<feed xmlns='http://www.w3.org/2005/Atom'>
<title>xavi/android_kernel_m2note, branch lp-5.1</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.
</subtitle>
<id>https://gitea.privatedns.org/xavi/android_kernel_m2note/atom?h=lp-5.1</id>
<link rel='self' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/atom?h=lp-5.1'/>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/'/>
<updated>2016-11-24T20:21:12+00:00</updated>
<entry>
<title>Revert "proc: Remove verifiedbootstate flag from /proc/cmdline"</title>
<updated>2016-11-24T20:21:12+00:00</updated>
<author>
<name>Moyster</name>
<email>oysterized@gmail.com</email>
</author>
<published>2016-11-24T20:16:50+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=857ce9e276aee079ecf88ee471d03643e900f336'/>
<id>urn:sha1:857ce9e276aee079ecf88ee471d03643e900f336</id>
<content type='text'>
This commit breaks Offline Charging mode on Mediatek platforms (at least mt6753 and mt6795)

This reverts commit 81cd48af4ce91983fa556039f52bdede850c4e52.
</content>
</entry>
<entry>
<title>Revert "hand-pick: mediatek:remove unnecessary sido call flow"</title>
<updated>2016-11-11T01:48:27+00:00</updated>
<author>
<name>Moyster</name>
<email>oysterized@gmail.com</email>
</author>
<published>2016-11-11T01:48:27+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=e1db96f8e55f339667730924ae4790ca0b6212f8'/>
<id>urn:sha1:e1db96f8e55f339667730924ae4790ca0b6212f8</id>
<content type='text'>
This reverts commit 9a7858491639342b5d3c8d496d3b9370d2330591.
</content>
</entry>
<entry>
<title>wlan: WiFi Direct CTS fixs</title>
<updated>2016-11-11T01:45:23+00:00</updated>
<author>
<name>dragonpt</name>
<email>cesar.maximo@gmail.com</email>
</author>
<published>2015-12-26T22:53:22+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=6edc46d3895d540494b3e9a108b834ce331d66c0'/>
<id>urn:sha1:6edc46d3895d540494b3e9a108b834ce331d66c0</id>
<content type='text'>
Cylen Yao &lt;cylen.yao@mediatek.com&gt;

Details:
  1. WiFi Direct CTS tests will fail as supplicant and driver could
     not keep sync in following case:

     1.1 supplicant will request channel when do p2p listen, but
         driver/firmware has not switch to the target channel when
         supplicant get remain on channel credit by call driver API
         of remain on channel; This will make supplicant and driver
         in unsync state which will make supplicant fail to go to
         listen state randomly.

     1.2 Supplicant and driver will also keep unsync when do mgmt
         frame TX; supplicant will do other task once mgmt frame TX
         is returned by calling  driver API mgmt_tx, but, driver has
         not actually TX the mgmt frame out. In extremely case, driver
         will drop the second mgmt frame if the previous on has not
         been TX out, just as the group owner test case.
</content>
</entry>
<entry>
<title>tty: Properly fix memleak of alloc_pid</title>
<updated>2016-11-11T01:45:22+00:00</updated>
<author>
<name>dragonpt</name>
<email>cesar.maximo@gmail.com</email>
</author>
<published>2015-12-27T19:15:52+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=8d730f510120004a1206c6aa6a2fbd3868b3e4af'/>
<id>urn:sha1:8d730f510120004a1206c6aa6a2fbd3868b3e4af</id>
<content type='text'>
Cylen Yao &lt;cylen.yao@mediatek.com&gt;
bug: 7845126 MT67x2

Memleak is due to unreleased pid-&gt;count, which execute in function:
get_pid()(pid-&gt;count++) and put_pid()(pid-&gt;count--).

The race condition as following:
task[dumpsys]               task[adbd]
in disassociate_ctty()      in tty_signal_session_leader()
-----------------------     -------------------------
tty = get_current_tty();
// tty is not NULL
...
spin_lock_irq(&amp;current-&gt;sighand-&gt;siglock);
put_pid(current-&gt;signal-&gt;tty_old_pgrp);
current-&gt;signal-&gt;tty_old_pgrp = NULL;
spin_unlock_irq(&amp;current-&gt;sighand-&gt;siglock);

                            spin_lock_irq(&amp;p-&gt;sighand-&gt;siglock);
                            ...
                            p-&gt;signal-&gt;tty = NULL;
                            ...
                            spin_unlock_irq(&amp;p-&gt;sighand-&gt;siglock);

tty = get_current_tty();
// tty NULL, goto else branch by accident.
if (tty) {
    ...
    put_pid(tty_session);
    put_pid(tty_pgrp);
    ...
} else {
    print msg
}

in task[dumpsys], in disassociate_ctty(), tty is set NULL by task[adbd],
tty_signal_session_leader(), then it goto else branch and lack of
put_pid(), cause memleak.

move spin_unlock(sighand-&gt;siglock) after get_current_tty() can avoid
the race and fix the memleak.
</content>
</entry>
<entry>
<title>KBUILD_CFLAGS: Some more tuning</title>
<updated>2016-11-11T01:45:21+00:00</updated>
<author>
<name>cm</name>
<email>cesar.maximo@gmail.com</email>
</author>
<published>2016-06-29T20:44:27+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=bd5438ab1cf6514e5ced15e3490153ebb33bf28d'/>
<id>urn:sha1:bd5438ab1cf6514e5ced15e3490153ebb33bf28d</id>
<content type='text'>
use -ftree-vectorize
</content>
</entry>
<entry>
<title>KBUILD_CFLAGS: Some tuning</title>
<updated>2016-11-11T01:45:20+00:00</updated>
<author>
<name>cm</name>
<email>cesar.maximo@gmail.com</email>
</author>
<published>2016-06-29T20:43:36+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=417ae1f7de23c31918c544eda1ca0990230e6466'/>
<id>urn:sha1:417ae1f7de23c31918c544eda1ca0990230e6466</id>
<content type='text'>
use cortex-a53 and arm platf proper optimized flags
</content>
</entry>
<entry>
<title>Fix "Security Vulnerability - kernel info leak of wifi driver"</title>
<updated>2016-11-11T01:45:18+00:00</updated>
<author>
<name>cm</name>
<email>cesar.maximo@gmail.com</email>
</author>
<published>2016-09-18T19:59:40+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=9ca4665f7f2411dc66445c84c07e5a7d87adbde3'/>
<id>urn:sha1:9ca4665f7f2411dc66445c84c07e5a7d87adbde3</id>
<content type='text'>
</content>
</entry>
<entry>
<title>stackprotector: Introduce CONFIG_CC_STACKPROTECTOR_STRONG</title>
<updated>2016-11-11T01:04:09+00:00</updated>
<author>
<name>Kees Cook</name>
<email>keescook@chromium.org</email>
</author>
<published>2013-12-19T19:35:59+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=75febbc95d63fa1a9c1dad107b3dc4bf582488d4'/>
<id>urn:sha1:75febbc95d63fa1a9c1dad107b3dc4bf582488d4</id>
<content type='text'>
This changes the stack protector config option into a choice of
"None", "Regular", and "Strong":

   CONFIG_CC_STACKPROTECTOR_NONE
   CONFIG_CC_STACKPROTECTOR_REGULAR
   CONFIG_CC_STACKPROTECTOR_STRONG

"Regular" means the old CONFIG_CC_STACKPROTECTOR=y option.

"Strong" is a new mode introduced by this patch. With "Strong" the
kernel is built with -fstack-protector-strong (available in
gcc 4.9 and later). This option increases the coverage of the stack
protector without the heavy performance hit of -fstack-protector-all.

For reference, the stack protector options available in gcc are:

-fstack-protector-all:
  Adds the stack-canary saving prefix and stack-canary checking
  suffix to _all_ function entry and exit. Results in substantial
  use of stack space for saving the canary for deep stack users
  (e.g. historically xfs), and measurable (though shockingly still
  low) performance hit due to all the saving/checking. Really not
  suitable for sane systems, and was entirely removed as an option
  from the kernel many years ago.

-fstack-protector:
  Adds the canary save/check to functions that define an 8
  (--param=ssp-buffer-size=N, N=8 by default) or more byte local
  char array. Traditionally, stack overflows happened with
  string-based manipulations, so this was a way to find those
  functions. Very few total functions actually get the canary; no
  measurable performance or size overhead.

-fstack-protector-strong
  Adds the canary for a wider set of functions, since it's not
  just those with strings that have ultimately been vulnerable to
  stack-busting. With this superset, more functions end up with a
  canary, but it still remains small compared to all functions
  with only a small change in performance. Based on the original
  design document, a function gets the canary when it contains any
  of:

    - local variable's address used as part of the right hand side
      of an assignment or function argument
    - local variable is an array (or union containing an array),
      regardless of array type or length
    - uses register local variables

  https://docs.google.com/a/google.com/document/d/1xXBH6rRZue4f296vGt9YQcuLVQHeE516stHwt8M9xyU

Find below a comparison of "size" and "objdump" output when built with
gcc-4.9 in three configurations:

  - defconfig
	11430641 kernel text size
	36110 function bodies

  - defconfig + CONFIG_CC_STACKPROTECTOR_REGULAR
	11468490 kernel text size (+0.33%)
	1015 of 36110 functions are stack-protected (2.81%)

  - defconfig + CONFIG_CC_STACKPROTECTOR_STRONG via this patch
	11692790 kernel text size (+2.24%)
	7401 of 36110 functions are stack-protected (20.5%)

With -strong, ARM's compressed boot code now triggers stack
protection, so a static guard was added. Since this is only used
during decompression and was never used before, the exposure
here is very small. Once it switches to the full kernel, the
stack guard is back to normal.

Chrome OS has been using -fstack-protector-strong for its kernel
builds for the last 8 months with no problems.

Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt;
Cc: Arjan van de Ven &lt;arjan@linux.intel.com&gt;
Cc: Michal Marek &lt;mmarek@suse.cz&gt;
Cc: Russell King &lt;linux@arm.linux.org.uk&gt;
Cc: Ralf Baechle &lt;ralf@linux-mips.org&gt;
Cc: Paul Mundt &lt;lethal@linux-sh.org&gt;
Cc: James Hogan &lt;james.hogan@imgtec.com&gt;
Cc: Stephen Rothwell &lt;sfr@canb.auug.org.au&gt;
Cc: Shawn Guo &lt;shawn.guo@linaro.org&gt;
Cc: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
Cc: Andrew Morton &lt;akpm@linux-foundation.org&gt;
Cc: Peter Zijlstra &lt;peterz@infradead.org&gt;
Cc: linux-arm-kernel@lists.infradead.org
Cc: linux-mips@linux-mips.org
Cc: linux-arch@vger.kernel.org
Link: http://lkml.kernel.org/r/1387481759-14535-3-git-send-email-keescook@chromium.org
[ Improved the changelog and descriptions some more. ]
Signed-off-by: Ingo Molnar &lt;mingo@kernel.org&gt;
Git-commit: 8779657d29c0ebcc0c94ede4df2f497baf1b563f
Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
Change-Id: I0c53785c54b9c2bedd6134fb959b59d1d1afb0ef
Signed-off-by: David Brown &lt;davidb@codeaurora.org&gt;
</content>
</entry>
<entry>
<title>stackprotector: Unify the HAVE_CC_STACKPROTECTOR logic between architectures</title>
<updated>2016-11-11T01:04:05+00:00</updated>
<author>
<name>Kees Cook</name>
<email>keescook@chromium.org</email>
</author>
<published>2013-12-19T19:35:58+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=89f5a564dd5db2e691ee86fc51160e12e24f3efb'/>
<id>urn:sha1:89f5a564dd5db2e691ee86fc51160e12e24f3efb</id>
<content type='text'>
Instead of duplicating the CC_STACKPROTECTOR Kconfig and
Makefile logic in each architecture, switch to using
HAVE_CC_STACKPROTECTOR and keep everything in one place. This
retains the x86-specific bug verification scripts.

Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt;
Cc: Arjan van de Ven &lt;arjan@linux.intel.com&gt;
Cc: Michal Marek &lt;mmarek@suse.cz&gt;
Cc: Russell King &lt;linux@arm.linux.org.uk&gt;
Cc: Ralf Baechle &lt;ralf@linux-mips.org&gt;
Cc: Paul Mundt &lt;lethal@linux-sh.org&gt;
Cc: James Hogan &lt;james.hogan@imgtec.com&gt;
Cc: Stephen Rothwell &lt;sfr@canb.auug.org.au&gt;
Cc: Shawn Guo &lt;shawn.guo@linaro.org&gt;
Cc: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
Cc: Andrew Morton &lt;akpm@linux-foundation.org&gt;
Cc: Peter Zijlstra &lt;peterz@infradead.org&gt;
Cc: Thomas Gleixner &lt;tglx@linutronix.de&gt;
Cc: linux-arm-kernel@lists.infradead.org
Cc: linux-mips@linux-mips.org
Cc: linux-arch@vger.kernel.org
Link: http://lkml.kernel.org/r/1387481759-14535-2-git-send-email-keescook@chromium.org
Signed-off-by: Ingo Molnar &lt;mingo@kernel.org&gt;
[davidb@codeaurora.org: Simple Kconfig merge resolution]
Git-commit: 19952a92037e752f9d3bbbad552d596f9a56e146
Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
Change-Id: I6e430de3c79306724e90ea1178f242145c39f059
Signed-off-by: David Brown &lt;davidb@codeaurora.org&gt;

Conflicts:
	arch/x86/Kconfig
</content>
</entry>
<entry>
<title>defconfig: enable CC_STACKPROTECTOR-STRONG</title>
<updated>2016-11-11T00:59:59+00:00</updated>
<author>
<name>Moyster</name>
<email>oysterized@gmail.com</email>
</author>
<published>2016-11-09T11:49:29+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=e1fce17ed64c3b664cf745233d22f269129d041c'/>
<id>urn:sha1:e1fce17ed64c3b664cf745233d22f269129d041c</id>
<content type='text'>
</content>
</entry>
</feed>
