1. 22 Oct, 2013 2 commits
  2. 16 Oct, 2013 1 commit
  3. 06 Oct, 2013 2 commits
  4. 18 Sep, 2013 2 commits
    • Andrey Moiseev's avatar
      Input: i8042 - i8042_flush fix for a full 8042 buffer · 2f0d2604
      Andrey Moiseev authored
      When 8042 internal data buffer is full, the driver
      erroneously decides that the controller is not present.
      
      i8042_flush returns the number of flushed bytes, which is
      in 0 - I8042_BUFFER_SIZE range inclusive. Therefore, i8042_flush
      has no way to indicate an error. Moreover i8042_controller_check
      takes initially full buffer (i8042_flush returned
      I8042_BUFFER_SIZE) as a sign of absence of the controller.
      
      Let's change i8042 to return success/error instead and make sure
      we do not return error prematurely.
      Signed-off-by: default avatarAndrey Moiseev <o2g.org.ru@gmail.com>
      Signed-off-by: default avatarDmitry Torokhov <dmitry.torokhov@gmail.com>
      2f0d2604
    • Mike Dunn's avatar
      Input: pxa27x_keypad - fix NULL pointer dereference · 049d75f7
      Mike Dunn authored
      A NULL pointer dereference exception occurs in the driver probe function when
      device tree is used.  The pdata pointer will be NULL in this case, but the code
      dereferences it in all cases.  When device tree is used, a platform data
      structure is allocated and initialized, and in all cases this pointer is copied
      to the driver's private data, so the variable being tested should be accessed
      through the driver's private data structure.
      Signed-off-by: default avatarMike Dunn <mikedunn@newsguy.com>
      Signed-off-by: default avatarDmitry Torokhov <dmitry.torokhov@gmail.com>
      049d75f7
  5. 07 Sep, 2013 2 commits
    • David Herrmann's avatar
      Input: evdev - add EVIOCREVOKE ioctl · c7dc6573
      David Herrmann authored
      If we have multiple sessions on a system, we normally don't want
      background sessions to read input events. Otherwise, it could capture
      passwords and more entered by the user on the foreground session. This is
      a real world problem as the recent XMir development showed:
        http://mjg59.dreamwidth.org/27327.html
      
      We currently rely on sessions to release input devices when being
      deactivated. This relies on trust across sessions. But that's not given on
      usual systems. We therefore need a way to control which processes have
      access to input devices.
      
      With VTs the kernel simply routed them through the active /dev/ttyX. This
      is not possible with evdev devices, though. Moreover, we want to avoid
      routing input-devices through some dispatcher-daemon in userspace (which
      would add some latency).
      
      This patch introduces EVIOCREVOKE. If called on an evdev fd, this revokes
      device-access irrecoverably for that *single* open-file. Hence, once you
      call EVIOCREVOKE on any dup()ed fd, all fds for that open-file will be
      rather useless now (but still valid compared to close()!). This allows us
      to pass fds directly to session-processes from a trusted source. The
      source keeps a dup()ed fd and revokes access once the session-process is
      no longer active.
      Compared to the EVIOCMUTE proposal, we can avoid the CAP_SYS_ADMIN
      restriction now as there is no way to revive the fd again. Hence, a user
      is free to call EVIOCREVOKE themself to kill the fd.
      
      Additionally, this ioctl allows multi-layer access-control (again compared
      to EVIOCMUTE which was limited to one layer via CAP_SYS_ADMIN). A middle
      layer can simply request a new open-file from the layer above and pass it
      to the layer below. Now each layer can call EVIOCREVOKE on the fds to
      revoke access for all layers below, at the expense of one fd per layer.
      
      There's already ongoing experimental user-space work which demonstrates
      how it can be used:
        http://lists.freedesktop.org/archives/systemd-devel/2013-August/012897.htmlSigned-off-by: default avatarDavid Herrmann <dh.herrmann@gmail.com>
      Signed-off-by: default avatarDmitry Torokhov <dmitry.torokhov@gmail.com>
      c7dc6573
    • Dmitry Torokhov's avatar
      Merge branch 'next' into for-linus · 07176b98
      Dmitry Torokhov authored
      Merge first round of changes for 3.12 merge window.
      07176b98
  6. 29 Aug, 2013 6 commits
  7. 26 Aug, 2013 8 commits
  8. 25 Aug, 2013 4 commits
  9. 15 Aug, 2013 3 commits
  10. 13 Aug, 2013 10 commits