-
-
Notifications
You must be signed in to change notification settings - Fork 2.4k
Improve seccomp disable && Add locking to protect cred modifications in escape_to_root #2320
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
When disabling Seccomp, ensure that current->sighand->siglock is held during the operation. Signed-off-by: SsageParuders<[email protected]>
This commit introduces locking to ensure safe access and modification of the `cred` structure within the `escape_to_root` function. Signed-off-by: SsageParuders <[email protected]>"
eaea2b9
to
9d3666c
Compare
…in escape_to_root (tiann#2320) - When disabling Seccomp, ensure that current->sighand->siglock is held during the operation. - Locking to ensure safe access and modification of the `cred` structure within the `escape_to_root` function. --- I think this issue described in tiann#2236 may have been caused by concurrent read-write access without proper locking. --------- Signed-off-by: SsageParuders<[email protected]> Signed-off-by: SsageParuders <[email protected]>"
…in escape_to_root (tiann#2320) - When disabling Seccomp, ensure that current->sighand->siglock is held during the operation. - Locking to ensure safe access and modification of the `cred` structure within the `escape_to_root` function. --- I think this issue described in tiann#2236 may have been caused by concurrent read-write access without proper locking. --------- Signed-off-by: SsageParuders<[email protected]> Signed-off-by: SsageParuders <[email protected]>"
Most kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. path_umount: backslashxx/mojito_krenol@2d51422 get_cred_rcu: introduced by tiann#2320 backport examples backslashxx/mojito_krenol@c1df3e5 backslashxx/msm8953-kernel@95903fb Signed-off-by: backslashxx <[email protected]>
Most non-gki kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. path_umount: discussions: tiann#1464 example: backslashxx/mojito_krenol@2d51422 get_cred_rcu: introduced by tiann#2320 backport examples backslashxx/mojito_krenol@c1df3e5 backslashxx/msm8953-kernel@95903fb Signed-off-by: backslashxx <[email protected]>
for 3.18 / 4.x users that are self-maintaining their trees This should apply as is on < 4.19.303, < 4.14.334, and anything older, On upstreamed kernels, it will likely conflict, due to offending commit: recommendations: heres an example |
…in escape_to_root (tiann#2320) - When disabling Seccomp, ensure that current->sighand->siglock is held during the operation. - Locking to ensure safe access and modification of the `cred` structure within the `escape_to_root` function. --- I think this issue described in tiann#2236 may have been caused by concurrent read-write access without proper locking. --------- Signed-off-by: SsageParuders<[email protected]> Signed-off-by: SsageParuders <[email protected]>"
…in escape_to_root (tiann#2320) - When disabling Seccomp, ensure that current->sighand->siglock is held during the operation. - Locking to ensure safe access and modification of the `cred` structure within the `escape_to_root` function. --- I think this issue described in tiann#2236 may have been caused by concurrent read-write access without proper locking. --------- Signed-off-by: SsageParuders<[email protected]> Signed-off-by: SsageParuders <[email protected]>"
Most non-gki kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. path_umount: discussions: tiann#1464 example: backslashxx/mojito_krenol@2d51422 get_cred_rcu: introduced by tiann#2320 backport examples backslashxx/mojito_krenol@c1df3e5 backslashxx/msm8953-kernel@95903fb Signed-off-by: backslashxx <[email protected]>
…in escape_to_root (tiann#2320) - When disabling Seccomp, ensure that current->sighand->siglock is held during the operation. - Locking to ensure safe access and modification of the `cred` structure within the `escape_to_root` function. --- I think this issue described in tiann#2236 may have been caused by concurrent read-write access without proper locking. --------- Signed-off-by: SsageParuders<[email protected]> Signed-off-by: SsageParuders <[email protected]>"
…cations in escape_to_root (tiann#2320)" This reverts commit 58ed786.
Most non-gki kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. path_umount: discussions: tiann#1464 example: backslashxx/mojito_krenol@2d51422 get_cred_rcu: introduced by tiann#2320 backport examples backslashxx/mojito_krenol@c1df3e5 backslashxx/msm8953-kernel@95903fb Signed-off-by: backslashxx <[email protected]>
Most non-gki kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. path_umount: discussions: tiann#1464 example: backslashxx/mojito_krenol@2d51422 get_cred_rcu: introduced by tiann#2320 backport examples backslashxx/mojito_krenol@c1df3e5 backslashxx/msm8953-kernel@95903fb Signed-off-by: backslashxx <[email protected]>
Most non-gki kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. path_umount: discussions: tiann#1464 example: backslashxx/mojito_krenol@2d51422 get_cred_rcu: introduced by tiann#2320 backport examples backslashxx/mojito_krenol@c1df3e5 backslashxx/msm8953-kernel@95903fb Signed-off-by: backslashxx <[email protected]>
Most non-gki kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. path_umount: discussions: tiann#1464 example: backslashxx/mojito_krenol@2d51422 get_cred_rcu: introduced by tiann#2320 backport examples backslashxx/mojito_krenol@c1df3e5 backslashxx/msm8953-kernel@95903fb Signed-off-by: backslashxx <[email protected]>
…in escape_to_root (tiann#2320) - When disabling Seccomp, ensure that current->sighand->siglock is held during the operation. - Locking to ensure safe access and modification of the `cred` structure within the `escape_to_root` function. --- I think this issue described in tiann#2236 may have been caused by concurrent read-write access without proper locking. --------- Signed-off-by: SsageParuders<[email protected]> Signed-off-by: SsageParuders <[email protected]>"
…in escape_to_root (tiann#2320) - When disabling Seccomp, ensure that current->sighand->siglock is held during the operation. - Locking to ensure safe access and modification of the `cred` structure within the `escape_to_root` function. --- I think this issue described in tiann#2236 may have been caused by concurrent read-write access without proper locking. --------- Signed-off-by: SsageParuders<[email protected]> Signed-off-by: SsageParuders <[email protected]>"
tiann#2320 Signed-off-by: rsuntk <[email protected]>
…cations in escape_to_root (tiann#2320)" This reverts commit 58ed786. Signed-off-by: mrsrimar22 <[email protected]>
…d modifications in escape_to_root (tiann#2320)"" This reverts commit 3a7e9eb.
* Backport get_cred_rcu for KSU * Refer to tiann/KernelSU#2320
…cations in escape_to_root (tiann#2320)" This reverts commit 58ed786.
Most non-gki kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. path_umount: discussions: tiann#1464 example: backslashxx/mojito_krenol@2d51422 get_cred_rcu: introduced by tiann#2320 backport examples backslashxx/mojito_krenol@c1df3e5 backslashxx/msm8953-kernel@95903fb Signed-off-by: backslashxx <[email protected]>
Most non-gki kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. path_umount: discussions: tiann#1464 example: backslashxx/mojito_krenol@2d51422 get_cred_rcu: introduced by tiann#2320 backport examples backslashxx/mojito_krenol@c1df3e5 backslashxx/msm8953-kernel@95903fb Signed-off-by: backslashxx <[email protected]>
Most non-gki kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. path_umount: discussions: tiann#1464 example: backslashxx/mojito_krenol@2d51422 get_cred_rcu: introduced by tiann#2320 backport examples backslashxx/mojito_krenol@c1df3e5 backslashxx/msm8953-kernel@95903fb Signed-off-by: backslashxx <[email protected]>
Legacy kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. As for others, it is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. Required: - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
Legacy kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. As for others, it is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. Required: - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
Legacy kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. As for others, it is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. Required: - get_cred_rcu: context: tiann/KernelSU#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - path_umount: context: tiann/KernelSU#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
Legacy kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. As for others, it is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. Required: - get_cred_rcu: context: tiann/KernelSU#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - path_umount: context: tiann/KernelSU#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
Legacy kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. As for others, it is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. Required: - get_cred_rcu: context: tiann/KernelSU#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - path_umount: context: tiann/KernelSU#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
Legacy kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. As for others, it is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. Required: - get_cred_rcu: context: tiann/KernelSU#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - path_umount: context: tiann/KernelSU#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
Legacy kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. As for others, it is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. Required: - get_cred_rcu: context: tiann/KernelSU#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - path_umount: context: tiann/KernelSU#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
Legacy kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. As for others, it is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. Required: - get_cred_rcu: context: tiann/KernelSU#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - path_umount: context: tiann/KernelSU#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
Legacy kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. As for others, it is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. Required: - get_cred_rcu: context: tiann/KernelSU#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - path_umount: context: tiann/KernelSU#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
Legacy kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. As for others, it is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. Required: - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
Legacy kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. As for others, it is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. Required: - get_cred_rcu: context: tiann/KernelSU#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - path_umount: context: tiann/KernelSU#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
Legacy kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. As for others, it is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. Required: - get_cred_rcu: context: tiann/KernelSU#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - path_umount: context: tiann/KernelSU#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
Legacy kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. As for others, it is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. Required: - get_cred_rcu: context: tiann/KernelSU#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - path_umount: context: tiann/KernelSU#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
Legacy kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. As for others, it is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. Required: - get_cred_rcu: context: tiann/KernelSU#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - path_umount: context: tiann/KernelSU#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
Legacy kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. As for others, it is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. Required: - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
Legacy kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. As for others, it is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. Required: - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
Legacy kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. As for others, it is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. Required: - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
Legacy kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. As for others, it is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. Required: - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
Legacy kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. As for others, it is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. Required: - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
It is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. The following are backportable: - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
It is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. The following are backportable: - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
It is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. The following are backportable: - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
It is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. The following are backportable: - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
It is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. The following are backportable: - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
It is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. The following are backportable: - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
It is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. The following are backportable: - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
It is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. The following are backportable: - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
Legacy kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. As for others, it is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. Required: - get_cred_rcu: context: tiann/KernelSU#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - path_umount: context: tiann/KernelSU#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
Legacy kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. As for others, it is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. Required: - get_cred_rcu: context: tiann/KernelSU#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - path_umount: context: tiann/KernelSU#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
Legacy kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. As for others, it is a common thing on the scene to backport things, so this breaks kernel versioning assumptions. As for those, we scan and check kernel source. Required: - get_cred_rcu: context: tiann/KernelSU#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - path_umount: context: tiann/KernelSU#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, check dependency chain of gregkh/linux@f43434e - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <[email protected]>
cred
structure within theescape_to_root
function.I think this issue described in #2236 may have been caused by concurrent read-write access without proper locking.