Merge branch 'android12-5.10' into android12-5.10-lts
Sync up with android12-5.10 for the following commits:1419b69403Merge tag 'android12-5.10.101_r00' into android12-5.103eec441822UPSTREAM: usb: gadget: Fix use-after-free bug by not setting udc->dev.driver821f3e53d9UPSTREAM: usb: gadget: rndis: prevent integer overflow in rndis_set_response()39aca15979FROMGIT: mm/migrate: fix race between lock page and clear PG_Isolatedde0334216bUPSTREAM: arm64: proton-pack: Include unprivileged eBPF status in Spectre v2 mitigation reportingd236f7b4cbUPSTREAM: arm64: Use the clearbhb instruction in mitigations98b16e808fUPSTREAM: KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered and migrated0f76dfc55dUPSTREAM: arm64: Mitigate spectre style branch history side channels5411474f65UPSTREAM: arm64: Do not include __READ_ONCE() block in assembly filese9a39a642cUPSTREAM: KVM: arm64: Allow indirect vectors to be used without SPECTRE_V3Afee1ae7c7cUPSTREAM: arm64: proton-pack: Report Spectre-BHB vulnerabilities as part of Spectre-v2d95b0b4e5dUPSTREAM: arm64: Add percpu vectors for EL130180ef431Revert "BACKPORT: FROMLIST: scsi: core: Reserve one tag for the UFS driver"28837e415dUPSTREAM: arm64: entry: Add macro for reading symbol addresses from the trampolinee322fe26a1UPSTREAM: arm64: entry: Add vectors that have the bhb mitigation sequences2a90cf9af2UPSTREAM: arm64: entry: Add non-kpti __bp_harden_el1_vectors for mitigations0db372ec4bUPSTREAM: arm64: entry: Allow the trampoline text to occupy multiple pages158c87e50aUPSTREAM: arm64: entry: Make the kpti trampoline's kpti sequence optionale6408b96a0UPSTREAM: arm64: entry: Move trampoline macros out of ifdef'd section00d8bb6b90UPSTREAM: arm64: entry: Don't assume tramp_vectors is the start of the vectors0defb52ce6UPSTREAM: arm64: entry: Allow tramp_alias to access symbols after the 4K boundary6e48449c91UPSTREAM: arm64: entry: Move the trampoline data page before the text pagebb8baaf3afUPSTREAM: arm64: entry: Free up another register on kpti's tramp_exit path32ba6d5d61UPSTREAM: arm64: entry: Make the trampoline cleanup optionalc8b567d888UPSTREAM: arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit17867c11a2UPSTREAM: arm64: entry.S: Add ventry overflow sanity checks81ec26aafeUPSTREAM: arm64: cpufeature: add HWCAP for FEAT_RPRES18c4e4fa56UPSTREAM: arm64: cpufeature: add HWCAP for FEAT_AFP68bc555a23UPSTREAM: arm64: add ID_AA64ISAR2_EL1 sys register2e2eef400bUPSTREAM: arm64: Add HWCAP for self-synchronising virtual counter6d1f2678e2UPSTREAM: arm64: Add Cortex-X2 CPU part definition51eded5d1bUPSTREAM: arm64: cputype: Add CPU implementor & types for the Apple M1 cores803ff1161cUPSTREAM: binder: Add invalid handle info in user error loga40cd23755UPSTREAM: ARM: fix Thumb2 regression with Spectre BHB56186c7e4aUPSTREAM: ARM: Spectre-BHB: provide empty stub for non-config1ea0d91588UPSTREAM: ARM: fix build warning in proc-v7-bugs.cfdf3cb8a00UPSTREAM: ARM: Do not use NOCROSSREFS directive with ld.lld57bc1e13f0UPSTREAM: ARM: fix co-processor register typoa4e68d43f5UPSTREAM: ARM: fix build error when BPF_SYSCALL is disabledbd2376838dUPSTREAM: ARM: include unprivileged BPF status in Spectre V2 reportingafbbe4048fUPSTREAM: ARM: Spectre-BHB workaround5a41f364e7UPSTREAM: ARM: use LOADADDR() to get load address of sections3bfcb356dfUPSTREAM: ARM: early traps initialisation5a64a66802UPSTREAM: ARM: report Spectre v2 status through sysfs9362cd2b47UPSTREAM: x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT54a2bd029fUPSTREAM: x86/speculation: Warn about Spectre v2 LFENCE mitigationf1b1f893b4UPSTREAM: x86/speculation: Update link to AMD speculation whitepaperc4188388a3UPSTREAM: x86/speculation: Use generic retpoline by default on AMDbd02dc4329UPSTREAM: x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting3883503747UPSTREAM: Documentation/hw-vuln: Update spectre doc1c3e98581bUPSTREAM: x86/speculation: Add eIBRS + Retpoline optionscc9e9aa4e0UPSTREAM: x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE414a6076acUPSTREAM: x86,bugs: Unconditionally allow spectre_v2=retpoline,amdf27f62fecdUPSTREAM: bpf: Add kconfig knob for disabling unpriv bpf by defaultf3ca80ccedANDROID: dm-bow: Protect Ranges fetched and erased from the RB tree4ebb639f0dANDROID: mm: page_pinner: fix build warningfe75d58387ANDROID: fault: Add vendor hook for TLB conflict8248a3e758BACKPORT: sched: Fix yet more sched_fork() racescd6e5d5d7dANDROID: mm/slub: Fix Kasan issue with for_each_object_track8dbcaf63b2ANDROID: dm kcopyd: Use reserved memory for the copy buffer7b5fea2f46ANDROID: GKI: add allowed list file for xiaomiae38f9954bANDROID: GKI: Update symbols to symbol list786bcb1109FROMGIT: f2fs: quota: fix loop condition at f2fs_quota_sync()91fef75d48FROMGIT: f2fs: Restore rwsem lockdep support4cc8ec84beANDROID: ABI: update allowed list for galaxyfcaaaaae6dUPSTREAM: mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work91be4236fbANDROID: GKI: remove vfs-only namespace from 2 symbolsa817d6ed87ANDROID: mm: Fix page table lookup in speculative fault pathe53b1b9ad4UPSTREAM: xhci: re-initialize the HC during resume if HCE was set767f384155FROMGIT: xhci: make xhci_handshake timeout for xhci_reset() adjustableebbf267fc0ANDROID: vendor_hooks: Add hooks for __alloc_pages_direct_reclaim135406cecbANDROID: dma-direct: Document disable_dma32bf96382fb9ANDROID: dma-direct: Make DMA32 disablement work for CONFIG_NUMA8f66dc1a78UPSTREAM: mmc: block: fix read single on recovery logiccf221db753UPSTREAM: fget: check that the fd still exists after getting a ref to it43754d8b7fANDROID: GKI: Update symbols to symbol listf2d0c30576ANDROID: vendor_hooks: Add hooks for shrink_active_list62412e5b8cFROMGIT: mm: count time in drain_all_pages during direct reclaim as memory pressure3b9fe10e46ANDROID: incremental-fs: remove spurious kfree()acefa91e51ANDROID: vendor_hooks: Add hooks for binderc3ac7418e6ANDROID: qcom: Add sysfs related symbol Change-Id: Icbe5fb26e3cef602e3bbc01745a755a95d72a1a0
This commit is contained in:
@@ -2249,6 +2249,17 @@ static __latent_entropy struct task_struct *copy_process(
|
||||
if (retval)
|
||||
goto bad_fork_put_pidfd;
|
||||
|
||||
/*
|
||||
* Now that the cgroups are pinned, re-clone the parent cgroup and put
|
||||
* the new task on the correct runqueue. All this *before* the task
|
||||
* becomes visible.
|
||||
*
|
||||
* This isn't part of ->can_fork() because while the re-cloning is
|
||||
* cgroup specific, it unconditionally needs to place the task on a
|
||||
* runqueue.
|
||||
*/
|
||||
sched_cgroup_fork(p, args);
|
||||
|
||||
/*
|
||||
* From this point on we must avoid any synchronous user-space
|
||||
* communication until we take the tasklist-lock. In particular, we do
|
||||
@@ -2356,7 +2367,7 @@ static __latent_entropy struct task_struct *copy_process(
|
||||
fd_install(pidfd, pidfile);
|
||||
|
||||
proc_fork_connector(p);
|
||||
sched_post_fork(p, args);
|
||||
sched_post_fork(p);
|
||||
cgroup_post_fork(p, args);
|
||||
perf_event_fork(p);
|
||||
|
||||
|
||||
Reference in New Issue
Block a user