<feed xmlns='http://www.w3.org/2005/Atom'>
<title>xavi/android_kernel_m2note/android, branch ng-7.1.2</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.
</subtitle>
<id>https://gitea.privatedns.org/xavi/android_kernel_m2note/atom?h=ng-7.1.2</id>
<link rel='self' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/atom?h=ng-7.1.2'/>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/'/>
<updated>2017-06-28T19:33:41+00:00</updated>
<entry>
<title>android: base-cfg: disable CONFIG_NFSD and CONFIG_NFS_FS</title>
<updated>2017-06-28T19:33:41+00:00</updated>
<author>
<name>Roberto Pereira</name>
<email>rpere@google.com</email>
</author>
<published>2017-06-05T22:17:41+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=bd13a5b23da4f1ef91afaaf408f01ddea1dcfa70'/>
<id>urn:sha1:bd13a5b23da4f1ef91afaaf408f01ddea1dcfa70</id>
<content type='text'>
Signed-off-by: Roberto Pereira &lt;rpere@google.com&gt;
Bug:37753761
Change-Id: Ie98651c777b3729400ff8876d56f4008703cc785
</content>
</entry>
<entry>
<title>disable aio support in recommended configuration</title>
<updated>2017-05-28T16:04:04+00:00</updated>
<author>
<name>Daniel Micay</name>
<email>danielmicay@gmail.com</email>
</author>
<published>2016-10-20T19:45:01+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=d003d64c2886936536d624c6777675542faea9e3'/>
<id>urn:sha1:d003d64c2886936536d624c6777675542faea9e3</id>
<content type='text'>
The aio interface adds substantial attack surface for a feature that's
not being exposed by Android at all. It's unlikely that anyone is using
the kernel feature directly either. This feature is rarely used even on
servers. The glibc POSIX aio calls really use thread pools. The lack of
widespread usage also means this is relatively poorly audited/tested.

The kernel's aio rarely provides performance benefits over using a
thread pool and is quite incomplete in terms of system call coverage
along with having edge cases where blocking can occur. Part of the
performance issue is the fact that it only supports direct io, not
buffered io. The existing API is considered fundamentally flawed
and it's unlikely it will be expanded, but rather replaced:

https://marc.info/?l=linux-aio&amp;m=145255815216051&amp;w=2

Since ext4 encryption means no direct io support, kernel aio isn't even
going to work properly on Android devices using file-based encryption.

Change-Id: Iccc7cab4437791240817e6275a23e1d3f4a47f2d
Signed-off-by: Daniel Micay &lt;danielmicay@gmail.com&gt;
</content>
</entry>
<entry>
<title>ANDROID: android-base.cfg: add CONFIG_MODULES option</title>
<updated>2017-04-13T10:35:35+00:00</updated>
<author>
<name>Greg Kroah-Hartman</name>
<email>gregkh@google.com</email>
</author>
<published>2017-04-04T17:46:59+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=a85e192bc73f3b8d2cd54fbc7bd95fac247483a6'/>
<id>urn:sha1:a85e192bc73f3b8d2cd54fbc7bd95fac247483a6</id>
<content type='text'>
This adds CONFIG_MODULES, CONFIG_MODULE_UNLOAD, and CONFIG_MODVERSIONS
which are required by the O release.

Bug: 35803310
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@google.com&gt;
</content>
</entry>
<entry>
<title>ANDROID: android-base.cfg: add CONFIG_IKCONFIG option</title>
<updated>2017-04-13T10:35:35+00:00</updated>
<author>
<name>Greg Kroah-Hartman</name>
<email>gregkh@google.com</email>
</author>
<published>2017-04-04T17:45:38+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=50d045cecba1804106ae91ddf6e7f448aaf426e3'/>
<id>urn:sha1:50d045cecba1804106ae91ddf6e7f448aaf426e3</id>
<content type='text'>
This adds CONFIG_IKCONFIG and CONFIG_IKCONFIG_PROC options, which are a
requirement for the O release.

Bug: 35803310
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@google.com&gt;
</content>
</entry>
<entry>
<title>ANDROID: android-base.cfg: properly sort the file</title>
<updated>2017-04-13T10:35:35+00:00</updated>
<author>
<name>Greg Kroah-Hartman</name>
<email>gregkh@google.com</email>
</author>
<published>2017-04-04T17:38:12+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=d743356a753fdf47bfc40a106e918caacce6b330'/>
<id>urn:sha1:d743356a753fdf47bfc40a106e918caacce6b330</id>
<content type='text'>
It somehow got out of alphabetical order, fix it to make merges and
testing easier.

Signed-off-by: Greg Kroah-Hartman &lt;gregkh@google.com&gt;
</content>
</entry>
<entry>
<title>ANDROID: base-cfg: enable CONFIG_IP_NF_NAT</title>
<updated>2017-04-13T10:35:12+00:00</updated>
<author>
<name>Amit Pundir</name>
<email>amit.pundir@linaro.org</email>
</author>
<published>2016-04-11T19:49:24+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=a63710bc380142e9cd300ee1b55eeab53d7fe196'/>
<id>urn:sha1:a63710bc380142e9cd300ee1b55eeab53d7fe196</id>
<content type='text'>
IP_NF_TARGET_{MASQUERADE,NETMAP,REDIRECT} configs,
already enabled in android-base.cfg for tethering,
are of no use if CONFIG_IP_NF_NAT is not enabled.

Don't rely on platform config for that and enable
CONFIG_IP_NF_NAT in android-base.cfg as well.

Change-Id: Ic72bcebbd925b142b09539466bf963188c83108a
Signed-off-by: Amit Pundir &lt;amit.pundir@linaro.org&gt;
(cherry picked from commit 9f6bbb427fc67e5caceec70741def34234078f97)
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@google.com&gt;
</content>
</entry>
<entry>
<title>android: base-cfg: Add CONFIG_INET_DIAG_DESTROY</title>
<updated>2017-04-13T10:35:11+00:00</updated>
<author>
<name>Dmitry Shmidt</name>
<email>dimitrysh@google.com</email>
</author>
<published>2016-03-31T20:21:09+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=04820033f117fd4a78dcdb9e74c3b11918ac7173'/>
<id>urn:sha1:04820033f117fd4a78dcdb9e74c3b11918ac7173</id>
<content type='text'>
Change-Id: I67430b05eca8fd520d2795d3db60faf2ec0fab9e
Signed-off-by: Dmitry Shmidt &lt;dimitrysh@google.com&gt;
(cherry picked from commit 03fbd079bac71e15a414082cb5aee980ce2935be)
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@google.com&gt;
</content>
</entry>
<entry>
<title>config/android: Remove CONFIG_IPV6_PRIVACY</title>
<updated>2017-04-13T10:35:11+00:00</updated>
<author>
<name>Borislav Petkov</name>
<email>bp@suse.de</email>
</author>
<published>2016-10-11T20:54:36+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=a33e909626307e892f745d5202ab3877c70a7809'/>
<id>urn:sha1:a33e909626307e892f745d5202ab3877c70a7809</id>
<content type='text'>
Option is long gone, see commit 5d9efa7ee99e ("ipv6: Remove privacy
config option.")

Link: http://lkml.kernel.org/r/20160811170340.9859-1-bp@alien8.de
Signed-off-by: Borislav Petkov &lt;bp@suse.de&gt;
Cc: Rob Herring &lt;robh@kernel.org&gt;
Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
(cherry picked from commit a2c6a235dbf4318fc7f7981932478e6c47f093ab)
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@google.com&gt;
</content>
</entry>
<entry>
<title>android: base-cfg: remove CONFIG_IP[6]_NF_TARGET_REJECT_SKERR</title>
<updated>2017-04-11T08:57:34+00:00</updated>
<author>
<name>Lorenzo Colitti</name>
<email>lorenzo@google.com</email>
</author>
<published>2017-01-16T08:38:25+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=cecc852677165a56f968d733aec4447833c066e9'/>
<id>urn:sha1:cecc852677165a56f968d733aec4447833c066e9</id>
<content type='text'>
The corresponding code is gone and the unit tests check for its
absence.

Change-Id: Ia1d63f3af21242e38418db208ec222e61e633615
</content>
</entry>
<entry>
<title>android: base-cfg: enable CONFIG_INET_DIAG_DESTROY</title>
<updated>2017-04-11T08:57:34+00:00</updated>
<author>
<name>Lorenzo Colitti</name>
<email>lorenzo@google.com</email>
</author>
<published>2017-01-16T08:35:52+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=65fee5ccaad4141e4d821533c09603c9cfc842d3'/>
<id>urn:sha1:65fee5ccaad4141e4d821533c09603c9cfc842d3</id>
<content type='text'>
As of Android N, this is required to close sockets when a
network disconnects.

Change-Id: I9fe81c5fc5224c17bfd8d9e236ea9e436b5971cb
</content>
</entry>
</feed>
