Ouch, that's scary!You linked the wrong one.. That's is for general qcom 8994.
Oneplus 2 is currently at 77% https://cve.lineageos.org/android_kernel_oneplus_msm8994
Ouch, that's scary!You linked the wrong one.. That's is for general qcom 8994.
Oneplus 2 is currently at 77% https://cve.lineageos.org/android_kernel_oneplus_msm8994
Please read Ozzy's post. He said we have an issue with our phone's CVE tracker showing false results because the tool used to update it is broken so he cannot update it.You linked the wrong one.. That's is for general qcom 8994.
Oneplus 2 is currently at 77% https://cve.lineageos.org/android_kernel_oneplus_msm8994
Noplease don't trust cve tracker. our cve state is always like kernel qcom_msm8994. i don't update oneplus2 because there is a tool should copy state from one kernel into another but it's broken. i wait for someone to fix.
This is how a manufacturer writes kernel codePlease read Ozzy's post. He said we have an issue with our phone's CVE tracker showing false results because the tool used to update it is broken so he cannot update it.
We have the same CVE completion as General qcom 8994.
you just don't know what i really did. maybe there are one or two cves got overwritten but most of the cves don't affect your device and can be send to trash. there are only a couple of cve that are really needed, rest is nice to have.This is how a manufacturer writes kernel code
#ifdef VENDOR_EDIT (if defined VENDOR_EDIT)
Modified code
else (-DVENDOR_EDIT not specified)
Original code
#endif
Now let's say CAF changed something in the original code, the modified code has to be modified too to match the change otherwise the compiler will not compile the patched stuff at all
What the maintainer did was just add the modified code back on top of a secure kernel. You want to call that secure? Nice. Just live with your false sense of security
And how could anyone give you an example? Nobody is going to sort 10,000 commits to find, say 20-30% of stuff that might be brokenyou just don't know what i really did. maybe there are one or two cves got overwritten but most of the cves don't affect your device and can be send to trash. there are only a couple of cve that are really needed, rest is nice to have.
if you find any example you can tell me and i will fix. but searching for only one mismerge will be more pain than the security hole is worth.
Happy readingA lot of naysayers will say a lot of the patches from upstream are irrelevant to the architecture of most phones (arm/arm64) or are for drivers we don't have; while that may be true, there are several patches that are relevant and as Greg said in the above video, if you think you can sort through what is relevant, good luck. He later says not to try that in a talk he gave at Kernel Recipes 2017, stating "Changes to parts of the kernel that you do not build/run are fine and can cause no problems to your system. To try and filter out only the changes you run will cause a kernel tree that will be impossible to merge correctly with future upstream...". I personally don't think I am better than the professionals that push this stuff for free, thus I add it all. Greg's been sponsored by Google to do this for Google's kernel/common (3.18, 4.4, and 4.9). He's helping the Google Pixel kernel team upstream the kernel for Android O, as evident by the android-msm-marlin-3.18-o-preview-3 branch. Lastly, Greg committed to extending long term support (LTS) to SIX years from his normal two years for certain kernels that Android devices ship with. If this were a pointless process, why would Google and Greg even be investing time and energy into promoting adding upstream and changing their architecture and routine to support this?
Maybe you don't know the difference between upstream and cve. All upstream patches are included Laos kernel. But what i won't merge are cve patches to drivers we don't use. It wouldn't make sense to apply cve for bmhdcd wireless driver because it will never be compiled for our device because we don't have this hardware. And i can say it is not compiled because i write the defconfig.And how could anyone give you an example? Nobody is going to sort 10,000 commits to find, say 20-30% of stuff that might be broken
But you can't go and mark every cve on the tracker as fixed either because there's a lot of stuff that might not be patched
This is just seriously way more messed up
And it's not just one commit, I've seen many of these over time
---------- Post added at 17:38 ---------- Previous post was at 17:34 ----------
"most CVEs do not apply for our device" @Ozzy2403 and how do you know which cve applies and which doesn't? Have you personally read the compile log of the kernel? I guess not
Maybe this is worth a read
https://forum.xda-developers.com/an...rence-how-to-upstream-android-kernel-t3626913
Happy reading
Okay bcm whatever broadcom WiFi driverMaybe you don't know the difference between upstream and cve. All upstream patches are included Laos kernel. But what i won't merge are cve patches to drivers we don't use. It wouldn't make sense to apply cve for bmhdcd wireless driver because it will never be compiled for our device because we don't have this hardware. And i can say it is not compiled because i write the defconfig.
Maybe you need this because of a ****ed defconfig resulting in including drivers shouldn't be present.
This is the behaviour all Laos kernels and also these of reaponsible devs are maintained.
Saying you need to go trough 10.000 patches to see if a cve was edited tells me you don't know my kernel. You don't know the base and what is included.Okay bcm whatever broadcom WiFi driver
Alright we don't use that
What about the numerous patches the sound drivers had to be patched with? You're saying you remember ~60-70 patches from 2015?
Oh wait what about camera driver. You're telling me you picked commits from 2 years ago and it just works without any cve being reverted?
This is nitpicking but you aren't even following Google's kernel hardening docs
There is a lot of other stuff you can't just add without updating. Have you really checked your kernel?
---------- Post added at 17:53 ---------- Previous post was at 17:52 ----------
Just don't want to discuss this further
End of discussion
Not possible if the kernel is rebased every other dayIf you really have something good, contribute on gerrit. If not, shut up please.
I agree with aviraxp. Again it is not fair you come on this thread to promote your rom and to complain on the thread topic. You should be moderated...Not possible if the kernel is rebased every other day
Well it was needed because i did something you maybe can't believe. I went through the old oneplus patches and review every single change in code. It needed some days and also maybe i missed something but i believe it was worth.Not possible if the kernel is rebased every other day
You don't have to defend yourself for the rebase. You're the maintainer of OP2 and you have all right to do anything with the kernel. If someone is not happy with your work, they can simply do their thing.Well it was needed because i did something you maybe can't believe. I went through the old oneplus patches and review every single change in code. It needed some days and also maybe i missed something but i believe it was worth.
Other devs like boeffla always asked me if i'm finished before they rebase in my kernel. So if you would do i might hav
e told you to wait aome days. But now rebase is over for 14.1.
If you really have something good, contribute on gerrit. If not, shut up please.
Then shut up please, this is stretched way too long.Not possible if the kernel is rebased every other day