df

Show on old repository browser