Commits

Author Commit Message Labels Comments Date
Stephen Smalley
Merge branch 'android-exynos-manta-3.4-lollipop-mr1' into seandroid-exynos-manta-3.4-lollipop-mr1
Branches
seandroid-exynos-manta-3.4-lollipop-mr1
Stephen Smalley
Do not set CONFIG_LSM_MMAP_MIN_ADDR; use the default. This is the address limit for checking SELinux mmap_zero permission, which predated the CAP_SYS_RAWIO check and intentionally uses a fixed limit rather than /proc/sys/vm/mmap_min_addr to avoid being mutable by userspace. When we first enabled this in our kernels, we were conservative and only set it to 4096. However, since Android sets /proc/sys/vm/mmap_min_addr to 32768, we should just use the …
Branches
seandroid-exynos-manta-3.4-lollipop-mr1
TresysMobile
audit: Audit proc/<pid>/cmdline aka proctitle During an audit event, cache and print the value of the process's proctitle value (proc/<pid>/cmdline). This is useful in situations where processes are started via fork'd virtual machines where the comm field is incorrect. Often times, setting the comm field still is insufficient as the comm width is not very wide and most virtual machine "package names" do not fit. Also, during execution, many t…
Branches
seandroid-exynos-manta-3.4-lollipop-mr1
TresysMobile
Re-factor proc_pid_cmdline() to use get_cmdline() helper from mm.h. Acked-by: David Rientjes <rientjes@google.com> Acked-by: Stephen Smalley <sds@tycho.nsa.gov> Acked-by: Richard Guy Briggs <rgb@redhat.com> Change-Id: Ic222c460fc9198dcd878223d312ff17d1a00ff1e Signed-off-by: William Roberts <wroberts@tresys.com> Signed-off-by: Eric Paris <eparis@redhat.com> Signed-off-by: William Roberts <wroberts@tresys.com>
Branches
seandroid-exynos-manta-3.4-lollipop-mr1
TresysMobile
Create utility function for accessing a tasks commandline value Introduce get_cmdline() for retreiving the value of a processes proc/self/cmdline value. Acked-by: David Rientjes <rientjes@google.com> Acked-by: Stephen Smalley <sds@tycho.nsa.gov> Acked-by: Richard Guy Briggs <rgb@redhat.com> Signed-off-by: William Roberts <wroberts@tresys.com> Signed-off-by: Eric Paris <eparis@redhat.com> Change-Id: I8a1f88c0dd61772770ee50e3571df5822edc5234 Signed-off-by: Wi…
Branches
seandroid-exynos-manta-3.4-lollipop-mr1
Stephen Smalley
Enable audit by default. Enable audit by default, including pathname collection. Normally this would be handled from userspace via auditctl, but patch the kernel until audit userspace becomes available.
Branches
seandroid-exynos-manta-3.4-lollipop-mr1
Stephen Smalley
Do not ratelimit audit messages. We want to see them all. Change-Id: I19c29788cc33b0f59e0bdfe04fe67c247239c559
Branches
seandroid-exynos-manta-3.4-lollipop-mr1
Stephen Smalley
Do not set CONFIG_LSM_MMAP_MIN_ADDR; use the default. This is the address limit for checking SELinux mmap_zero permission, which predated the CAP_SYS_RAWIO check and intentionally uses a fixed limit rather than /proc/sys/vm/mmap_min_addr to avoid being mutable by userspace. When we first enabled this in our kernels, we were conservative and only set it to 4096. However, since Android sets /proc/sys/vm/mmap_min_addr to 32768, we should just use the …
Branches
seandroid-exynos-manta-3.4-lollipop-release
TresysMobile
audit: Audit proc/<pid>/cmdline aka proctitle During an audit event, cache and print the value of the process's proctitle value (proc/<pid>/cmdline). This is useful in situations where processes are started via fork'd virtual machines where the comm field is incorrect. Often times, setting the comm field still is insufficient as the comm width is not very wide and most virtual machine "package names" do not fit. Also, during execution, many t…
Branches
seandroid-exynos-manta-3.4-lollipop-release
TresysMobile
Re-factor proc_pid_cmdline() to use get_cmdline() helper from mm.h. Acked-by: David Rientjes <rientjes@google.com> Acked-by: Stephen Smalley <sds@tycho.nsa.gov> Acked-by: Richard Guy Briggs <rgb@redhat.com> Change-Id: Ic222c460fc9198dcd878223d312ff17d1a00ff1e Signed-off-by: William Roberts <wroberts@tresys.com> Signed-off-by: Eric Paris <eparis@redhat.com> Signed-off-by: William Roberts <wroberts@tresys.com>
Branches
seandroid-exynos-manta-3.4-lollipop-release
TresysMobile
Create utility function for accessing a tasks commandline value Introduce get_cmdline() for retreiving the value of a processes proc/self/cmdline value. Acked-by: David Rientjes <rientjes@google.com> Acked-by: Stephen Smalley <sds@tycho.nsa.gov> Acked-by: Richard Guy Briggs <rgb@redhat.com> Signed-off-by: William Roberts <wroberts@tresys.com> Signed-off-by: Eric Paris <eparis@redhat.com> Change-Id: I8a1f88c0dd61772770ee50e3571df5822edc5234 Signed-off-by: Wi…
Branches
seandroid-exynos-manta-3.4-lollipop-release
Stephen Smalley
Enable audit by default. Enable audit by default, including pathname collection. Normally this would be handled from userspace via auditctl, but patch the kernel until audit userspace becomes available.
Branches
seandroid-exynos-manta-3.4-lollipop-release
Stephen Smalley
Do not ratelimit audit messages. We want to see them all. Change-Id: I19c29788cc33b0f59e0bdfe04fe67c247239c559
Branches
seandroid-exynos-manta-3.4-lollipop-release
Mark Salyzyn
invensense: testBatchAndFlush CTS issues Signed-off-by: Mark Salyzyn <salyzyn@google.com> Signed-off-by: Annda Si <asi@invensense.com> Bug: 18958411 Change-Id: Ic6b83875ad80d8b057acb68a5b6984a5f2925854
Tags
android-5.1.1_r0.5
Branches
2 branches
Mark Salyzyn
manta: manta_defconfig: enable CONFIG_CRYPTO_AES_ARM_BS - Set CONFIG_KERNEL_MODE_NEON - Replace CONFIG_CRYPTO_AES_ARM with CONFIG_CRYPTO_AES_ARM_BS Signed-off-by: Mark Salyzyn <salyzyn@google.com> Bug: 18378796 Change-Id: I9ca7b88853b33e11936c45e517d00e30ef61130d
Tags
android-5.1.0_r0.5
Branches
2 branches
Ard Biesheuvel
ARM: pull in <asm/simd.h> from asm-generic Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Branches
2 branches
Ard Biesheuvel
ARM: move VFP init to an earlier boot stage In order to use the NEON unit in the kernel, we should initialize it a bit earlier in the boot process so NEON users that like to do a quick benchmark at load time (like the xor_blocks or RAID-6 code) find the NEON/VFP unit already enabled. Replaced late_initcall() with core_initcall(). Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org> Acked-by: Nicolas Pitre <nico@linaro.org>
Branches
2 branches
Ard Biesheuvel
crypto: create generic version of ablk_helper Create a generic version of ablk_helper so it can be reused by other architectures. Acked-by: Jussi Kivilinna <jussi.kivilinna@iki.fi> Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Branches
2 branches
Ard Biesheuvel
ARM: add support for kernel mode NEON In order to safely support the use of NEON instructions in kernel mode, some precautions need to be taken: - the userland context that may be present in the registers (even if the NEON/VFP is currently disabled) must be stored under the correct task (which may not be 'current' in the UP case), - to avoid having to keep track of additional vfpstates for the kernel side, disallow the use of NE…
Branches
2 branches
Mark Salyzyn
manta: manta_defconfig: enable CONFIG_CRYPTO_AES_ARM - Add CONFIG_CRYPTO_AES_ARM - Correct savedefconfig results -- Add CONFIG_ZBOOT_ROM_TEXT=0x0 -- Add CONFIG_ZBOOT_ROM_BSS=0x0 Change-Id: Ie37a6c1393a9e8be6d60bc00f773c39a72d7a264 Signed-off-by: Mark Salyzyn <salyzyn@google.com>
Branches
2 branches
Jussi Kivilinna
ARM: 8120/1: crypto: sha512: add ARM NEON implementation This patch adds ARM NEON assembly implementation of SHA-512 and SHA-384 algorithms. tcrypt benchmark results on Cortex-A8, sha512-generic vs sha512-neon-asm: block-size bytes/update old-vs-new 16 16 2.99x 64 16 2.67x 64 64 3.00x 256 16 2.64x 256 64 3.06x 256 …
Branches
2 branches
Jussi Kivilinna
ARM: 8119/1: crypto: sha1: add ARM NEON implementation This patch adds ARM NEON assembly implementation of SHA-1 algorithm. tcrypt benchmark results on Cortex-A8, sha1-arm-asm vs sha1-neon-asm: block-size bytes/update old-vs-new 16 16 1.04x 64 16 1.02x 64 64 1.05x 256 16 1.03x 256 64 1.04x 256 256 …
Branches
2 branches
Jussi Kivilinna
ARM: 8118/1: crypto: sha1/make use of common SHA-1 structures Common SHA-1 structures are defined in <crypto/sha.h> for code sharing. This patch changes SHA-1/ARM glue code to use these structures. Change-Id: Iedcc2210314d52d7e13bf5d2b535052a18f04e49 Acked-by: Ard Biesheuvel <ard.biesheuvel@linaro.org> Signed-off-by: Jussi Kivilinna <jussi.kivilinna@iki.fi> Signed-off-by: Russell King <rmk+kernel@arm.linux.org.uk>
Branches
2 branches
Mikulas Patocka
crypto: arm-aes - fix encryption of unaligned data Fix the same alignment bug as in arm64 - we need to pass residue unprocessed bytes as the last argument to blkcipher_walk_done. Change-Id: I8d49b8a190327b46801a3db4884e2b309138525b Signed-off-by: Mikulas Patocka <mpatocka@redhat.com> Cc: stable@vger.kernel.org # 3.13+ Acked-by: Ard Biesheuvel <ard.biesheuvel@linaro.org> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Branches
2 branches
Russell King
CRYPTO: Fix more AES build errors Building a multi-arch kernel results in: arch/arm/crypto/built-in.o: In function `aesbs_xts_decrypt': sha1_glue.c:(.text+0x15c8): undefined reference to `bsaes_xts_decrypt' arch/arm/crypto/built-in.o: In function `aesbs_xts_encrypt': sha1_glue.c:(.text+0x1664): undefined reference to `bsaes_xts_encrypt' arch/arm/crypto/built-in.o: In function `aesbs_ctr_encrypt': sha1_glue.c:(.text+0x184c): undef…
Branches
2 branches
Russell King
ARM: add .gitignore entry for aesbs-core.S This avoids this file being incorrectly added to git. Change-Id: Ibafeec2c5d3ca806737f8d865716d3b2ea419e93 Signed-off-by: Russell King <rmk+kernel@arm.linux.org.uk>
Branches
2 branches
Ard Biesheuvel
ARM: add support for bit sliced AES using NEON instructions Bit sliced AES gives around 45% speedup on Cortex-A15 for encryption and around 25% for decryption. This implementation of the AES algorithm does not rely on any lookup tables so it is believed to be invulnerable to cache timing attacks. This algorithm processes up to 8 blocks in parallel in constant time. This means that it is not usable by chaining modes that are strictly sequential in nature, …
Branches
2 branches
Ard Biesheuvel
ARM: move AES typedefs and function prototypes to separate header Put the struct definitions for AES keys and the asm function prototypes in a separate header and export the asm functions from the module. This allows other drivers to use them directly. Change-Id: I5ce0cf285e2981755adb55b66a846eb738cedd58 Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Branches
2 branches
Ard Biesheuvel
ARM: 7837/3: fix Thumb-2 bug in AES assembler code commit 40190c85f427dcfdbab5dbef4ffd2510d649da1f upstream. Patch 638591c enabled building the AES assembler code in Thumb2 mode. However, this code used arithmetic involving PC rather than adr{l} instructions to generate PC-relative references to the lookup tables, and this needs to take into account the different PC offset when running in Thumb mode. Change-Id: Iadf37cb5db3a826ced7b99e5ee6d29847…
Branches
2 branches
Ard Biesheuvel
ARM: 7723/1: crypto: sha1-armv4-large.S: fix SP handling Make the SHA1 asm code ABI conformant by making sure all stack accesses occur above the stack pointer. Origin: http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=1a9d60d2 Change-Id: I1f17f23f168d40de14b907f470476b7fd9bdd274 Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org> Acked-by: Nicolas Pitre <nico@linaro.org> Cc: stable@vger.kernel.org Signed-off-by: Russell King <rmk+kernel@ar…
Branches
2 branches
  1. Prev
  2. Next