1. seandroid
  2. Untitled project
  3. kernel/exynos

Commits

Author Commit Message Date Builds
Stephen Smalley
Merge branch 'android-exynos-manta-3.4-lollipop-mr1' into seandroid-exynos-manta-3.4-lollipop-mr1
David S. Miller
ipv4: Missing sk_nulls_node_init() in ping_unhash(). If we don't do that, then the poison value is left in the ->pprev backlink. This can cause crashes if we do a disconnect, followed by a connect(). Tested-by: Linus Torvalds <torvalds@linux-foundation.org> Reported-by: Wen Xu <hotdog3645@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net> Bug: 20770158 Change-Id: I944eb20fddea190892c2da681d934801d268096a
Tags
android-5.1.1_r0.13
Branches
2 branches
Stephen Smalley
Merge branch 'android-exynos-manta-3.4-lollipop-mr1' into seandroid-exynos-manta-3.4-lollipop-mr1
Chad Jones
Fix include references for when building with O= Bug: 19661035 Change-Id: I12f40b494609562cd9c8424d8bb50f67af8c7002
Branches
2 branches
Chad Jones
Add build.config Bug: 19661035 Change-Id: I3b61772d9afcda72d507c2fa2068081e5462075d
Branches
2 branches
Stephen Smalley
Do not set CONFIG_LSM_MMAP_MIN_ADDR; use the default. This is the address limit for checking SELinux mmap_zero permission, which predated the CAP_SYS_RAWIO check and intentionally uses a fixed limit rather than /proc/sys/vm/mmap_min_addr to avoid being mutable by userspace. When we first enabled this in our kernels, we were conservative and only set it to 4096. However, since Android sets /proc/sys/vm/mmap_min_addr to 32768, we should just use the …
TresysMobile
audit: Audit proc/<pid>/cmdline aka proctitle During an audit event, cache and print the value of the process's proctitle value (proc/<pid>/cmdline). This is useful in situations where processes are started via fork'd virtual machines where the comm field is incorrect. Often times, setting the comm field still is insufficient as the comm width is not very wide and most virtual machine "package names" do not fit. Also, during execution, many t…
TresysMobile
Re-factor proc_pid_cmdline() to use get_cmdline() helper from mm.h. Acked-by: David Rientjes <rientjes@google.com> Acked-by: Stephen Smalley <sds@tycho.nsa.gov> Acked-by: Richard Guy Briggs <rgb@redhat.com> Change-Id: Ic222c460fc9198dcd878223d312ff17d1a00ff1e Signed-off-by: William Roberts <wroberts@tresys.com> Signed-off-by: Eric Paris <eparis@redhat.com> Signed-off-by: William Roberts <wroberts@tresys.com>
TresysMobile
Create utility function for accessing a tasks commandline value Introduce get_cmdline() for retreiving the value of a processes proc/self/cmdline value. Acked-by: David Rientjes <rientjes@google.com> Acked-by: Stephen Smalley <sds@tycho.nsa.gov> Acked-by: Richard Guy Briggs <rgb@redhat.com> Signed-off-by: William Roberts <wroberts@tresys.com> Signed-off-by: Eric Paris <eparis@redhat.com> Change-Id: I8a1f88c0dd61772770ee50e3571df5822edc5234 Signed-off-by: Wi…
Stephen Smalley
Enable audit by default. Enable audit by default, including pathname collection. Normally this would be handled from userspace via auditctl, but patch the kernel until audit userspace becomes available.
Stephen Smalley
Do not ratelimit audit messages. We want to see them all. Change-Id: I19c29788cc33b0f59e0bdfe04fe67c247239c559
Stephen Smalley
Do not set CONFIG_LSM_MMAP_MIN_ADDR; use the default. This is the address limit for checking SELinux mmap_zero permission, which predated the CAP_SYS_RAWIO check and intentionally uses a fixed limit rather than /proc/sys/vm/mmap_min_addr to avoid being mutable by userspace. When we first enabled this in our kernels, we were conservative and only set it to 4096. However, since Android sets /proc/sys/vm/mmap_min_addr to 32768, we should just use the …
TresysMobile
audit: Audit proc/<pid>/cmdline aka proctitle During an audit event, cache and print the value of the process's proctitle value (proc/<pid>/cmdline). This is useful in situations where processes are started via fork'd virtual machines where the comm field is incorrect. Often times, setting the comm field still is insufficient as the comm width is not very wide and most virtual machine "package names" do not fit. Also, during execution, many t…
TresysMobile
Re-factor proc_pid_cmdline() to use get_cmdline() helper from mm.h. Acked-by: David Rientjes <rientjes@google.com> Acked-by: Stephen Smalley <sds@tycho.nsa.gov> Acked-by: Richard Guy Briggs <rgb@redhat.com> Change-Id: Ic222c460fc9198dcd878223d312ff17d1a00ff1e Signed-off-by: William Roberts <wroberts@tresys.com> Signed-off-by: Eric Paris <eparis@redhat.com> Signed-off-by: William Roberts <wroberts@tresys.com>
TresysMobile
Create utility function for accessing a tasks commandline value Introduce get_cmdline() for retreiving the value of a processes proc/self/cmdline value. Acked-by: David Rientjes <rientjes@google.com> Acked-by: Stephen Smalley <sds@tycho.nsa.gov> Acked-by: Richard Guy Briggs <rgb@redhat.com> Signed-off-by: William Roberts <wroberts@tresys.com> Signed-off-by: Eric Paris <eparis@redhat.com> Change-Id: I8a1f88c0dd61772770ee50e3571df5822edc5234 Signed-off-by: Wi…
Stephen Smalley
Enable audit by default. Enable audit by default, including pathname collection. Normally this would be handled from userspace via auditctl, but patch the kernel until audit userspace becomes available.
Stephen Smalley
Do not ratelimit audit messages. We want to see them all. Change-Id: I19c29788cc33b0f59e0bdfe04fe67c247239c559
Mark Salyzyn
invensense: testBatchAndFlush CTS issues Signed-off-by: Mark Salyzyn <salyzyn@google.com> Signed-off-by: Annda Si <asi@invensense.com> Bug: 18958411 Change-Id: Ic6b83875ad80d8b057acb68a5b6984a5f2925854
Tags
android-5.1.1_r0.5
Branches
2 branches
Mark Salyzyn
manta: manta_defconfig: enable CONFIG_CRYPTO_AES_ARM_BS - Set CONFIG_KERNEL_MODE_NEON - Replace CONFIG_CRYPTO_AES_ARM with CONFIG_CRYPTO_AES_ARM_BS Signed-off-by: Mark Salyzyn <salyzyn@google.com> Bug: 18378796 Change-Id: I9ca7b88853b33e11936c45e517d00e30ef61130d
Tags
android-5.1.0_r0.5
Branches
2 branches
Ard Biesheuvel
ARM: pull in <asm/simd.h> from asm-generic Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Branches
2 branches
Ard Biesheuvel
ARM: move VFP init to an earlier boot stage In order to use the NEON unit in the kernel, we should initialize it a bit earlier in the boot process so NEON users that like to do a quick benchmark at load time (like the xor_blocks or RAID-6 code) find the NEON/VFP unit already enabled. Replaced late_initcall() with core_initcall(). Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org> Acked-by: Nicolas Pitre <nico@linaro.org>
Branches
2 branches
Ard Biesheuvel
crypto: create generic version of ablk_helper Create a generic version of ablk_helper so it can be reused by other architectures. Acked-by: Jussi Kivilinna <jussi.kivilinna@iki.fi> Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Branches
2 branches
Ard Biesheuvel
ARM: add support for kernel mode NEON In order to safely support the use of NEON instructions in kernel mode, some precautions need to be taken: - the userland context that may be present in the registers (even if the NEON/VFP is currently disabled) must be stored under the correct task (which may not be 'current' in the UP case), - to avoid having to keep track of additional vfpstates for the kernel side, disallow the use of NE…
Branches
2 branches
Mark Salyzyn
manta: manta_defconfig: enable CONFIG_CRYPTO_AES_ARM - Add CONFIG_CRYPTO_AES_ARM - Correct savedefconfig results -- Add CONFIG_ZBOOT_ROM_TEXT=0x0 -- Add CONFIG_ZBOOT_ROM_BSS=0x0 Change-Id: Ie37a6c1393a9e8be6d60bc00f773c39a72d7a264 Signed-off-by: Mark Salyzyn <salyzyn@google.com>
Branches
2 branches
Jussi Kivilinna
ARM: 8120/1: crypto: sha512: add ARM NEON implementation This patch adds ARM NEON assembly implementation of SHA-512 and SHA-384 algorithms. tcrypt benchmark results on Cortex-A8, sha512-generic vs sha512-neon-asm: block-size bytes/update old-vs-new 16 16 2.99x 64 16 2.67x 64 64 3.00x 256 16 2.64x 256 64 3.06x 256 …
Branches
2 branches
Jussi Kivilinna
ARM: 8119/1: crypto: sha1: add ARM NEON implementation This patch adds ARM NEON assembly implementation of SHA-1 algorithm. tcrypt benchmark results on Cortex-A8, sha1-arm-asm vs sha1-neon-asm: block-size bytes/update old-vs-new 16 16 1.04x 64 16 1.02x 64 64 1.05x 256 16 1.03x 256 64 1.04x 256 256 …
Branches
2 branches
Jussi Kivilinna
ARM: 8118/1: crypto: sha1/make use of common SHA-1 structures Common SHA-1 structures are defined in <crypto/sha.h> for code sharing. This patch changes SHA-1/ARM glue code to use these structures. Change-Id: Iedcc2210314d52d7e13bf5d2b535052a18f04e49 Acked-by: Ard Biesheuvel <ard.biesheuvel@linaro.org> Signed-off-by: Jussi Kivilinna <jussi.kivilinna@iki.fi> Signed-off-by: Russell King <rmk+kernel@arm.linux.org.uk>
Branches
2 branches
Mikulas Patocka
crypto: arm-aes - fix encryption of unaligned data Fix the same alignment bug as in arm64 - we need to pass residue unprocessed bytes as the last argument to blkcipher_walk_done. Change-Id: I8d49b8a190327b46801a3db4884e2b309138525b Signed-off-by: Mikulas Patocka <mpatocka@redhat.com> Cc: stable@vger.kernel.org # 3.13+ Acked-by: Ard Biesheuvel <ard.biesheuvel@linaro.org> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Branches
2 branches
Russell King
CRYPTO: Fix more AES build errors Building a multi-arch kernel results in: arch/arm/crypto/built-in.o: In function `aesbs_xts_decrypt': sha1_glue.c:(.text+0x15c8): undefined reference to `bsaes_xts_decrypt' arch/arm/crypto/built-in.o: In function `aesbs_xts_encrypt': sha1_glue.c:(.text+0x1664): undefined reference to `bsaes_xts_encrypt' arch/arm/crypto/built-in.o: In function `aesbs_ctr_encrypt': sha1_glue.c:(.text+0x184c): undef…
Branches
2 branches
Russell King
ARM: add .gitignore entry for aesbs-core.S This avoids this file being incorrectly added to git. Change-Id: Ibafeec2c5d3ca806737f8d865716d3b2ea419e93 Signed-off-by: Russell King <rmk+kernel@arm.linux.org.uk>
Branches
2 branches
  1. Prev
  2. Next