<feed xmlns='http://www.w3.org/2005/Atom'>
<title>xavi/android_kernel_m2note/kernel/fork.c, branch o-8.1</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.
</subtitle>
<id>https://gitea.privatedns.org/xavi/android_kernel_m2note/atom?h=o-8.1</id>
<link rel='self' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/atom?h=o-8.1'/>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/'/>
<updated>2019-05-02T19:45:12+00:00</updated>
<entry>
<title>clean up process flags</title>
<updated>2019-05-02T19:45:12+00:00</updated>
<author>
<name>Corinna Vinschen</name>
<email>xda@vinschen.de</email>
</author>
<published>2019-04-10T18:36:23+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=90974be52474315f282e17d20f44d8d69f21aa2c'/>
<id>urn:sha1:90974be52474315f282e17d20f44d8d69f21aa2c</id>
<content type='text'>
* Move PF_WAKE_UP_IDLE to 0x00000002 to make room for PF_SUSPEND_TASK
* Drop PF_SU in favor of a bit 'task_is_su' in the task_struct bitfield
  which has still lots of room without changing the struct size.

Change-Id: I2af053ebcbb3c41b7407560008da8150a73c8c05
Signed-off-by: Corinna Vinschen &lt;xda@vinschen.de&gt;
Signed-off-by: Moyster &lt;oysterized@gmail.com&gt;
</content>
</entry>
<entry>
<title>memcg: kill CONFIG_MM_OWNER</title>
<updated>2019-05-02T15:32:37+00:00</updated>
<author>
<name>Oleg Nesterov</name>
<email>oleg@redhat.com</email>
</author>
<published>2014-06-04T23:07:34+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=02ad15caec3c2d2c63146b07a4291647a293d893'/>
<id>urn:sha1:02ad15caec3c2d2c63146b07a4291647a293d893</id>
<content type='text'>
CONFIG_MM_OWNER makes no sense.  It is not user-selectable, it is only
selected by CONFIG_MEMCG automatically.  So we can kill this option in
init/Kconfig and do s/CONFIG_MM_OWNER/CONFIG_MEMCG/ globally.

Change-Id: I07980d9557cef16a102ed293bc4a8ad1f9302777
Signed-off-by: Oleg Nesterov &lt;oleg@redhat.com&gt;
Acked-by: Michal Hocko &lt;mhocko@suse.cz&gt;
Acked-by: Johannes Weiner &lt;hannes@cmpxchg.org&gt;
Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
</content>
</entry>
<entry>
<title>Replace &lt;asm/uaccess.h&gt; with &lt;linux/uaccess.h&gt; globally</title>
<updated>2018-11-29T17:33:35+00:00</updated>
<author>
<name>Linus Torvalds</name>
<email>torvalds@linux-foundation.org</email>
</author>
<published>2016-12-24T19:46:01+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=97d31ff07bb554e2861bd3e1e4ab3756a8fb1f51'/>
<id>urn:sha1:97d31ff07bb554e2861bd3e1e4ab3756a8fb1f51</id>
<content type='text'>
This was entirely automated, using the script by Al:

  PATT='^[[:blank:]]*#[[:blank:]]*include[[:blank:]]*&lt;asm/uaccess.h&gt;'
  sed -i -e "s!$PATT!#include &lt;linux/uaccess.h&gt;!" \
        $(git grep -l "$PATT"|grep -v ^include/linux/uaccess.h)

to do the replacement at the end of the merge window.

Requested-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
Signed-off-by: Moyster &lt;oysterized@gmail.com&gt;
</content>
</entry>
<entry>
<title>fork: make whole stack_canary random</title>
<updated>2017-10-14T14:01:41+00:00</updated>
<author>
<name>Jann Horn</name>
<email>jann@thejh.net</email>
</author>
<published>2016-10-31T14:04:01+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=5552263da84e0181b29bc4bc442c2e7b8c7c7a82'/>
<id>urn:sha1:5552263da84e0181b29bc4bc442c2e7b8c7c7a82</id>
<content type='text'>
On machines with sizeof(unsigned long)==8, this ensures that the more
significant 32 bits of stack_canary are random, too.
stack_canary is defined as unsigned long, all the architectures with stack
protector support already pick the stack_canary of init as a random
unsigned long, and get_random_long() should be as fast as get_random_int(),
so there seems to be no good reason against this.

This should help if someone tries to guess a stack canary with brute force.

(This change has been made in PaX already, with a different RNG.)

Signed-off-by: Jann Horn &lt;jann@thejh.net&gt;
Acked-by: Kees Cook &lt;keescook@chromium.org&gt;
</content>
</entry>
<entry>
<title>Revert "proc: smaps: Allow smaps access for CAP_SYS_RESOURCE"</title>
<updated>2017-07-11T11:46:34+00:00</updated>
<author>
<name>Daniel Mentz</name>
<email>danielmentz@google.com</email>
</author>
<published>2017-07-07T19:02:15+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=6e905410832518f5237116d929c3c57d1918eeab'/>
<id>urn:sha1:6e905410832518f5237116d929c3c57d1918eeab</id>
<content type='text'>
This reverts commit d590b5b6953304edb000de90335a3b4838b2482c.

This fixes CVE-2017-0710.

SELinux allows more fine grained control: We grant processes that need
access to smaps CAP_SYS_PTRACE but prohibit them from using ptrace
attach().

Bug: 34951864
Bug: 36468447
Change-Id: I081033cf8fd7058b41cb464200b544e24651372d
Signed-off-by: Daniel Mentz &lt;danielmentz@google.com&gt;
</content>
</entry>
<entry>
<title>uksm: remove Mtk aksm &amp; uksm (because its fugly)</title>
<updated>2017-07-04T10:13:29+00:00</updated>
<author>
<name>Mister Oyster</name>
<email>oysterized@gmail.com</email>
</author>
<published>2017-07-03T10:14:46+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=78742a7c4ce43a72a843d4a0632c80b81cdb3457'/>
<id>urn:sha1:78742a7c4ce43a72a843d4a0632c80b81cdb3457</id>
<content type='text'>
Revert "KSM: mediatek: implement Adaptive KSM"
Revert "mm: uksm: fix maybe-uninitialized warning"
Revert "UKSM: Add Governors for Higher CPU usage (HighCPU) for more merging, and low cpu usage (Battery) for less battery drain"
Revert "uksm: use deferrable timer"
Revert "mm: limit UKSM sleep time instead of failing"
Revert "uksm: Fix warning"
Revert "uksm: clean up and remove some (no)inlines"
Revert "uksm: modify ema logic and tidy up"
Revert "uksm: enhancements and cleanups"
Revert "uksm: squashed fixups"
Revert "UKSM: cast variable as const"
Revert "UKSM: remove U64_MAX definition"
Revert "add uksm 0.1.2.3 for v3.10 .ge.46.patch"
</content>
</entry>
<entry>
<title>kernel: Only expose su when daemon is running</title>
<updated>2017-05-21T17:16:22+00:00</updated>
<author>
<name>Tom Marshall</name>
<email>tdm.code@gmail.com</email>
</author>
<published>2017-01-25T17:01:03+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=b93332000206a6748fa7854991b9a221ffc73ec7'/>
<id>urn:sha1:b93332000206a6748fa7854991b9a221ffc73ec7</id>
<content type='text'>
It has been claimed that the PG implementation of 'su' has security
vulnerabilities even when disabled.  Unfortunately, the people that
find these vulnerabilities often like to keep them private so they
can profit from exploits while leaving users exposed to malicious
hackers.

In order to reduce the attack surface for vulnerabilites, it is
therefore necessary to make 'su' completely inaccessible when it
is not in use (except by the root and system users).

Change-Id: I79716c72f74d0b7af34ec3a8054896c6559a181d
</content>
</entry>
<entry>
<title>drivers:lmk: Fix double delete issue</title>
<updated>2017-04-17T09:51:36+00:00</updated>
<author>
<name>Hong-Mei Li</name>
<email>a21834@motorola.com</email>
</author>
<published>2015-03-21T01:05:10+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=5b6c8937233e2945a5fe70152ace3b7e0a8d804b'/>
<id>urn:sha1:5b6c8937233e2945a5fe70152ace3b7e0a8d804b</id>
<content type='text'>
someone may change a process's oom_score_adj by proc fs, even though the
process has exited. In that case, the task was deleted from the rb tree
already, and the redundant deleting would trigger rb_erase panic finally.
In this patch, we make sure to clear the node after deteting and check
its empty status before rb_erase.

Change-Id: I26098ca3350f111e94567f9e65ec3dce413197aa
Signed-off-by: Hong-Mei Li &lt;a21834@motorola.com&gt;
Reviewed-on: http://gerrit.mot.com/727760
SME-Granted: SME Approvals Granted
SLTApproved: Slta Waiver &lt;sltawvr@motorola.com&gt;
Tested-by: Jira Key &lt;jirakey@motorola.com&gt;
Reviewed-by: Sheng-Zhe Zhao &lt;a18689@motorola.com&gt;
Submit-Approved: Jira Key &lt;jirakey@motorola.com&gt;
</content>
</entry>
<entry>
<title> Get rid of __cpuinit</title>
<updated>2017-04-11T09:00:11+00:00</updated>
<author>
<name>Moyster</name>
<email>oysterized@gmail.com</email>
</author>
<published>2017-03-18T01:50:50+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=7c777e87cb30fc926920d677a845d651decaf997'/>
<id>urn:sha1:7c777e87cb30fc926920d677a845d651decaf997</id>
<content type='text'>
This commit is the result of

find . -name '*.c' | xargs sed -i 's/ __cpuinit / /g'
find . -name '*.c' | xargs sed -i 's/ __cpuexit / /g'
find . -name '*.c' | xargs sed -i 's/ __cpuinitdata / /g'
find . -name '*.c' | xargs sed -i 's/ __cpuinit$//g'
find ./arch/ -name '*.h' | xargs sed -i 's/ __cpuinit//g'
find . -name '*.c' | xargs sed -i 's/^__cpuinit //g'
find . -name '*.c' | xargs sed -i 's/^__cpuinitdata //g'
find . -name '*.c' | xargs sed -i 's/\*__cpuinit /\*/g'
find . -name '*.c' | xargs sed -i 's/ __cpuinitconst / /g'
find . -name '*.h' | xargs sed -i 's/ __cpuinit / /g'
find . -name '*.h' | xargs sed -i 's/ __cpuinitdata / /g'
git add .
git reset include/linux/init.h
git checkout -- include/linux/init.h

based off : https://github.com/jollaman999/jolla-kernel_bullhead/commit/bc15db84a622eed7d61d3ece579b577154d0ec29
</content>
</entry>
<entry>
<title>kernel: support task's adj rbtree</title>
<updated>2017-04-11T09:00:03+00:00</updated>
<author>
<name>Yi-wei Zhao</name>
<email>gbjc64@motorola.com</email>
</author>
<published>2014-12-30T23:41:53+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=8e0a290d5efb120346f38a0e2e8ef32bc3b9a71f'/>
<id>urn:sha1:8e0a290d5efb120346f38a0e2e8ef32bc3b9a71f</id>
<content type='text'>
Add (or del) a task to (or from) task's adj rbtree
when a task is created or exit.

Change-Id: Ic63e03355a1fed8c500097bad223c59c742a2346
Signed-off-by: Hong-Mei Li &lt;a21834@motorola.com&gt;
Signed-off-by: Yi-wei Zhao &lt;gbjc64@motorola.com&gt;
Reviewed-on: http://gerrit.mot.com/701207
SLTApproved: Slta Waiver &lt;sltawvr@motorola.com&gt;
Tested-by: Jira Key &lt;jirakey@motorola.com&gt;
Submit-Approved: Jira Key &lt;jirakey@motorola.com&gt;
</content>
</entry>
</feed>
