52 Commits

Author SHA1 Message Date
Richard Raya
1af43dc9da msm-4.14: Run dos2unix treewide
find . -type f -print0 | xargs -0 -n 1 -P 12 dos2unix

Change-Id: I0a93052f5b83de7ee3d66ab372280f5401b8d00b
Signed-off-by: Richard Raya <rdxzv.dev@gmail.com>
2024-08-17 19:37:38 -03:00
Panchajanya1999
d321a83c5c techpack/audio: Target user build variants
Change-Id: I481c891b8e853d272cfbe2b6b912dc767f74c710
Signed-off-by: Panchajanya1999 <panchajanya@azure-dev.live>
Signed-off-by: Richard Raya <rdxzv.dev@gmail.com>
2024-08-17 19:36:05 -03:00
Richard Raya
d1df81d98d Merge tag 'LA.UM.9.1.r1-16300-SMxxx0.QSSI14.0' of https://git.codelinaro.org/clo/la/platform/vendor/opensource/audio-kernel
"LA.UM.9.1.r1-16300-SMxxx0.QSSI14.0"

* tag 'LA.UM.9.1.r1-16300-SMxxx0.QSSI14.0' of https://git.codelinaro.org/clo/la/platform/vendor/opensource/audio-kernel:
  dsp: q6voice: Adds checks for an integer overflow
  dsp: q6voice: Adds checks for an integer overflow
  dsp: q6lsm: Check size of payload before access
  dsp: q6lsm: Check size of payload before access
  Fix for OOB access issue
  Fix for OOB access issue
  ASoC: msm-audio-effects-q6-v2: Add BPF order check
  audio-kernel: Add changes in multiple files to unblock CR's
  dsp: q6voice: Add buf size check for cvs cal data

Change-Id: I5a461411130da487544d758966e75808d1eb2936
Signed-off-by: Richard Raya <rdxzv.dev@gmail.com>
2024-07-23 18:00:56 -03:00
Richard Raya
2d8ca01838 msm-4.14: Remove Qualcomm RmNet extensions
Change-Id: I3b65d85babe24b4b38afb3898b1e00fd06405356
Signed-off-by: Richard Raya <rdxzv.dev@gmail.com>
2024-05-28 22:07:02 -03:00
Forenche
41ead3880c techpack/audio: Fix xiaomi bug
Basically the charger was detected as USB type-C Headphones so nuke the check as it is retarded
Also the analog USB type-C to 3.5mm Jack dongle doesn't work for us so remove the case entirely

Change-Id: I22b4a7d4280d48b8bfb820a399d5b7e1d7ea74d5
Signed-off-by: Forenche <prahul2003@gmail.com>
Signed-off-by: Richard Raya <rdxzv.dev@gmail.com>
2024-05-17 21:59:10 -03:00
Richard Raya
58c8cfc2a7 Merge tag 'LA.UM.9.1.r1-15900.01-SMxxx0.QSSI14.0' of https://git.codelinaro.org/clo/la/platform/vendor/opensource/audio-kernel into HEAD
"LA.UM.9.1.r1-15900.01-SMxxx0.QSSI14.0"

* tag 'LA.UM.9.1.r1-15900.01-SMxxx0.QSSI14.0' of https://git.codelinaro.org/clo/la/platform/vendor/opensource/audio-kernel:
  ASoC: msm-audio-effects-q6-v2: Add BPF order check
  dsp: q6afe: Add check for fbsp state

Change-Id: I98f9624604c595585d514bfc956fe170e3973019
Signed-off-by: Richard Raya <rdxzv.dev@gmail.com>
2024-03-25 23:06:51 -03:00
Richard Raya
c21740b406 Merge tag 'LA.UM.9.1.r1-14600-SMxxx0.QSSI14.0' of https://git.codelinaro.org/clo/la/platform/vendor/opensource/audio-kernel
"LA.UM.9.1.r1-14600-SMxxx0.QSSI14.0"

* tag 'LA.UM.9.1.r1-14600-SMxxx0.QSSI14.0' of https://git.codelinaro.org/clo/la/platform/vendor/opensource/audio-kernel:
  dsp: q6asm: Add check for ADSP payload size
  ASoC: msm-pcm-host-voice: Check validity of session idx
  ASoC: msm-pcm-host-voice: Check validity of session idx
  dsp: q6lsm: Address use after free for mmap handle
  ASoC: msm-pcm-host-voice: Check validity of session idx
  dsp: q6lsm: Address use after free for mmap handle
  ASoC: msm-pcm-host-voice: Check validity of session idx
  dsp: afe: Copyright update.
  ASoC: msm-pcm-voip: Avoid interger underflow
  ASoC: msm-pcm-voip: Avoid interger underflow
  dsp: q6voice: Add buf size check for cvs cal data
  dsp: asm: validate payload size before access
  dsp: q6core: Avoid OOB access in q6core
  ASoC: msm-pcm-host-voice: Handle OOB access in hpcm_start
  dsp: afe: Add check for sidetone iir config copy size
  ASoC: msm-pcm-voip: Avoid interger underflow
  ASoC: msm-pcm-voip: Avoid interger underflow
  ASoC: msm-pcm-host-voice: Address buffer overflow in hpcm copy
  dsp: add lock in ion free to avoid use after free
  Asoc: check for invalid voice session id

Change-Id: I288b010a1612fb33e30746d584a0460d0906d76c
2023-12-07 20:10:28 -03:00
azrim
f5d1d8f9f6
Merge commit '709af6e1a6ec3689fb14399db326eb7fb3c6e8be' into richelieu
* commit '709af6e1a6ec3689fb14399db326eb7fb3c6e8be':
  asoc: codecs: Add nullptr check
  asoc: codecs: Add nullptr check
2022-08-25 14:56:07 +00:00
Cyber Knight
16ac85a44e
{sound, techpack}: Nuke debug information with -g0
- Level 0 produces no debug information at all.  Thus, -g0 negates -g.

Co-authored-by: Tashfin Shakeer Rhythm <tashfinshakeerrhythm@gmail.com>
Signed-off-by: Tashfin Shakeer Rhythm <tashfinshakeerrhythm@gmail.com>
Signed-off-by: Cyber Knight <cyberknight755@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-06-16 14:20:43 +00:00
Sultan Alsawaf
413b1aa7e3
rmnet_shs: Fix consistent divide-by-zero when updating stats
- In rmnet_shs_wq_refresh_dl_mrkr_stats(), `tdiff` is used as a divisor and is set to `rmnet_shs_wq_tnsec - tbl_p->l_epoch`.
- However, the function called before it, rmnet_shs_wq_refresh_total_stats(), resets `tbl_p->l_epoch` to`rmnet_shs_wq_tnsec`, resulting in `tdiff` always being zero inside rmnet_shs_wq_refresh_dl_mrkr_stats().
- This results in a 100% consistent divide-by-zero exception:

[32.709616] Unexpected kernel BRK exception at EL1
[32.709626] Internal error: ptrace BRK handler: f20003e8 [#1] PREEMPT SMP
[32.709639] Process kworker/3:1 (pid: 79, stack limit = 0x0000000068506c9d)
[32.709647] CPU: 3 PID: 79 Comm: kworker/3:1 Tainted: G S      W         4.19.202-NeutrinoKernel-lothal-EXP #1
[32.709651] Hardware name: Qualcomm Technologies, Inc. kona MTP 19805 20809 (DT)
[32.709664] Workqueue: rmnet_shs_wq rmnet_shs_wq_process_wq
[32.709670] pstate: 60c00085 (nZCv daIf +PAN +UAO)
[32.709676] pc : rmnet_shs_wq_update_stats+0x3c8/0x5c0
[32.709680] lr : rmnet_shs_wq_update_stats+0x230/0x5c0
[32.709684] sp : ffffff801054bce0
[32.709687] x29: ffffff801054bce0 x28: ffffffa9fe579cdd
[32.709692] x27: ffffffa9fe57ada0 x26: ffffffa9fe57b1e0
[32.709697] x25: 0000000000000008 x24: ffffffa9fdc15920
[32.709702] x23: ffffffa9fe57e6b0 x22: 0000000000000007
[32.709706] x21: 0000000000000000 x20: 0000000000000000
[32.709711] x19: ffffffa9fddd4840 x18: 0000000000000000
[32.709716] x17: 0000000000000000 x16: 0000000000000005
[32.709720] x15: 0000000000000000 x14: 0000000000000179
[32.709725] x13: 0000000000000000 x12: 0000000000000000
[32.709730] x11: 0000000000000000 x10: 0000000000000000
[32.709734] x9 : 0000000000000000 x8 : 0000000000000000
[32.709739] x7 : 0000000000000000 x6 : 0000000000000000
[32.709743] x5 : 0000000000000000 x4 : ffffffa9fe57b218
[32.709748] x3 : fffffff2f1d31000 x2 : 0000000000000000
[32.709752] x1 : 0000000000000000 x0 : 0000000000000007
[32.709758] Call trace:
[32.709764]  rmnet_shs_wq_update_stats+0x3c8/0x5c0
[32.709768]  rmnet_shs_wq_process_wq+0x54/0xd0
[32.709775]  process_one_work+0x22c/0x3c0
[32.709779]  worker_thread+0x188/0x5e0
[32.709784]  kthread+0x130/0x160
[32.709790]  ret_from_fork+0x10/0x1c
[32.709797] Code: f9449860 f9022f60 f9449c60 f9023360 (d4207d00)
[32.709802] ---[ end trace 1ae09793f9d923fb ]---

- Reordering the function calls fixes the issue.
- It looks like this issue was hidden by Clang's dead store elimination depending on whether or not tracepoints were enabled, since the quotients in question are only ever used as arguments to trace_rmnet_shs_wq_high().

Signed-off-by: Sultan Alsawaf <sultan@kerneltoast.com>
Signed-off-by: Adam W. Willis <return.of.octobot@gmail.com>
Signed-off-by: Carlos Ayrton Lopez Arroyo <15030201@itcelaya.edu.mx>
Signed-off-by: Samuel Pascua <sgpascua@ngcp.ph>
Signed-off-by: Cyber Knight <cyberknight755@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-06-14 17:50:44 +00:00
Sultan Alsawaf
50876ae723
ASoC: msm: Remove unused transcode_loopback_session_lock mutex
Signed-off-by: Sultan Alsawaf <sultan@kerneltoast.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-05-14 08:36:54 +00:00
Aditya Bavanari
7d99ca60c8
dsp: Fix improper mutex unlock in afe close
During SSR use cases, when AFE APR handle is NULL
and AFE close is invoked, mutex unlock is done without
locking. Fix it and bail out without unlocking the
mutex in this scenario.

Change-Id: Ia2988b56425d8c2d5c726d5860c13e655e7e4ed1
Signed-off-by: Aditya Bavanari <abavanar@codeaurora.org>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-05-09 11:22:50 +07:00
azrim
015d8e6a80
treewide: fix function declaration without a prototype
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-05-04 13:16:43 +07:00
azrim
b21ab57e39
Merge commit '5c00aa86ffaaae4f97d8e9fa50a7fbd0195b9b85' into sheesh
* commit '5c00aa86ffaaae4f97d8e9fa50a7fbd0195b9b85':
  ASoC: wcd937x_slave: Add retry while getting logical addr for wcd937x slave
2022-05-03 12:50:29 +07:00
Sultan Alsawaf
1595ae38bb
ASoC: dsp: voice_mhi: Fix uninitialized variable usage
Signed-off-by: Sultan Alsawaf <sultan@kerneltoast.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-05-03 06:11:16 +07:00
Park Ju Hyung
de004764d9
techpack: avoid VLA
Signed-off-by: Park Ju Hyung <qkrwngud825@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-04-26 15:03:44 +07:00
dianlujitao
07110d9976
techpack/audio: sm6150: Report correct key code of headset buttons
Change-Id: I8ecc1609d929ac5a8d4d73711b15b4a741d910a3
Signed-off-by: Adithya R <gh0strider.2k18.reborn@gmail.com>
Signed-off-by: Forenche <prahul2003@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-04-26 14:59:37 +07:00
Yaroslav Furman
739c411a8f
teckpack: codecs: Use scnprintf() for robustness
Reasoning explained here 06236821ae

Also fixes this warning:
../techpack/audio/asoc/codecs/wcd-clsh.c:73:9: warning: ‘snprintf’ argument 4 overlaps destination object ‘buf’ [-Wrestrict]
   73 |   cnt = snprintf(buf, buflen - cnt - 1, "%s%s%s", buf,
      |         ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   74 |           buf[0] == '\0' ? "[" : "|",
      |           ~~~~~~~~~~~~~~~~~~~~~~~~~~~
   75 |           states[i]);
      |

Signed-off-by: Yaroslav Furman <yaro330@gmail.com>
Signed-off-by: Adam W. Willis <return.of.octobot@gmail.com>
Signed-off-by: Fiqri Ardyansyah <fiqri15072019@gmail.com>
Signed-off-by: Forenche <prahul2003@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-04-26 14:59:37 +07:00
Sultan Alsawaf
fe39ec00a0
ASoC: codecs: Fix uninitialized variable usage
Signed-off-by: Sultan Alsawaf <sultan@kerneltoast.com>
Signed-off-by: Fiqri Ardyansyah <fiqri15072019@gmail.com>
Signed-off-by: Forenche <prahul2003@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-04-26 14:59:37 +07:00
Sultan Alsawaf
0992e6df01
ASoC: dsp: msm-dts-srs-tm-config: Fix trivial unguarded pr_debug()
Signed-off-by: Sultan Alsawaf <sultan@kerneltoast.com>
Signed-off-by: Fiqri Ardyansyah <fiqri15072019@gmail.com>
Signed-off-by: Forenche <prahul2003@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-04-26 14:59:36 +07:00
Albert I
8e6c67a544
techpack/audio: codecs: Fix potential buffer overflows
* detected by Clang 9+'s -Wfortify-source.

[Adapted to techpack/audio]
Signed-off-by: Albert I <kras@raphielgang.org>
Signed-off-by: UtsavBalar1231 <utsavbalar1231@gmail.com>
Signed-off-by: Nauval Rizky <enuma.alrizky@gmail.com>
Signed-off-by: Fiqri Ardyansyah <fiqri15072019@gmail.com>
Signed-off-by: Forenche <prahul2003@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-04-26 14:59:36 +07:00
Sultan Alsawaf
c547e28cf1
ASoC: dsp: q6afe: Fix uninitialized th_vi_v_vali variable usage
The on-stack th_vi_v_vali struct is not fully initialized by
afe_get_sp_th_vi_v_vali_data(), leaving members of the th_vi_v_vali
struct used despite not being initialized. Fix it by zeroing out the
memory in afe_get_sp_th_vi_v_vali_data().

Signed-off-by: Sultan Alsawaf <sultan@kerneltoast.com>
Signed-off-by: Fiqri Ardyansyah <fiqri15072019@gmail.com>
Signed-off-by: Forenche <prahul2003@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-04-26 14:59:36 +07:00
Panchajanya1999
6244ad6826
techpack/audio/asoc: msm-pcm-routing: Drop cal_data comparison with NULL
The comparison will never be NULL. Fixes an address[Werror=address] error.
Captured by gcc-12.

Change-Id: I2c48526d7f4e16b862bf225d95e72879457aec95
Signed-off-by: Panchajanya1999 <panchajanya@azure-dev.live>
Signed-off-by: Fiqri Ardyansyah <fiqri15072019@gmail.com>
Signed-off-by: Forenche <prahul2003@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-04-26 14:59:36 +07:00
Sultan Alsawaf
6725661568
ASoC: dsp: amrwb_in: Fix AUDIO_GET_AMRWB_ENC_CONFIG ioctl
The non-blocking if-statement here causes the AUDIO_GET_AMRWB_ENC_CONFIG
ioctl to always return -EFAULT, even upon success. Fix it by correctly
guarding the -EFAULT return value.

Signed-off-by: Sultan Alsawaf <sultan@kerneltoast.com>
Signed-off-by: Pranav Vashi <neobuddy89@gmail.com>
Signed-off-by: Forenche <prahul2003@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-04-26 14:55:23 +07:00
Panchajanya1999
417551edae
techpack/codecs: aac: Hardcode max_bitrate to 384k
Our DSP is supposed to support this.

Change-Id: Ib93ee2ec1b0c1a2fd1269f64d5f133db65d1b4a0
Suggested-by: Steve Kondik <shade@chemlab.org>
Signed-off-by: Panchajanya1999 <panchajanya@azure-dev.live>
Signed-off-by: Forenche <prahul2003@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-04-26 14:55:23 +07:00
Panchajanya1999
c580d005af
techpack/audio: tas256x: Provide correct samplerates to switch cases
Seems like Texas guys made a mistake which went un-noticed.

Change-Id: Ibff21be4040a769ab3b6466a4619fa7f4daa0d71
Signed-off-by: Panchajanya1999 <panchajanya@azure-dev.live>
Signed-off-by: Forenche <prahul2003@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-04-26 14:55:23 +07:00
celtare21
bacc1c814d
techpack: audio: Remove pm_qos usage
Signed-off-by: celtare21 <celtare21@gmail.com>
Signed-off-by: Forenche <prahul2003@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-04-26 14:55:23 +07:00
Panchajanya1999
cc1e0becea
techpack/audio: sm6150: Remove pm_qos usage
Change-Id: I69e6010b20f895faf61951d97e9028c8909bada7
Signed-off-by: Panchajanya1999 <panchajanya@azure-dev.live>
Signed-off-by: Adithya R <gh0strider.2k18.reborn@gmail.com>
Signed-off-by: Forenche <prahul2003@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-04-26 14:55:23 +07:00
Yaroslav Furman
f9b66472d7
drivers: remove a few loggers
Signed-off-by: Yaroslav Furman <yaro330@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-04-26 14:52:43 +07:00
Miguel de Dios
9c90a5ab11
asoc: msm-dai-q6-v2: Mark msm-dai-q6 drivers as sync probe.
Bug: 115776306
Bug: 77146523
Change-Id: I31d533a62e2dbfbc27aea8bf8794cf4c5d201c9a
Signed-off-by: Miguel de Dios <migueldedios@google.com>
(cherry picked from commit 704a0a22b6e71d717b43fbc9aae4d8c610d7d5cd)
Signed-off-by: Panchajanya1999 <panchajanya@azure-dev.live>
Signed-off-by: Forenche <prahul2003@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-04-06 13:20:03 +07:00
Pranav Vashi
e89b1f9b80
techpack: asoc: Add supported formats for all cases
* Fixes call recording when switched to Multimedia9.

Signed-off-by: Pranav Vashi <neobuddy89@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-04-06 13:18:46 +07:00
Yaroslav Furman
47711fb724
techpack/audio: massive stfu
Signed-off-by: Yaroslav Furman <yaro330@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-04-06 13:17:47 +07:00
Tushar Mahajan
a23732a388
techpack/audio: Build everything in kernel
Signed-off-by: Tushar Mahajan <mahajant99@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-03-16 14:11:12 +00:00
Danny Lin
843ab1a899
techpack: audio: Remove redundant -Werror flags
We already have CONFIG_CC_WERROR to enable -Werror globally when we want
it.

Signed-off-by: Danny Lin <danny@kdrag0n.dev>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-03-16 14:11:12 +00:00
Danny Lin
0aed0c8cb9
techpack/audio: Remove build timestamp injection
This causes parts of the audio module to be rebuilt during every
incremental build, even if there are no changes:

  CC      techpack/audio/ipc/apr.o - due to command line change
  CC      techpack/audio/ipc/apr_v2.o - due to command line change
  CC      techpack/audio/ipc/apr_tal_rpmsg.o - due to command line change
  CC      techpack/audio/ipc/wcd-dsp-glink.o - due to command line change

We're only experiencing this issue in techpack/audio/ipc at the moment,
but kill the timestamp injection in all the audio components to
eliminate the possibility of encountering this issue again in the
future. This is harmless since the injected BUILD_TIMESTAMP macro is
never used.

Signed-off-by: Danny Lin <danny@kdrag0n.dev>
Change-Id: Ifaad1b1b491cc96371bae8a92bfb8399be55ae98
Signed-off-by: Adithya R <gh0strider.2k18.reborn@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-03-16 14:11:12 +00:00
Danny Lin
dc6c2897fa
rmnet_shs: Fix CFI violation in packet assignment
This fixes the following CFI violation when the rmnet_shs module is
loaded:

CFI failure (target: [<ffffff9cddd1e27c>] rmnet_shs_assign+0x0/0x9d0):
------------[ cut here ]------------
WARNING: CPU: 1 PID: 0 at rmnet_deliver_skb+0x224/0x24c
CPU: 1 PID: 0 Comm: swapper/1 Tainted: G S      W       4.14.186 #1
Hardware name: Qualcomm Technologies, Inc. SM8150 V2 PM8150 MTP 18865 19863 14 15 (DT)
task: 0000000098c067f6 task.stack: 00000000289c42de
pc : rmnet_deliver_skb+0x224/0x24c
lr : rmnet_deliver_skb+0x224/0x24c
sp : ffffff801000bc10 pstate : 60400145
x29: ffffff801000bc10 x28: ffffff9cdc68e798
x27: ffffffe5ed28e090 x26: 0000000000000000
x25: 0000000000000000 x24: ffffffe585b41ca8
x23: 0000000000000001 x22: ffffff9cddd1e27c
x21: ffffffe5f40fd100 x20: ffffffe5dfb95000
x19: ffffffe4eff9d500 x18: 0000000000000002
x17: 000000000000009c x16: 000000000000009c
x15: 0000000000000068 x14: 0000000000000082
x13: ffffff9cdefaec08 x12: 0000000000000004
x11: 00000000ffffffff x10: ffffffe5f5200000
x9 : 99d99e2e2d2e1900 x8 : 99d99e2e2d2e1900
x7 : 0000000000000000 x6 : ffffffe5f5209fc2
x5 : 0000000000000000 x4 : 0000000000000000
x3 : 0000000000003a29 x2 : 0000000000000001
x1 : 0000000000000000 x0 : 0000000000000046
\x0aPC: 0xffffff9cdd12b3fc:
b3fc  a9424ff4 a94157f6 a8c37bfd d65f03c0 91246100 aa1303e1 9431af1a a9424ff4
b41c  a94157f6 a8c37bfd d65f03c0 900091e0 91188000 aa1603e1 aa1603e2 97d8aba3
b43c  d4210000 17ffff9e aa1503e0 97d9478c 17ffffa5 aa1503e0 aa0803f6 97d94788
b45c  aa1603e8 17ffffac d10103ff a9017bfd a90257f6 a9034ff4 910043fd aa0003f3
\x0aLR: 0xffffff9cdd12b3fc:
b3fc  a9424ff4 a94157f6 a8c37bfd d65f03c0 91246100 aa1303e1 9431af1a a9424ff4
b41c  a94157f6 a8c37bfd d65f03c0 900091e0 91188000 aa1603e1 aa1603e2 97d8aba3
b43c  d4210000 17ffff9e aa1503e0 97d9478c 17ffffa5 aa1503e0 aa0803f6 97d94788
b45c  aa1603e8 17ffffac d10103ff a9017bfd a90257f6 a9034ff4 910043fd aa0003f3
\x0aSP: 0xffffff801000bbd0:
bbd0  dd12b43c ffffff9c 60400145 00000000 1000bbb8 ffffff80 dd12b2b4 ffffff9c
bbf0  ffffffff 0000007f 2d2e1900 99d99e2e 1000bc10 ffffff80 dd12b43c ffffff9c
bc10  1000bc40 ffffff80 ddd18d48 ffffff9c 00000040 00000000 ddd18338 ffffff9c
bc30  eff9d500 ffffffe4 85b41c18 ffffffe5 1000bc50 ffffff80 ddd1a390 ffffff9c

Call trace:
rmnet_deliver_skb+0x224/0x24c
rmnet_perf_core_send_skb+0x138/0x140
rmnet_perf_opt_flush_single_flow_node+0x624/0x668
rmnet_perf_core_deaggregate+0x194/0x2c4
rmnet_rx_handler+0x17c/0x270
__netif_receive_skb_core+0x50c/0xba0
process_backlog+0x1e4/0x3d0
net_rx_action+0x134/0x4f4
__do_softirq+0x16c/0x344
irq_exit+0x16c/0x178
handle_IPI+0x220/0x2e0
gic_handle_irq.16379+0xa8/0x180
el1_irq+0xb0/0x124
lpm_cpuidle_enter+0x33c/0x358
cpuidle_enter_state+0x220/0x400
do_idle+0x430/0x5f0
cpu_startup_entry+0x74/0x78
__cpu_disable+0x0/0xf0
---[ end trace 6e7b287874dec53f ]---

Reported-by: Adam W. Willis <return.of.octobot@gmail.com>
Signed-off-by: Danny Lin <danny@kdrag0n.dev>
Signed-off-by: Forenche <prahul2003@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-03-16 14:10:38 +00:00
Danny Lin
a40a56d190
rmnet_perf: Fix CFI violation in packet deaggregation
This fixes the following CFI violation when the rmnet_perf module is
loaded:

CFI failure (target: [<ffffff9cddd181a4>] rmnet_perf_core_deaggregate+0x0/0x2c4):
------------[ cut here ]------------
WARNING: CPU: 1 PID: 0 at rmnet_rx_handler+0x240/0x270
CPU: 1 PID: 0 Comm: swapper/1 Tainted: G S      W       4.14.186 #1
Hardware name: Qualcomm Technologies, Inc. SM8150 V2 PM8150 MTP 18865 19863 14 15 (DT)
task: 0000000098c067f6 task.stack: 00000000289c42de
pc : rmnet_rx_handler+0x240/0x270
lr : rmnet_rx_handler+0x240/0x270
sp : ffffff801000bd00 pstate : 60400145
x29: ffffff801000bd00 x28: ffffff9cdc68e798
x27: ffffffe5ed28e090 x26: 0000000000000000
x25: ffffff9cdc68e9cc x24: ffffffe42fd6b900
x23: ffffff9cde829f30 x22: ffffff9cddd181a4
x21: ffffffe5f40fd100 x20: ffffffe5dfb95000
x19: ffffffe42fd6b900 x18: 0000000000010000
x17: 0000000000000008 x16: 0000000000000000
x15: 0000000000000008 x14: ffffff9cde85d990
x13: 0000000005000000 x12: 00ff00ff00000000
x11: ffffffffffffffff x10: 0000000000000008
x9 : 99d99e2e2d2e1900 x8 : 99d99e2e2d2e1900
x7 : 0000000000000000 x6 : ffffffe5f52091f1
x5 : 0000000000000000 x4 : 0000000000000000
x3 : fffffffffffffffc x2 : 0000000000000000
x1 : 0000000000000008 x0 : 0000000000000051
\x0aPC: 0xffffff9cdd12b8bc:
b8bc  f900051f aa1503e0 aa1403e1 940001f9 b4fffe60 aa0003f6 aa1403e1 94000015
b8dc  eb1602bf 54ffff01 17ffffef 900091e0 91188000 aa1603e1 aa1603e2 97d8aa73
b8fc  d4210000 17ffffcb aa1503e0 97d9465c 17ffffd2 aa1503e0 97d94659 17ffffdd
b91c  aa1303e0 528001c1 aa1503e2 94303be3 d10183ff a9027bfd f9001bf7 a90457f6
\x0aLR: 0xffffff9cdd12b8bc:
b8bc  f900051f aa1503e0 aa1403e1 940001f9 b4fffe60 aa0003f6 aa1403e1 94000015
b8dc  eb1602bf 54ffff01 17ffffef 900091e0 91188000 aa1603e1 aa1603e2 97d8aa73
b8fc  d4210000 17ffffcb aa1503e0 97d9465c 17ffffd2 aa1503e0 97d94659 17ffffdd
b91c  aa1303e0 528001c1 aa1503e2 94303be3 d10183ff a9027bfd f9001bf7 a90457f6
\x0aSP: 0xffffff801000bcc0:
bcc0  dd12b8fc ffffff9c 60400145 00000000 1000bca8 ffffff80 dd12b828 ffffff9c
bce0  ffffffff 0000007f 2d2e1900 99d99e2e 1000bd00 ffffff80 dd12b8fc ffffff9c
bd00  1000bd60 ffffff80 ddd4eafc ffffff9c 2fd6b900 ffffffe4 de84eec0 ffffff9c
bd20  00000000 00000000 ed28e000 ffffffe5 00000000 00000001 00000000 00000000

Call trace:
rmnet_rx_handler+0x240/0x270
__netif_receive_skb_core+0x50c/0xba0
process_backlog+0x1e4/0x3d0
net_rx_action+0x134/0x4f4
__do_softirq+0x16c/0x344
irq_exit+0x16c/0x178
handle_IPI+0x220/0x2e0
gic_handle_irq.16379+0xa8/0x180
el1_irq+0xb0/0x124
lpm_cpuidle_enter+0x33c/0x358
cpuidle_enter_state+0x220/0x400
do_idle+0x430/0x5f0
cpu_startup_entry+0x74/0x78
__cpu_disable+0x0/0xf0
---[ end trace 6e7b287874dec53e ]---

Reported-by: Adam W. Willis <return.of.octobot@gmail.com>
Signed-off-by: Danny Lin <danny@kdrag0n.dev>
Signed-off-by: Forenche <prahul2003@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-03-16 14:10:32 +00:00
Adithya R
5f035a45b7
Revert "data-kernel: rps setting"
This reverts commit f2d8a201653c2404f312c76f85a35234cd8f350e.

Signed-off-by: Forenche <prahul2003@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-03-16 14:10:26 +00:00
atndko
256770d252
techpack: data: Silence useless log spam
Signed-off-by: atndko <z1281552865@gmail.com>
Signed-off-by: Forenche <prahul2003@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-03-16 14:10:16 +00:00
Nauval Rizky
19c790ce6c
techpack: data: Remove Android.mk files
Signed-off-by: Nauval Rizky <enuma.alrizky@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-03-16 14:10:10 +00:00
Park Ju Hyung
efb07c9e48
techpack: build rmnet extensions
Signed-off-by: Park Ju Hyung <qkrwngud825@gmail.com>
Signed-off-by: Nauval Rizky <enuma.alrizky@gmail.com>
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-03-16 14:10:02 +00:00
azrim
5b7d8c7a55 Add 'techpack/data/' from commit '1869a32cc9656af809f73f8d068668dab53fddcf'
git-subtree-dir: techpack/data
git-subtree-mainline: f0fb863c56b063cc00279f6c93395722231d4dc8
git-subtree-split: 1869a32cc9656af809f73f8d068668dab53fddcf
2022-03-16 14:09:11 +00:00
Adithya R
f0fb863c56
techpack/audio: Import xiaomi changes to audio-kernel
Signed-off-by: azrim <mirzaspc@gmail.com>
2022-03-16 14:07:17 +00:00
Danny Lin
5880252e95 audio: Remove build timestamp injection
This causes parts of the audio module to be rebuilt during every
incremental build, even if there are no changes:

  CC      techpack/audio/ipc/apr.o - due to command line change
  CC      techpack/audio/ipc/apr_v2.o - due to command line change
  CC      techpack/audio/ipc/apr_tal_rpmsg.o - due to command line change
  CC      techpack/audio/ipc/wcd-dsp-glink.o - due to command line change

We're only experiencing this issue in techpack/audio/ipc at the moment,
but kill the timestamp injection in all the audio components to
eliminate the possibility of encountering this issue again in the
future. This is harmless since the injected BUILD_TIMESTAMP macro is
never used.

Change-Id: I35b588a2a902438b2c79ebbac31453f2e528bbbe
Signed-off-by: Danny Lin <danny@kdrag0n.dev>
2022-03-15 19:02:49 +01:00
Park Ju Hyung
dbda73f0ef audio: Load sm6150 configuration for sm6150 and sdmmagpie
Signed-off-by: Park Ju Hyung <qkrwngud825@gmail.com>
Change-Id: Id75801293a7a61f774f1f97fce9f2a4a4638cfe3
2022-03-15 19:02:49 +01:00
AngeloGioacchino Del Regno
184f322d50 soc: snd_event: Declare is_snd_event_fwk_enabled func static
This function is included in more than one sound codec and anyway
it is supposed to be a static inline function...
2022-03-15 19:02:49 +01:00
AngeloGioacchino Del Regno
e23e45068b asoc: codecs: Kbuild: Include bolero codec in the build
The bolero codec is required by sm6150.

Change-Id: I7d1cb337d43ea75a053dd1ab99f7efc5df723f36
2022-03-15 19:02:49 +01:00
Yaroslav Furman
ee046b1819 soc: pinctrl-lpi: Initialise at late_initcall
Fixes booting with techpack online and modules disabled.
Without this it spits out a nasty NULL pointer dereference.

Signed-off-by: Yaroslav Furman <yaro330@gmail.com>
Signed-off-by: Park Ju Hyung <qkrwngud825@gmail.com>
Change-Id: I05714d92d2631c2ae889db7995f64a10ddec9ef5
2022-03-15 19:02:49 +01:00
Angelo G. Del Regno
1546d2e785 soc: Fix headers links for in-kernel build
The links were hardcoded to an external path used for Android
only and expecting the kernel to be in a precise folder....

Got words?
I have none.
2022-03-15 19:01:48 +01:00
Cosmin Tanislav
80ad5f5fbf audio: Remove Android.mk files
Change-Id: I4e39c5980a96ed638958ca73a9a31b15c81978f6
2022-03-15 19:01:27 +01:00