-
-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improve seccomp disable && Add locking to protect cred modifications in escape_to_root #2320
Conversation
When disabling Seccomp, ensure that current->sighand->siglock is held during the operation. Signed-off-by: SsageParuders<qinqingqing1025@gmail.com>
This commit introduces locking to ensure safe access and modification of the `cred` structure within the `escape_to_root` function. Signed-off-by: SsageParuders <qinqingqing1025@gmail.com>"
eaea2b9
to
9d3666c
Compare
…in escape_to_root (tiann#2320) - When disabling Seccomp, ensure that current->sighand->siglock is held during the operation. - Locking to ensure safe access and modification of the `cred` structure within the `escape_to_root` function. --- I think this issue described in tiann#2236 may have been caused by concurrent read-write access without proper locking. --------- Signed-off-by: SsageParuders<qinqingqing1025@gmail.com> Signed-off-by: SsageParuders <qinqingqing1025@gmail.com>"
…in escape_to_root (tiann#2320) - When disabling Seccomp, ensure that current->sighand->siglock is held during the operation. - Locking to ensure safe access and modification of the `cred` structure within the `escape_to_root` function. --- I think this issue described in tiann#2236 may have been caused by concurrent read-write access without proper locking. --------- Signed-off-by: SsageParuders<qinqingqing1025@gmail.com> Signed-off-by: SsageParuders <qinqingqing1025@gmail.com>"
Most kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. path_umount: backslashxx/mojito_krenol@2d51422 get_cred_rcu: introduced by tiann#2320 backport examples backslashxx/mojito_krenol@c1df3e5 backslashxx/msm8953-kernel@95903fb Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
Most non-gki kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. path_umount: discussions: tiann#1464 example: backslashxx/mojito_krenol@2d51422 get_cred_rcu: introduced by tiann#2320 backport examples backslashxx/mojito_krenol@c1df3e5 backslashxx/msm8953-kernel@95903fb Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
for 3.18 / 4.x users that are self-maintaining their trees This should apply as is on < 4.19.303, < 4.14.334, and anything older, On upstreamed kernels, it will likely conflict, due to offending commit: recommendations: heres an example |
…in escape_to_root (tiann#2320) - When disabling Seccomp, ensure that current->sighand->siglock is held during the operation. - Locking to ensure safe access and modification of the `cred` structure within the `escape_to_root` function. --- I think this issue described in tiann#2236 may have been caused by concurrent read-write access without proper locking. --------- Signed-off-by: SsageParuders<qinqingqing1025@gmail.com> Signed-off-by: SsageParuders <qinqingqing1025@gmail.com>"
…in escape_to_root (tiann#2320) - When disabling Seccomp, ensure that current->sighand->siglock is held during the operation. - Locking to ensure safe access and modification of the `cred` structure within the `escape_to_root` function. --- I think this issue described in tiann#2236 may have been caused by concurrent read-write access without proper locking. --------- Signed-off-by: SsageParuders<qinqingqing1025@gmail.com> Signed-off-by: SsageParuders <qinqingqing1025@gmail.com>"
Most non-gki kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. path_umount: discussions: tiann#1464 example: backslashxx/mojito_krenol@2d51422 get_cred_rcu: introduced by tiann#2320 backport examples backslashxx/mojito_krenol@c1df3e5 backslashxx/msm8953-kernel@95903fb Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
…in escape_to_root (tiann#2320) - When disabling Seccomp, ensure that current->sighand->siglock is held during the operation. - Locking to ensure safe access and modification of the `cred` structure within the `escape_to_root` function. --- I think this issue described in tiann#2236 may have been caused by concurrent read-write access without proper locking. --------- Signed-off-by: SsageParuders<qinqingqing1025@gmail.com> Signed-off-by: SsageParuders <qinqingqing1025@gmail.com>"
…cations in escape_to_root (tiann#2320)" This reverts commit 58ed786.
Most non-gki kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. path_umount: discussions: tiann#1464 example: backslashxx/mojito_krenol@2d51422 get_cred_rcu: introduced by tiann#2320 backport examples backslashxx/mojito_krenol@c1df3e5 backslashxx/msm8953-kernel@95903fb Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
Most non-gki kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. path_umount: discussions: tiann#1464 example: backslashxx/mojito_krenol@2d51422 get_cred_rcu: introduced by tiann#2320 backport examples backslashxx/mojito_krenol@c1df3e5 backslashxx/msm8953-kernel@95903fb Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
Most non-gki kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. path_umount: discussions: tiann#1464 example: backslashxx/mojito_krenol@2d51422 get_cred_rcu: introduced by tiann#2320 backport examples backslashxx/mojito_krenol@c1df3e5 backslashxx/msm8953-kernel@95903fb Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
Most non-gki kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. path_umount: discussions: tiann#1464 example: backslashxx/mojito_krenol@2d51422 get_cred_rcu: introduced by tiann#2320 backport examples backslashxx/mojito_krenol@c1df3e5 backslashxx/msm8953-kernel@95903fb Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
…in escape_to_root (tiann#2320) - When disabling Seccomp, ensure that current->sighand->siglock is held during the operation. - Locking to ensure safe access and modification of the `cred` structure within the `escape_to_root` function. --- I think this issue described in tiann#2236 may have been caused by concurrent read-write access without proper locking. --------- Signed-off-by: SsageParuders<qinqingqing1025@gmail.com> Signed-off-by: SsageParuders <qinqingqing1025@gmail.com>"
…in escape_to_root (tiann#2320) - When disabling Seccomp, ensure that current->sighand->siglock is held during the operation. - Locking to ensure safe access and modification of the `cred` structure within the `escape_to_root` function. --- I think this issue described in tiann#2236 may have been caused by concurrent read-write access without proper locking. --------- Signed-off-by: SsageParuders<qinqingqing1025@gmail.com> Signed-off-by: SsageParuders <qinqingqing1025@gmail.com>"
tiann#2320 Signed-off-by: rsuntk <rissu.ntk@gmail.com>
…cations in escape_to_root (tiann#2320)" This reverts commit 58ed786. Signed-off-by: mrsrimar22 <mrsrimar22@gmail.com>
…d modifications in escape_to_root (tiann#2320)"" This reverts commit 3a7e9eb.
* Backport get_cred_rcu for KSU * Refer to tiann/KernelSU#2320
…cations in escape_to_root (tiann#2320)" This reverts commit 58ed786.
Most non-gki kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. path_umount: discussions: tiann#1464 example: backslashxx/mojito_krenol@2d51422 get_cred_rcu: introduced by tiann#2320 backport examples backslashxx/mojito_krenol@c1df3e5 backslashxx/msm8953-kernel@95903fb Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
Most non-gki kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. path_umount: discussions: tiann#1464 example: backslashxx/mojito_krenol@2d51422 get_cred_rcu: introduced by tiann#2320 backport examples backslashxx/mojito_krenol@c1df3e5 backslashxx/msm8953-kernel@95903fb Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
Most non-gki kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. path_umount: discussions: tiann#1464 example: backslashxx/mojito_krenol@2d51422 get_cred_rcu: introduced by tiann#2320 backport examples backslashxx/mojito_krenol@c1df3e5 backslashxx/msm8953-kernel@95903fb Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
NON-GKI kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. Another thing is that on NON-GKI, we mostly do NOT care about ABI stability. Required: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, just SKIP THIS or check dependency chain of, gregkh/linux@3d70818 this got backported to v4.4.236, v4.9.236, v4.14.197, v4.19.144 - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
NON-GKI kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. Another thing is that on NON-GKI, we mostly do NOT care about ABI stability. Required: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, just SKIP THIS or check dependency chain of, gregkh/linux@3d70818 this got backported to v4.4.236, v4.9.236, v4.14.197, v4.19.144 - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
tiann/KernelSU#2320 Signed-off-by: rsuntk <rissu.ntk@gmail.com>
tiann/KernelSU#2320 Signed-off-by: rsuntk <rissu.ntk@gmail.com>
NON-GKI kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. Another thing is that on NON-GKI, we mostly do NOT care about ABI stability. Required: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, just SKIP THIS or check dependency chain of, gregkh/linux@3d70818 this got backported to v4.4.236, v4.9.236, v4.14.197, v4.19.144 - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
NON-GKI kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. Another thing is that on NON-GKI, we mostly do NOT care about ABI stability. Required: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, just SKIP THIS or check dependency chain of, gregkh/linux@3d70818 this got backported to v4.4.236, v4.9.236, v4.14.197, v4.19.144 - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
NON-GKI kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. Another thing is that on NON-GKI, we mostly do NOT care about ABI stability. Required: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, just SKIP THIS or check dependency chain of, gregkh/linux@3d70818 this got backported to v4.4.236, v4.9.236, v4.14.197, v4.19.144 - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
NON-GKI kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. Another thing is that on NON-GKI, we mostly do NOT care about ABI stability. Required: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, just SKIP THIS or check dependency chain of, gregkh/linux@3d70818 this got backported to v4.4.236, v4.9.236, v4.14.197, v4.19.144 - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
NON-GKI kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. Another thing is that on NON-GKI, we mostly do NOT care about ABI stability. Required: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, just SKIP THIS or check dependency chain of, gregkh/linux@3d70818 this got backported to v4.4.236, v4.9.236, v4.14.197, v4.19.144 - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
NON-GKI kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. Another thing is that on NON-GKI, we mostly do NOT care about ABI stability. Required: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, just SKIP THIS or check dependency chain of, gregkh/linux@3d70818 this got backported to v4.4.236, v4.9.236, v4.14.197, v4.19.144 - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
NON-GKI kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. Another thing is that on NON-GKI, we mostly do NOT care about ABI stability. Required: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, just SKIP THIS or check dependency chain of, gregkh/linux@3d70818 this got backported to v4.4.236, v4.9.236, v4.14.197, v4.19.144 - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
NON-GKI kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. Another thing is that on NON-GKI, we mostly do NOT care about ABI stability. Required: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, just SKIP THIS or check dependency chain of, gregkh/linux@3d70818 this got backported to v4.4.236, v4.9.236, v4.14.197, v4.19.144 - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
NON-GKI kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. Another thing is that on NON-GKI, we mostly do NOT care about ABI stability. Required: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, just SKIP THIS or check dependency chain of, gregkh/linux@3d70818 this got backported to v4.4.236, v4.9.236, v4.14.197, v4.19.144 - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
NON-GKI kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. Another thing is that on NON-GKI, we mostly do NOT care about ABI stability. Required: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, just SKIP THIS or check dependency chain of, gregkh/linux@3d70818 this got backported to v4.4.236, v4.9.236, v4.14.197, v4.19.144 - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
NON-GKI kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. Another thing is that on NON-GKI, we mostly do NOT care about ABI stability. Required: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, just SKIP THIS or check dependency chain of, gregkh/linux@3d70818 this got backported to v4.4.236, v4.9.236, v4.14.197, v4.19.144 - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
NON-GKI kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. Another thing is that on NON-GKI, we mostly do NOT care about ABI stability. Required: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, just SKIP THIS or check dependency chain of, gregkh/linux@3d70818 this got backported to v4.4.236, v4.9.236, v4.14.197, v4.19.144 - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
tiann/KernelSU#2320 Signed-off-by: rsuntk <rissu.ntk@gmail.com>
tiann/KernelSU#2320 Signed-off-by: rsuntk <rissu.ntk@gmail.com>
tiann/KernelSU#2320 Signed-off-by: rsuntk <rissu.ntk@gmail.com>
NON-GKI kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. Another thing is that on NON-GKI, we mostly do NOT care about ABI stability. Required: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, just SKIP THIS or check dependency chain of, gregkh/linux@3d70818 this got backported to v4.4.236, v4.9.236, v4.14.197, v4.19.144 - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
NON-GKI kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. Another thing is that on NON-GKI, we mostly do NOT care about ABI stability. Required: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, just SKIP THIS or check dependency chain of, gregkh/linux@3d70818 this got backported to v4.4.236, v4.9.236, v4.14.197, v4.19.144 - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
NON-GKI kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. Another thing is that on NON-GKI, we mostly do NOT care about ABI stability. Required: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, just SKIP THIS or check dependency chain of, gregkh/linux@3d70818 this got backported to v4.4.236, v4.9.236, v4.14.197, v4.19.144 - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
NON-GKI kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. Another thing is that on NON-GKI, we mostly do NOT care about ABI stability. Required: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, just SKIP THIS or check dependency chain of, gregkh/linux@3d70818 this got backported to v4.4.236, v4.9.236, v4.14.197, v4.19.144 - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
NON-GKI kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. Another thing is that on NON-GKI, we mostly do NOT care about ABI stability. Required: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, just SKIP THIS or check dependency chain of, gregkh/linux@3d70818 this got backported to v4.4.236, v4.9.236, v4.14.197, v4.19.144 - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
NON-GKI kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. Another thing is that on NON-GKI, we mostly do NOT care about ABI stability. Required: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, just SKIP THIS or check dependency chain of, gregkh/linux@3d70818 this got backported to v4.4.236, v4.9.236, v4.14.197, v4.19.144 - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
NON-GKI kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. Another thing is that on NON-GKI, we mostly do NOT care about ABI stability. Required: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, just SKIP THIS or check dependency chain of, gregkh/linux@3d70818 this got backported to v4.4.236, v4.9.236, v4.14.197, v4.19.144 - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
NON-GKI kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. Another thing is that on NON-GKI, we mostly do NOT care about ABI stability. Required: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, just SKIP THIS or check dependency chain of, gregkh/linux@3d70818 this got backported to v4.4.236, v4.9.236, v4.14.197, v4.19.144 - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
NON-GKI kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. Another thing is that on NON-GKI, we mostly do NOT care about ABI stability. Required: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, just SKIP THIS or check dependency chain of, gregkh/linux@3d70818 this got backported to v4.4.236, v4.9.236, v4.14.197, v4.19.144 - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
NON-GKI kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. Another thing is that on NON-GKI, we mostly do NOT care about ABI stability. Required: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, just SKIP THIS or check dependency chain of, gregkh/linux@3d70818 this got backported to v4.4.236, v4.9.236, v4.14.197, v4.19.144 - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
NON-GKI kernel builders have to touch their kernel source code anyway so we might as well tell them to backport things to achieve some sort of feature parity. Another thing is that on NON-GKI, we mostly do NOT care about ABI stability. Required: - path_umount: context: tiann#1464 (comment) apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@2d51422 - get_cred_rcu: context: tiann#2320 (comment) apply: torvalds/linux@97d0fb2 if above conflicts, try: xiaomi-sdm678/android_kernel_xiaomi_mojito@3fbad8b Optional: - kernel_read / kernel_write < 4.14, backport chain, tested on 4.9 torvalds/linux@e13ec93 torvalds/linux@bdd1d2d torvalds/linux@c41fbad torvalds/linux@ac452ac - strncpy_from_user_nofault for 5.4, apply: torvalds/linux@bd88bb5 for 4.x, apply: xiaomi-sdm678/android_kernel_xiaomi_mojito@424e21f for any failures, just SKIP THIS or check dependency chain of, gregkh/linux@3d70818 this got backported to v4.4.236, v4.9.236, v4.14.197, v4.19.144 - hint, `curl $url.patch | git am` Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
cred
structure within theescape_to_root
function.I think this issue described in #2236 may have been caused by concurrent read-write access without proper locking.