- 01 Nov, 2014 1 commit
-
-
Andy Lutomirski authored
With this change, calling prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) disables privilege granting operations at execve-time. For example, a process will not be able to execute a setuid binary to change their uid or gid if this bit is set. The same is true for file capabilities. Additionally, LSM_UNSAFE_NO_NEW_PRIVS is defined to ensure that LSMs respect the requested behavior. To determine if the NO_NEW_PRIVS bit is set, a task may call prctl(PR_GET_NO_NEW_PRIVS, 0, 0, 0, 0); It returns 1 if set and 0 if it is not set. If any of the arguments are non-zero, it will return -1 and set errno to -EINVAL. (PR_SET_NO_NEW_PRIVS behaves similarly.) This functionality is desired for the proposed seccomp filter patch series. By using PR_SET_NO_NEW_PRIVS, it allows a task to modify the system call behavior for itself and its child tasks without being able to impact the behavior of a more privileged task. Another potential use is making certain privileged operations unprivileged. For example, chroot may be considered "safe" if it cannot affect privileged tasks. Note, this patch causes execve to fail when PR_SET_NO_NEW_PRIVS is set and AppArmor is in use. It is fixed in a subsequent patch. Signed-off-by:
Andy Lutomirski <luto@amacapital.net> Signed-off-by:
Will Drewry <wad@chromium.org> Acked-by:
Eric Paris <eparis@redhat.com> v18: updated change desc v17: using new define values as per 3.4 Conflicts: include/linux/prctl.h kernel/sys.c
-
- 14 Oct, 2014 1 commit
-
-
hsuan-chih_chen authored
bug: 17968808 Kernel change for new eMMC v5.0 parts for FLO/DEB Change-Id: Ia18152457fe3ff70401b199c267fa37374b9d544 Signed-off-by:
hsuan-chih_chen <hsuan-chih_chen@asus.com>
-
- 03 Oct, 2014 2 commits
-
-
Naveen Ramaraj authored
The __GFP_CMA mask is now placed after all available GFP masks. With this we need to increase the total number of GFP flags. Do so accordingly. Bug: 17494249 CRs-Fixed: 648978 Change-Id: I53f5f064ac16a50ee10c84ff2bb50fdb7e085bd0 Signed-off-by:
Laura Abbott <lauraa@codeaurora.org> Signed-off-by:
Naveen Ramaraj <nramaraj@codeaurora.org>
-
Naveen Ramaraj authored
Currenlty most memory reclaim is done through kswapd. Since kswapd uses a gfp mask of GFP_KERNEL, and because the lowmemorykiller is zone aware, the lowmemorykiller will ignore highmem most of the time. This results in the lowmemorykiller being overly aggressive. The fix to this issue is to allow the lowmemorykiller to count highmem when being called by the kswapd if the lowmem watermarks are satisfied. Bug: 17494249 Change-Id: I938644584f374763d10d429d835e74daa4854a38 Signed-off-by:
Liam Mark <lmark@codeaurora.org> Signed-off-by:
Naveen Ramaraj <nramaraj@codeaurora.org>
-
- 16 Aug, 2014 10 commits
-
-
Harsh Vardhan Dwivedi authored
Add a flag in /sys/kernel/debug/kgsl/kgsl-3do/proc/<pid>/mem file to indicate for each GPU buffer if it is mapped to userspace in <pid> or not. CRs-fixed: 634962 Change-Id: I8abda74ef5656aca6b1c0315af8deb77460fa5a9 Signed-off-by:
Harsh Vardhan Dwivedi <hdwivedi@codeaurora.org>
-
Jordan Crouse authored
Add VM_DONTCOPY to the default set of mmap flags to keep VM objects from being copied on fork() and causing issues. KGSL file descriptors copied to a child are not expected to be usable. Change-Id: Ic0dedbad85c07118a931ccb9f7a6fd0507da3e5a Signed-off-by:
Jordan Crouse <jcrouse@codeaurora.org>
-
Jordan Crouse authored
VM_IO prevents mapped memory from being peeked by ptrace(). That kind of protection isn't really needed for nominal GPU buffers. A process given itself up to ptrace() already expects to be examined so there is no additional risk to let the parent examine GPU buffers too. This is done universally now, but there is no reason why we wouldn't let the process choose which buffers to keep private in the future. That said; there is more of a concern about including GPU buffers in a core dump since that is a more permanent and less secure record of the memory so add VM_DONTDUMP for all GPU buffers to protect against that. CRs-Fixed: 654751 Change-Id: Ic0dedbade91a2ec458bcb27eff3312d4ec6e4389 Signed-off-by:
Jordan Crouse <jcrouse@codeaurora.org>
-
Jordan Crouse authored
We don't need to define a function to return a constant. Save ourselves some source code and some .text space too. Change-Id: Ic0dedbadc72c2fdd473cd4369ed772c84a923a15 Signed-off-by:
Jordan Crouse <jcrouse@codeaurora.org>
-
Shrenuj Bansal authored
Reserves CMA memory for kgsl driver early during bootup and then uses dma_alloc_coherent() to allocate physically contiguous memory instead of using the MMU Change-Id: Ica9b244fe9b9d8a902d670293a0bec2edf81bd5d Signed-off-by:
Shrenuj Bansal <shrenujb@codeaurora.org>
-
Carter Cooper authored
Only set the default constraint when we come out of slumber if there is no current constraint set. The current behavior will always override the constraint that was set when coming out of slumber. Signed-off-by:
Carter Cooper <ccooper@codeaurora.org> Change-Id: I58a5e2338bbee64e885edf697e83869820be2c22
-
Carter Cooper authored
No matter what type of constraint leave it in effect until the constraint has expired. Change-Id: I75118823fd484f87dda8e0f26fa3fe1ae12ca07d Signed-off-by:
Lucille Sylester <lsylvest@codeaurora.org>
-
Carter Cooper authored
Add missing trace to ensure debug logs show everything Change-Id: I5da21b15ba498e1266d6c96b700c6c18135f92e9 Signed-off-by:
Carter Cooper <ccooper@codeaurora.org>
-
Oleg Perelet authored
Remove power constraint if parent context is deleted before constraint expires. Change-Id: I6a28fec842132733b2e9015333cc4d14c77daa8e Signed-off-by:
Oleg Perelet <operelet@codeaurora.org>
-
Shrenuj Bansal authored
When creating a context, we add the event group much before initializing the memstore for that context. Between these events, its possible that events are registered and retired and the timestamp read in retire_events() gets us the last timestamp of the last destroyed context. This results in the processed timestamp to be greater than the actual retired timestamp in the memstore which is very problematic for us. CRs-Fixed: 640550 Change-Id: I2ace6d99e2ce417ba38f6bbbeeb787478eb4e372 Signed-off-by:
Shrenuj Bansal <shrenujb@codeaurora.org>
-
- 13 Aug, 2014 1 commit
-
-
Ed Tam authored
git://codeaurora.org/external/wlan/prima.git d3d0022 wlan : Revision 3.2.3.22 060e06d wlan: Send directed Probe Request frames only for hidden SSIDs. Signed-off-by:
Ed Tam <etam@google.com>
-
- 05 Aug, 2014 3 commits
-
-
Minsung Kim authored
Commit 40cf2f8 (cpufreq: Persist cpufreq time in state data across hotplug) causes the following call trace to be spit on boot: BUG: sleeping function called from invalid context at mm/slub.c:936 in_atomic(): 1, irqs_disabled(): 0, pid: 1, name: swapper/0 CPU: 6 PID: 1 Comm: swapper/0 Not tainted 3.10.9-20140624.172707-eng-gd6c0f69-dirty #50 Backtrace: [<c0012270>] (dump_backtrace+0x0/0x10c) from [<c001256c>] (show_stack+0x18/0x1c) r6:ffff1788 r5:c0c020c0 r4:e609c000 r3:00000000 [<c0012554>] (show_stack+0x0/0x1c) from [<c07a2970>] (dump_stack+0x20/0x28) [<c07a2950>] (dump_stack+0x0/0x28) from [<c0057678>] (__might_sleep+0x104/0x120) [<c0057574>] (__might_sleep+0x0/0x120) from [<c00ff000>] (__kmalloc_track_caller+0x144/0x274) r6:00000000 r5:e609c000 r4:e6802140 [<c00feebc>] (__kmalloc_track_caller+0x0/0x274) from [<c00da098>] (krealloc+0x58/0xb0) [<c00da040>] (krealloc+0x0/0xb0) from [<c050266c>] (cpufreq_allstats_create+0x120/0x204) r8:e4c4ff00 r7:c0d266b8 r6:0013d620 r5:e4c4e600 r4:00000001 r3:e535d6d0 [<c050254c>] (cpufreq_allstats_create+0x0/0x204) from [<c0502e38>] (cpufreq_stat_notifier_policy+0xb8/0xd0) [<c0502d80>] (cpufreq_stat_notifier_policy+0x0/0xd0) from [<c00517cc>] (notifier_call_chain+0x4c/0x8c) r5:00000000 r4:fffffffe [<c0051780>] (notifier_call_chain+0x0/0x8c) from [<c00519fc>] (__blocking_notifier_call_chain+0x50/0x68) r8:c0cd4d00 r7:00000002 r6:e609dd7c r5:ffffffff r4:c0d25a4c r3:ffffffff [<c00519ac>] (__blocking_notifier_call_chain+0x0/0x68) from [<c0051a34>] (blocking_notifier_call_chain+0x20/0x28) r7:c0e24f30 r6:00000000 r5:e53e1e00 r4:e609dd7c [<c0051a14>] (blocking_notifier_call_chain+0x0/0x28) from [<c0500fec>] (__cpufreq_set_policy+0xc0/0x1d0) [<c0500f2c>] (__cpufreq_set_policy+0x0/0x1d0) from [<c0501308>] (cpufreq_add_dev_interface+0x20c/0x270) r7:00000008 r6:00000000 r5:e53e1e00 r4:e53e1e58 [<c05010fc>] (cpufreq_add_dev_interface+0x0/0x270) from [<c05016a8>] (cpufreq_add_dev+0x33c/0x420) [<c050136c>] (cpufreq_add_dev+0x0/0x420) from [<c03604a4>] (subsys_interface_register+0x80/0xbc) [<c0360424>] (subsys_interface_register+0x0/0xbc) from [<c050035c>] (cpufreq_register_driver+0x8c/0x194) Change-Id: If77a656d0ea60a8fc4083283d104509fa6c07f8f Signed-off-by:
Minsung Kim <ms925.kim@samsung.com>
-
Ruchi Kandoi authored
Cpufreq time_in_state data for all CPUs is made persistent across hotplug and exposed to userspace via sysfs file /sys/devices/system/cpu/cpufreq/all_time_in_state Change-Id: I97cb5de24b6de16189bf8b5df9592d0a6e6ddf32 Signed-off-by:
Ruchi Kandoi <kandoiruchi@google.com>
-
Ruchi Kandoi authored
/sys/kernel/wakeup_reasons/last_resume_reason Change-Id: If25e8e416ee9726996518b58b6551a61dc1591e3 Signed-off-by:
Ruchi Kandoi <kandoiruchi@google.com>
-
- 25 Jul, 2014 1 commit
-
-
Stephen Smalley authored
rootfs (ramfs) can support setting of security contexts by userspace due to the vfs fallback behavior of calling the security module to set the in-core inode state for security.* attributes when the filesystem does not provide an xattr handler. No xattr handler required as the inodes are pinned in memory and have no backing store. This is useful in allowing early userspace to label individual files within a rootfs while still providing a policy-defined default via genfs. Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- 24 Jul, 2014 3 commits
-
-
Hans de Goede authored
Running a 3.4 kernel + Fedora-18 (systemd) userland on my Allwinner A10 (arm cortex a8), I'm seeing repeated, reproducable list_del list corruption errors when build with CONFIG_DEBUG_LIST, and the backtrace always shows free_css_set_work as the function making the problematic list_del call. I've tracked this doen to a use after free of the cgrp struct, specifically of the cgrp->css_sets list_head, which gets cleared by free_css_set_work. Since free_css_set_work runs form a workqueue, it is possible for it to not be done with clearing the list when the cgrp gets free-ed. To avoid this the code adding the links increases cgrp->count, and the freeing code running from the workqueue decreases cgrp->count *after* doing list_del, and then if the count goes to 0 calls cgroup_wakeup_rmdir_waiter(). However cgroup_rmdir() is missing a check for cgrp->count != 0, causing it to still continue with the rmdir (which leads to the free-ing of the cgrp), before free_css_set_work is done. Sometimes the free-ed memory is re-used before free_css_set_work gets around to unlinking link->cgrp_link_list, triggering the list_del list corruption messages. This patch fixes this by properly checking for cgrp->count != 0 and waiting for the cgroup_rmdir_waitq in that case. Change-Id: I9dbc02a0a75d5dffa1b65d67456e00139dea57c3 Signed-off-by:
Hans de Goede <hdegoede@redhat.com>
-
Hans de Goede authored
As indicated in the comment above cgroup_css_sets_empty it needs the css_set_lock. But neither of the 2 call points have it, so rather then fixing the callers just take the lock inside cgroup_css_sets_empty(). Signed-off-by:
Hans de Goede <hdegoede@redhat.com> Change-Id: If7aea71824f6d0e3f2cc6c1ce236c3ae6be2037b
-
Sasha Levin authored
The l2tp [get|set]sockopt() code has fallen back to the UDP functions for socket option levels != SOL_PPPOL2TP since day one, but that has never actually worked, since the l2tp socket isn't an inet socket. As David Miller points out: "If we wanted this to work, it'd have to look up the tunnel and then use tunnel->sk, but I wonder how useful that would be" Since this can never have worked so nobody could possibly have depended on that functionality, just remove the broken code and return -EINVAL. Reported-by:
Sasha Levin <sasha.levin@oracle.com> Acked-by:
James Chapman <jchapman@katalix.com> Acked-by:
David Miller <davem@davemloft.net> Cc: Phil Turnbull <phil.turnbull@oracle.com> Cc: Vegard Nossum <vegard.nossum@oracle.com> Cc: Willy Tarreau <w@1wt.eu> Cc: stable@vger.kernel.org Signed-off-by:
Linus Torvalds <torvalds@linux-foundation.org> Signed-off-by:
Ed Tam <etam@google.com>
-
- 18 Jul, 2014 7 commits
-
-
Lucille Sylvester authored
Switching from a MAX to a MIN power constraint in the same context is broken. So is switching from a MAX context constraint to a MIN constraint on a different context. Clarify constraint ownership, update the timestamps accordingly, and reset constraints when changed by the context. Change-Id: Id27dbc20e2aac994101817af3857451c1703219e Signed-off-by:
Lucille Sylvester <lsylvest@codeaurora.org>
-
Jordan Crouse authored
Put CP_STATE_DEBUG_INDEX and CP_STATE_DEBUG_DATA under protection to keep it from being written from an IB1. Doing so however opens up a subtle "feature" in the microcode: memory read opcodes turn off protected mode in the microcode to do the read and then turns it back on regardless of the initial state. This is a problem if the memory read happens while protected mode is turned off and then we try to access a protected register which then complains and goes boom. To account for this irregularity explicitly turn back off protected mode in all the places where we know this will be a problem. Change-Id: Ic0dedbad1397ca9b80132241ac006560a615e042 Signed-off-by:
Jordan Crouse <jcrouse@codeaurora.org>
-
Jordan Crouse authored
When we get a protected mode error print out the register information that caused the exception. Change-Id: Ic0dedbad4f586c5715669226619b51665ef9681f Signed-off-by:
Jordan Crouse <jcrouse@codeaurora.org>
-
Jordan Crouse authored
Put the SMMU register range in protected mode to shield them from IB1/IB2 writes from userspace. CRs-Fixed: 599971 Change-Id: Ic0dedbad8c03fc1c54ff73221231e2440d3c34dd Signed-off-by:
Jordan Crouse <jcrouse@codeaurora.org>
-
Jordan Crouse authored
Turn on protected register mode for the A3XX GPU family and add 0x63 (RBBM_INT_0_MASK) to the list of protected registers. Change-Id: Ic0dedbad10ebfa6eb6d3d815b5aa9b6b6f0e8e35 Signed-off-by:
Jordan Crouse <jcrouse@codeaurora.org>
-
Jordan Crouse authored
Mark the IOMMU setstate memory as read only in the pagetable. Change-Id: Ic0dedbadb19e499c749cd744c3e89be3bcb4c2a2 Signed-off-by:
Jordan Crouse <jcrouse@codeaurora.org>
-
Jeff Boody authored
Over time chery-picks for KGSL have been skipped or have been resolved differently between branches. As a result, this branch of KGSL has become increasingly difficult to maintain due to merge conflicts. With a few exceptions KGSL should match the msm-3.4 mainline exactly. To rectify the situation, this change brings KGSL up-to-date with the msm-3.4 mainline as a bulk change because cherry-picks are not practical. Change-Id: I53f9f7fbf4942e147dea486ff5dbf179af75ea8c Signed-off-by:
Jeff Boody <jboody@codeaurora.org>
-
- 16 Jul, 2014 6 commits
-
-
Linus Torvalds authored
Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), and adds the missing size check. CRs-Fixed: 570735 Change-Id: I927a67ea80fea5ed706749ead9defb1e72633952 Reported-by:
Nico Golde <nico@ngolde.de> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org. Git-commit: 7314e613d5ff9f0934f7a0f74ed7973b903315d1 Git-repo: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git [pratibha@codeaurora.org:resolve trivial merge conflicts] Signed-off-by:
Pratibhasagar V <pratibha@codeaurora.org> Signed-off-by:
Ed Tam <etam@google.com>
-
Uwe Kleine-König authored
This makes it possible to let gdb access mappings of the process that is being debugged. uio_mmap_logical was moved and uio_vm_ops renamed to group related code and differentiate to new stuff. CRs-Fixed: 570735 Change-Id: I8a5ff343727cc58fedfeb73f3466cc9a7f153e84 Signed-off-by:
Uwe Kleine-König <u.kleine-koenig@pengutronix.de> Signed-off-by:
Greg Kroah-Hartman <gregkh@linuxfoundation.org> Git-commit: 7294151d0592e0ff48c61fca9fd7c93d613134da Git-repo: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git Signed-off-by:
Pratibhasagar V <pratibha@codeaurora.org> Signed-off-by:
Ed Tam <etam@google.com>
-
Mekala Natarajan authored
The RemoteFS server now uses the UIO driver. Add the UIO device for APQ8064. Bug: 12784954 Signed-off-by:
Mekala Natarajan <mekalan@codeaurora.org>
-
Mekala Natarajan authored
Enable msm_sharedmem UIO driver on targets which use RemoteFS(over QMI). CRs-Fixed: 477427 Bug: 12784954 Signed-off-by:
Mekala Natarajan <mekalan@codeaurora.org>
-
Mekala Natarajan authored
Update the driver to support backward compatibility for devices relying on board files for platform data. CRs-Fixed: 592586 Bug: 12784954 Change-Id: I04d4195a7fd4b926e52b0cbb2bb33cfcc054689f Signed-off-by:
Pratibhasagar V <pratibha@codeaurora.org> Signed-off-by:
Mekala Natarajan <mekalan@codeaurora.org>
-
Mekala Natarajan authored
The RemoteFS server now uses the UIO driver. So add the UIO device for APQ8064 CRs-Fixed: 592586 Bug: 12784954 Change-Id: Ia0d643a10827869bfe527bf15ba064842e509487 Signed-off-by:
Pratibhasagar V <pratibha@codeaurora.org> Signed-off-by:
Mekala Natarajan <mekalan@codeaurora.org>
-
- 15 Jul, 2014 1 commit
-
-
Mekala Natarajan authored
Add new device driver to provide a standard interface for its clients (like RemoteFS and RFSA) to be able to memory map their respective allotted shared memory address in the client's address space. The shared memory (a transport buffer) address is unique for each individual client and is made available to the driver via device tree. This driver uses the existing UIO framework to facilitate the clients mmap requirements. Each individual client will be able to use a unique UIO device for this purpose. CRs-Fixed: 477427 Bug: 12784954 Change-Id: If07b88086b5f1b87845962818094644575629fcf Signed-off-by:
Pratibhasagar V <pratibha@codeaurora.org> Signed-off-by:
Venkat Gopalakrishnan <venkatg@codeaurora.org> Signed-off-by:
Mekala Natarajan <mekalan@codeaurora.org>
-
- 11 Jul, 2014 1 commit
-
-
Jeff Boody authored
The existing code does not have dependencies to check the flag based on the new KGSL_* flags. A subsequent change will restore the flag check when the dependencies have been merged. Change-Id: Ibc3de28d2c21467f9b31887282c00726750e079e Signed-off-by:
Jeff Boody <jboody@codeaurora.org>
-
- 09 Jul, 2014 1 commit
-
-
Mike Galbraith authored
Make stop scheduler class do the same accounting as other classes, Migration threads can be caught in the act while doing exec balancing, leading to the below due to use of unmaintained ->se.exec_start. The load that triggered this particular instance was an apparently out of control heavily threaded application that does system monitoring in what equated to an exec bomb, with one of the VERY frequently migrated tasks being ps. %CPU PID USER CMD 99.3 45 root [migration/10] 97.7 53 root [migration/12] 97.0 57 root [migration/13] 90.1 49 root [migration/11] 89.6 65 root [migration/15] 88.7 17 root [migration/3] 80.4 37 root [migration/8] 78.1 41 root [migration/9] 44.2 13 root [migration/2] Signed-off-by:
Mike Galbraith <mgalbraith@suse.de> Signed-off-by:
Peter Zijlstra <a.p.zijlstra@chello.nl> Link: http://lkml.kernel.org/r/1344051854.6739.19.camel@marge.simpson.net Signed-off-by:
Thomas Gleixner <tglx@linutronix.de>
-
- 08 Jul, 2014 2 commits
-
-
Sreeram Ramachandran authored
Bug: 15413527 Change-Id: If33bebb7b52c0ebfa8dac2452607bce0c2b0faa0 Signed-off-by:
Sreeram Ramachandran <sreeram@google.com>
-
Lorenzo Colitti authored
This contains the following commits: 1. 0149763 net: core: Add a UID range to fib rules. 2. 1650474 net: core: Use the socket UID in routing lookups. 3. 0b16771 net: ipv4: Add the UID to the route cache. 4. ee058f1 net: core: Add a RTA_UID attribute to routes. This is so that userspace can do per-UID route lookups. Bug: 15413527 Change-Id: I1285474c6734614d3bda6f61d88dfe89a4af7892 Signed-off-by:
Lorenzo Colitti <lorenzo@google.com>
-