<feed xmlns='http://www.w3.org/2005/Atom'>
<title>xavi/android_kernel_m2note/arch/arm64/Kconfig, branch o-8.1</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.
</subtitle>
<id>https://gitea.privatedns.org/xavi/android_kernel_m2note/atom?h=o-8.1</id>
<link rel='self' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/atom?h=o-8.1'/>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/'/>
<updated>2017-12-14T16:04:48+00:00</updated>
<entry>
<title>arm: don't force DMA_API_DEBUG on arm/arm64</title>
<updated>2017-12-14T16:04:48+00:00</updated>
<author>
<name>Mister Oyster</name>
<email>oysterized@gmail.com</email>
</author>
<published>2017-12-14T14:39:51+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=f924b2e53ae73ffc9363d746cf7633ac9cfab7ca'/>
<id>urn:sha1:f924b2e53ae73ffc9363d746cf7633ac9cfab7ca</id>
<content type='text'>
</content>
</entry>
<entry>
<title>arm: don't force IRQ_DOMAIN_DEBUG on mt67xx arch</title>
<updated>2017-12-14T16:04:48+00:00</updated>
<author>
<name>Mister Oyster</name>
<email>oysterized@gmail.com</email>
</author>
<published>2017-12-14T13:02:42+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=795a4da072f54eb56e17d4a57460a052513d1847'/>
<id>urn:sha1:795a4da072f54eb56e17d4a57460a052513d1847</id>
<content type='text'>
</content>
</entry>
<entry>
<title>defconfig: move to config_hz=300</title>
<updated>2017-06-02T01:28:44+00:00</updated>
<author>
<name>Moyster</name>
<email>oysterized@gmail.com</email>
</author>
<published>2017-06-01T19:57:52+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=96d8fd737ead1c710882315112e261a0a53e0da9'/>
<id>urn:sha1:96d8fd737ead1c710882315112e261a0a53e0da9</id>
<content type='text'>
</content>
</entry>
<entry>
<title>ANDROID: Put KUSER_HELPERS disable behind config</title>
<updated>2017-04-13T10:35:13+00:00</updated>
<author>
<name>mspector</name>
<email>mspector@google.com</email>
</author>
<published>2017-02-07T21:24:21+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=237290a5c9ce274457646ca98abe380dd0b57190'/>
<id>urn:sha1:237290a5c9ce274457646ca98abe380dd0b57190</id>
<content type='text'>
This change puts the KUSER_HELPERS selective disable behind the KCONFIG
KUSER_HELPERS_SELECTIVE_DISABLE.

Original patch adding KUSER_HELPERS:
2bed8acb3c3d44c66d979fed9bdd4ea69cb8650b
I8d6d75cc8e1b2280f2436fd3334ff3779ae3539a

Signed-off-by: mspector &lt;mspector@google.com&gt;
Change-Id: I54c606f1f39823abf0a754eef69569cbfb63f8af
Bug: 34815073
</content>
</entry>
<entry>
<title>arm64: Add CONFIG_CC_STACKPROTECTOR</title>
<updated>2017-04-11T08:57:00+00:00</updated>
<author>
<name>Laura Abbott</name>
<email>lauraa@codeaurora.org</email>
</author>
<published>2014-06-25T22:55:03+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=eeae7bbb8cbdcc000bb01d02ffa69952a4be8a73'/>
<id>urn:sha1:eeae7bbb8cbdcc000bb01d02ffa69952a4be8a73</id>
<content type='text'>
arm64 currently lacks support for -fstack-protector. Add
similar functionality to arm to detect stack corruption.

CRs-Fixed: 673518
Change-Id: Id48cdfbd426ca3d685da9926664208f4ad0d99ac
Signed-off-by: Laura Abbott &lt;lauraa@codeaurora.org&gt;
Signed-off-by: David Brown &lt;davidb@codeaurora.org&gt;
</content>
</entry>
<entry>
<title>kernel: remove CONFIG_USE_GENERIC_SMP_HELPERS</title>
<updated>2017-04-11T08:56:59+00:00</updated>
<author>
<name>Christoph Hellwig</name>
<email>hch@infradead.org</email>
</author>
<published>2013-11-14T22:32:07+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=eadfd4315866c2cbb076cfb6d3103456b0f55052'/>
<id>urn:sha1:eadfd4315866c2cbb076cfb6d3103456b0f55052</id>
<content type='text'>
We've switched over every architecture that supports SMP to it, so
remove the new useless config variable.

Signed-off-by: Christoph Hellwig &lt;hch@lst.de&gt;
Cc: Jan Kara &lt;jack@suse.cz&gt;
Cc: Jens Axboe &lt;axboe@kernel.dk&gt;
Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
[imaund@codeaurora.org: resolve merge conflicts]
Signed-off-by: Ian Maund &lt;imaund@codeaurora.org&gt;
Signed-off-by: Pranav Vashi &lt;neobuddy89@gmail.com&gt;
</content>
</entry>
<entry>
<title>BACKPORT: FROMLIST: arm64: mm: support ARCH_MMAP_RND_BITS.</title>
<updated>2016-09-10T14:51:13+00:00</updated>
<author>
<name>dcashman</name>
<email>dcashman@google.com</email>
</author>
<published>2015-12-29T23:28:13+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=ec3bb9c30fda6f9313e119d5c9fcb8a7097c677b'/>
<id>urn:sha1:ec3bb9c30fda6f9313e119d5c9fcb8a7097c677b</id>
<content type='text'>
(cherry picked from commit https://lkml.org/lkml/2015/12/21/340)

arm64: arch_mmap_rnd() uses STACK_RND_MASK to generate the
random offset for the mmap base address.  This value represents a
compromise between increased ASLR effectiveness and avoiding
address-space fragmentation. Replace it with a Kconfig option, which
is sensibly bounded, so that platform developers may choose where to
place this compromise. Keep default values as new minimums.

Bug: 24047224
Signed-off-by: Daniel Cashman &lt;dcashman@android.com&gt;
Signed-off-by: Daniel Cashman &lt;dcashman@google.com&gt;
Change-Id: I7caf105b838cfc3ab55f275e1a061eb2b77c9a2a
</content>
</entry>
<entry>
<title>arm64: kconfig: Move LIST_POISON to a safe value</title>
<updated>2016-08-26T18:01:56+00:00</updated>
<author>
<name>Jeff Vander Stoep</name>
<email>jeffv@google.com</email>
</author>
<published>2015-08-18T19:50:10+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=062f2b101ba2e66ea191aaa11d2c6811431c6d5a'/>
<id>urn:sha1:062f2b101ba2e66ea191aaa11d2c6811431c6d5a</id>
<content type='text'>
commit bf0c4e04732479f650ff59d1ee82de761c0071f0 upstream.

Move the poison pointer offset to 0xdead000000000000, a
recognized value that is not mappable by user-space exploits.

Acked-by: Catalin Marinas &lt;catalin.marinas@arm.com&gt;
Signed-off-by: Thierry Strudel &lt;tstrudel@google.com&gt;
Signed-off-by: Jeff Vander Stoep &lt;jeffv@google.com&gt;
Signed-off-by: Will Deacon &lt;will.deacon@arm.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;
Signed-off-by: Stefan Guendhoer &lt;stefan@guendhoer.com&gt;
</content>
</entry>
<entry>
<title>first commit</title>
<updated>2016-08-15T02:19:42+00:00</updated>
<author>
<name>Meizu OpenSource</name>
<email>patchwork@meizu.com</email>
</author>
<published>2016-08-15T02:19:42+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=d2e1446d81725c351dc73a03b397ce043fb18452'/>
<id>urn:sha1:d2e1446d81725c351dc73a03b397ce043fb18452</id>
<content type='text'>
</content>
</entry>
</feed>
