summaryrefslogtreecommitdiff
path: root/pmic-voter.ko
diff options
context:
space:
mode:
authorEva Huang <evahuang@google.com>2022-04-08 19:32:25 +0800
committerAndroid Build Coastguard Worker <android-build-coastguard-worker@google.com>2022-04-11 23:04:13 +0000
commitae0b46b077fb526a3258dfd7c8ea38e62bdc4a6f (patch)
treecc7fae270a0b71f43fb357b7da1dcd55f2e98e54 /pmic-voter.ko
parent545127fbe8e3e67705d05a0c8fc257c39b6e3fd7 (diff)
downloadbarbet-kernel-ae0b46b077fb526a3258dfd7c8ea38e62bdc4a6f.tar.gz
barbet: update kernel-and-modules prebuilt [ DO NOT MERGE ]
Linux version 4.19.224-g7849426d1067-ab8425180 (build-user@build-host) (Android (7284624, based on r416183b) clang version 12.0.5 (https://android.googlesource.com/toolchain/llvm-project c935d99d7cf2016289302412d708641d52d2f7ee), LLD 12.0.5 (/buildbot/src/android/llvm-toolchain/out/llvm-project/lld c935d99d7cf2016289302412d708641d52d2f7ee)) #1 SMP PREEMPT Fri Apr 8 08:48:38 UTC 2022 build: (1 change) cc6c1e7a _setup_env.sh: Prevent Clang sysroot detection for userprogs kernel/private/tests/patchwork: (1 change) 17ec27f6 google_battery: Fix patchwork to use the enum (AC clear) private/msm-google: (82 changes) 7849426d Merge branch 'android-msm-barbet-4.19-sc-security' into android-msm-barbet-4.19-sc-qpr3 ebba4712 Revert "ANDROID: dm-bow: Protect Ranges fetched and erased from the RB tree" 4693171e input: touch_offload: interface updates bc7bbce6 arm64: Use the clearbhb instruction in mitigations f61e9937 arm64: add ID_AA64ISAR2_EL1 sys register 603eec72 KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered and migrated f7793563 arm64: Mitigate spectre style branch history side channels 69131229 KVM: arm64: Add templates for BHB mitigation sequences b9b9e378 arm64: proton-pack: Report Spectre-BHB vulnerabilities as part of Spectre-v2 2415247c arm64: Add percpu vectors for EL1 50de83c1 arm64: entry: Add macro for reading symbol addresses from the trampoline b6d36b2c arm64: entry: Add vectors that have the bhb mitigation sequences 8bcd3ea7 arm64: entry: Add non-kpti __bp_harden_el1_vectors for mitigations 04e63227 arm64: entry: Allow the trampoline text to occupy multiple pages e2ea2c62 arm64: entry: Make the kpti trampoline's kpti sequence optional e0029e83 arm64: entry: Move trampoline macros out of ifdef'd section 3eab7c1c arm64: entry: Don't assume tramp_vectors is the start of the vectors 45d6b998 arm64: entry: Allow tramp_alias to access symbols after the 4K boundary 9248a2fd arm64: entry: Move the trampoline data page before the text page 635a91b9 arm64: entry: Free up another register on kpti's tramp_exit path 7d157bec arm64: entry: Make the trampoline cleanup optional e5f02833 arm64: entry.S: Add ventry overflow sanity checks 438c30e4 arm64: Add Cortex-X2 CPU part definition 68171d8e arm64: Add Neoverse-N2, Cortex-A710 CPU part definition 744bcf40 ARM: fix Thumb2 regression with Spectre BHB 93477fa7 ARM: Spectre-BHB: provide empty stub for non-config ff499fdc ARM: fix build warning in proc-v7-bugs.c 0cfcad68 ARM: Do not use NOCROSSREFS directive with ld.lld c0cd0d82 ARM: fix co-processor register typo 5b077a12 ARM: fix build error when BPF_SYSCALL is disabled bb18996c ARM: include unprivileged BPF status in Spectre V2 reporting 598a6d7e ARM: Spectre-BHB workaround 70d48b05 ARM: use LOADADDR() to get load address of sections 9c3fef9e ARM: early traps initialisation cbf79cd8 ARM: report Spectre v2 status through sysfs 48047e2c x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT f1155bc7 x86/speculation: Warn about Spectre v2 LFENCE mitigation 3a5f12a0 x86/speculation: Update link to AMD speculation whitepaper 4544ac96 x86/speculation: Use generic retpoline by default on AMD 9880286f x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting 20a6a045 Documentation/hw-vuln: Update spectre doc dadc4ad8 x86/speculation: Add eIBRS + Retpoline options 50e7070c x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE e34f3d2e x86,bugs: Unconditionally allow spectre_v2=retpoline,amd 8110fd92 x86/speculation: Merge one test in spectre_v2_user_select_mitigation() 53c9932d bpf: Add kconfig knob for disabling unpriv bpf by default ce7a2a50 net: qrtr: fix another OOB Read in qrtr_endpoint_post b3ca97a9 cgroup-v1: Require capabilities to set release_agent 08698e1f sr9700: sanity check for packet length 54dec8d8 vt_kdsetmode: extend console locking 841cdbdb usb: gadget: clear related members when goto fail 9d004f1e usb: gadget: don't release an existing dev->buf 00b271db ovl: fix missing negative dentry check in ovl_rename() eea122ab USB: gadget: validate interface OS descriptor requests 68e63e1c msm: synx: fix synx_release_core race condition f10fdb23 msm: synx: acquire ref of synx handle in each function a26caefd ANDROID: dm-bow: Protect Ranges fetched and erased from the RB tree 23b61bb6 BACKPORT: ipv6: Implement draft-ietf-6man-rfc4941bis 6040df4a UPSTREAM: drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions 4d39de2a isdn: cpai: check ctr->cnr to avoid array index out of bound e67bf81a sctp: use call_rcu to free endpoint 39f77717 bpf: Fix leakage due to insufficient speculative store bypass mitigation 9c1ed296 bpf: Introduce BPF nospec instruction for mitigating Spectre v4 a208e7f3 bpf: track spill/fill of constants 3912c5b6 bpf/verifier: per-register parent pointers 5f49b126 usb: dwc3: Set the initial value of usb_data_enabled before use 7370a5e7 UPSTREAM: USB: gadget: validate interface OS descriptor requests 83320245 UPSTREAM: usb: gadget: rndis: check size of RNDIS_MSG_SET command ce5561e2 Merge android-msm-barbet-4.19-sc-v2 into android-msm-barbet-4.19-sc-qpr3 0841e4c2 Merge branch 'android-msm-barbet-4.19-sc-security' into android-msm-barbet-4.19-sc-v2 0b347683 mmc: block: fix read single on recovery logic fcff208d ANDROID: xt_qtaguid: fix UAF race 36e69a21 lib/iov_iter: initialize "flags" in new pipe_buffer 001257e2 usb: typec: tcpm: Fix wrong handling for Not_Supported in VDM AMS 7332d3f6 google_battery: Allow Adaptive Charging to be cleared by the UI 9afe3ab9 fget: check that the fd still exists after getting a ref to it bac3d1c2 fs: add fget_many() and fput_many() 89d3434e usb: hub: Fix detection issue of USB3 device in VIA VL813 USB3.0 hub aa4cda1a Merge android-msm-barbet-4.19-sc-v2 into android-msm-barbet-4.19-sc-qpr3 902a5da0 Merge branch 'android-msm-barbet-4.19-sc-security' into android-msm-barbet-4.19-sc-v2 582365a4 msm: kgsl: Update the IFPC power up reglist 232c8c1b usb: pd_engine: Fix use-after-free in blocking_notifier_chain_unregister private/msm-google-modules/wlan/qcacld-3.0: (4 changes) 64e41485 Merge android-msm-barbet-4.19-sc-v2 into android-msm-barbet-4.19-sc-qpr3 55a70c95 Merge branch 'android-msm-barbet-4.19-sc-security' into android-msm-barbet-4.19-sc-v2 602c6382 qcacld-3.0: Avoid OOB read in dot11f_unpack_assoc_response b61d26d7 qcacld-3.0: Avoid OOB read in dot11f_unpack_assoc_response private/msm-google/techpack/display: (4 changes) a1f50f8a Merge android-msm-barbet-4.19-sc-v2 into android-msm-barbet-4.19-sc-qpr3 8c139697 Merge branch 'android-msm-barbet-4.19-sc-security' into android-msm-barbet-4.19-sc-v2 bbb6c3fc disp: msm: sde: protect file private structure with mutex lock 3609ed88 disp: msm: sde: add null check for drm file in msm_release Bug: 162326603 Bug: 174846563 Bug: 174860685 Bug: 175340972 Bug: 182388481 Bug: 184018316 Bug: 192140701 Bug: 195565510 Bug: 196011539 Bug: 201574693 Bug: 203361388 Bug: 205800160 Bug: 208558576 Bug: 209480901 Bug: 209481085 Bug: 213172319 Bug: 213239835 Bug: 213600138 Bug: 214127735 Bug: 214268076 Bug: 215313369 Bug: 215557547 Bug: 216408350 Bug: 216481035 Bug: 218337597 Bug: 218985673 Bug: 220261709 Bug: 220741611 Bug: 220790970 Bug: 221413783 Bug: 222023189 Bug: 222023207 Bug: 222644279 Bug: 224080927 Bug: 224859358 Bug: 225469258 Pick-Prebuilt: 440319220 Build-Id: 8425180 Processing-Config: kernel_headers Change-Id: I546da285d6627ecd8ca597504861875bed7c15dc Signed-off-by: Eva Huang <evahuang@google.com> (cherry picked from commit c36db03eddc790749cddb4fb89085ed20b82b2fc) Merged-In: I546da285d6627ecd8ca597504861875bed7c15dc
Diffstat (limited to 'pmic-voter.ko')
-rw-r--r--pmic-voter.kobin30136 -> 30136 bytes
1 files changed, 0 insertions, 0 deletions
diff --git a/pmic-voter.ko b/pmic-voter.ko
index bd791f84de..101f06988d 100644
--- a/pmic-voter.ko
+++ b/pmic-voter.ko
Binary files differ