Home
last modified time | relevance | path

Searched refs:kernel (Results 1 – 25 of 73) sorted by relevance

123

/packages/modules/Wifi/service/
Dwifi.rc24 # Below are for kernel tracing related stuff.
30 mkdir /sys/kernel/debug/tracing/instances/wifi 711
31 restorecon_recursive /sys/kernel/debug/tracing/instances/wifi
32 write /sys/kernel/debug/tracing/instances/wifi/tracing_on 0
33 write /sys/kernel/debug/tracing/instances/wifi/buffer_size_kb 1
34 write /sys/kernel/debug/tracing/instances/wifi/trace_options disable_on_free
36 mkdir /sys/kernel/tracing/instances/wifi 711
37 restorecon_recursive /sys/kernel/tracing/instances/wifi
38 write /sys/kernel/tracing/instances/wifi/tracing_on 0
39 write /sys/kernel/tracing/instances/wifi/buffer_size_kb 1
[all …]
/packages/modules/Virtualization/pvmfw/avb/tests/
Dapi_test.rs231 let mut kernel = load_latest_signed_kernel()?; in tampered_kernel_fails_verification() localVariable
232 kernel[1] = !kernel[1]; // Flip the bits in tampered_kernel_fails_verification()
235 &kernel, in tampered_kernel_fails_verification()
245 let mut kernel = load_latest_signed_kernel()?; in kernel_footer_with_vbmeta_offset_overwritten_fails_verification() localVariable
246 let total_len = kernel.len() as u64; in kernel_footer_with_vbmeta_offset_overwritten_fails_verification()
247 let footer = extract_avb_footer(&kernel)?; in kernel_footer_with_vbmeta_offset_overwritten_fails_verification()
258 let footer_start = kernel.len() - size_of::<AvbFooter>(); in kernel_footer_with_vbmeta_offset_overwritten_fails_verification()
264 kernel[vbmeta_offset_start..(vbmeta_offset_start + size_of::<u64>())] in kernel_footer_with_vbmeta_offset_overwritten_fails_verification()
268 let footer = extract_avb_footer(&kernel)?; in kernel_footer_with_vbmeta_offset_overwritten_fails_verification()
273 &kernel, in kernel_footer_with_vbmeta_offset_overwritten_fails_verification()
[all …]
Dutils.rs41 kernel: &[u8], in assert_payload_verification_with_initrd_fails()
46 assert_payload_verification_fails(kernel, Some(initrd), trusted_public_key, expected_error) in assert_payload_verification_with_initrd_fails()
50 kernel: &[u8], in assert_payload_verification_fails()
55 assert_eq!(expected_error, verify_payload(kernel, initrd, trusted_public_key).unwrap_err()); in assert_payload_verification_fails()
75 pub fn extract_avb_footer(kernel: &[u8]) -> Result<AvbFooter> { in extract_avb_footer()
76 let footer_start = kernel.len() - size_of::<AvbFooter>(); in extract_avb_footer()
79 transmute::<[u8; size_of::<AvbFooter>()], AvbFooter>(kernel[footer_start..].try_into()?) in extract_avb_footer()
88 pub fn extract_vbmeta_header(kernel: &[u8], footer: &AvbFooter) -> Result<AvbVBMetaImageHeader> { in extract_vbmeta_header()
91 let vbmeta_src = &kernel[vbmeta_offset..(vbmeta_offset + vbmeta_size)]; in extract_vbmeta_header()
108 let kernel = load_latest_signed_kernel()?; in assert_latest_payload_verification_passes() localVariable
[all …]
/packages/modules/Virtualization/microdroid/kernel/
DREADME.md1 # Microdroid kernel
3 This directory contains prebuilt images of the Linux kernel that is used in
4 Microdroid. The kernel is built from the same source tree as Generic Kernel
6 turned off to make the kernel fast & slim.
13 repo init -u https://android.googlesource.com/kernel/manifest -b common-android14-6.1
32 [`--config=fast`](https://android.googlesource.com/kernel/build/+/refs/heads/main/kleaf/docs/fast.m…
38 ### Change the kernel configs
50 ## How to update Microdroid kernel prebuilts
54 Copy the built kernel image to the Android source tree directly, and build the virt APEX.
58 cp out/dist/Image <android_checkout>/packages/modules/Virtualization/microdroid/kernel/arm64/kernel
[all …]
DAndroid.bp56 srcs: ["android14-6.1/arm64/kernel-6.1"],
59 srcs: ["android15-6.1/arm64/kernel-6.1"],
62 srcs: ["android15-6.6/arm64/kernel-6.6"],
65 // RELEASE_AVF_MICRODROID_KERNEL_VERSION fallback to the kernel we
69 srcs: ["android14-6.1/arm64/kernel-6.1"],
81 srcs: ["android14-6.1/x86_64/kernel-6.1"],
84 srcs: ["android15-6.1/x86_64/kernel-6.1"],
87 srcs: ["android15-6.6/x86_64/kernel-6.6"],
90 // RELEASE_AVF_MICRODROID_KERNEL_VERSION fallback to the kernel we
94 srcs: ["android14-6.1/x86_64/kernel-6.1"],
/packages/modules/Virtualization/docs/debug/
Dgdb_kernel.md5 Starting with Android U it is possible to attach a gdb to the guest kernel, when
29 The [kernel documentation](
30 https://www.kernel.org/doc/html/latest/dev-tools/gdb-kernel-debugging.html) has
31 some general techniques on how to debug kernel with gdb.
35 If you are debugging Microdroid kernel that you have built [locally](
36 ../../microdroid/kernel/README.md), then look for `out/dist/vmlinux` in your
37 kernel repository.
39 If you are debugging Microdroid kernel bundled with the `com.android.virt` APEX,
40 then you need to obtain the build ID of this kernel. You can do this by
42 `packages/modules/Virtualization/microdroid/kernel/arm64` or
[all …]
Dramdump.md3 A debuggable Microdroid VM creates a RAM dump of itself when the kernel panics. This
8 RAM dump is created automatically when there's a kernel panic. However, for
18 crashdump kernel is executed.
32 [ 14.998693][ T148] Starting crashdump kernel...
47 reboot: Restarting system with command 'kernel panic'
82 You also need the image of the kernel binary with debuggin enabled. The kernel
83 binary should be the same as the actual kernel that you used in the Microdroid
84 VM that crashed. To identify which kernel it was, look for the kernel version
94 of the kernel.
99 DON'T forget to replace `9013362` with the actual build ID of the kernel you used.
[all …]
Dtracing.md5 Starting with android14-5.15 kernel it is possible to get traces from the hypervisor.
9 The user space hypervisor tracing interface is located either at /sys/kernel/tracing/hyp or at
10 /sys/kernel/debug/tracing/hyp. On the Android phones it will usually be /sys/kernel/tracing/hyp,
11 while on QEMU it will be /sys/kernel/debug/tracing/hyp.
/packages/modules/Virtualization/pvmfw/avb/src/
Dverify.rs171 kernel: &'a HashDescriptor<'a>, field
180 let mut kernel = None; in get() localVariable
194 PartitionName::Kernel => &mut kernel, in get()
208 kernel: kernel.ok_or(DescriptorError::InvalidContents)?, in get()
250 kernel: &[u8], in verify_payload()
254 let payload = Payload::new(kernel, initrd, trusted_public_key); in verify_payload()
274 kernel_digest: copy_digest(hash_descriptors.kernel)?, in verify_payload()
294 kernel_digest: copy_digest(hash_descriptors.kernel)?, in verify_payload()
Dops.rs25 kernel: &'a [u8], field
32 kernel: &'a [u8], in new()
36 Self { kernel, initrd, trusted_public_key } in new()
41 PartitionName::Kernel => Ok(self.kernel), in get_partition()
/packages/modules/Virtualization/pvmfw/src/
Dentry.rs81 kernel: &'a [u8], field
88 kernel: usize, in new()
153 MEMORY.lock().as_mut().unwrap().alloc(kernel, kernel_size).map_err(|e| { in new()
162 let kernel = kernel_range.start as *const u8; in new() localVariable
164 let kernel = unsafe { slice::from_raw_parts(kernel, kernel_range.len()) }; in new() localVariable
181 Ok(Self { fdt, kernel, ramdisk }) in new()
242 slices.kernel, in main_wrapper()
268 Ok((slices.kernel.as_ptr() as usize, next_bcc)) in main_wrapper()
/packages/modules/Virtualization/service_vm/requests/src/
Dclient_vm.rs210 kernel: &DiceChainEntryPayload, in validate_kernel_authority_hash()
213 if expected_kernel_authority_hash(service_vm_entry)? == kernel.authority_hash { in validate_kernel_authority_hash()
224 let kernel = dice_chain.microdroid_kernel(); in validate_kernel_code_hash() localVariable
225 if matches_any_kernel_code_hash(&kernel.code_hash, /* is_debug= */ false)? { in validate_kernel_code_hash()
228 if matches_any_kernel_code_hash(&kernel.code_hash, /* is_debug= */ true)? { in validate_kernel_code_hash()
242 code_hash[0..KERNEL_HASH_SIZE].copy_from_slice(&os_hash.kernel); in matches_any_kernel_code_hash()
/packages/modules/Virtualization/libs/vmconfig/src/
Dlib.rs42 pub kernel: Option<PathBuf>, field
76 if self.bootloader.is_none() && self.kernel.is_none() { in validate()
79 if self.bootloader.is_some() && (self.kernel.is_some() || self.initrd.is_some()) { in validate()
113 kernel: maybe_open_parcel_file(&self.kernel, false)?, in to_parcelable()
/packages/modules/Virtualization/docs/
Dcustom_vm.md13 "kernel": "/data/local/tmp/kernel",
19 adb push <kernel> /data/local/tmp/kernel
138 Optionally, if you have touched the kernel source code (which is under
139 ~/chromiumos/src/third_party/kernel/v5.15), you have to tell the cros sdk that
144 (cr) cros workon -b ferrochrome start chromeos-kernel-5_15
168 * The kernel: ~/chromiumos/src/build/images/ferrochrome/latest/boot_images/vmlinuz
172 Push the kernel and the main image to the Android device.
176 $ adb push ~/chromiumos/out/build/ferrochrome/boot/vmlinuz /data/local/tmp/kernel
185 "kernel": "/data/local/tmp/kernel",
Dhugepages.md4 Linux feature which allows the kernel to allocate, when possible, a huge-page
23 /sys/kernel/mm/transparent_hugepages/shmem_enabled
33 /sys/kernel/mm/transparent_hugepages/defrag
40 [admin guide](https://docs.kernel.org/admin-guide/mm/transhuge.html).
/packages/modules/Virtualization/pvmfw/avb/fuzz/
Dwithout_footer_verify_fuzzer.rs21 fuzz_target!(|kernel: &[u8]| {
27 let _ = verify_payload(kernel, /*initrd=*/ None, &[0u8; 64]);
/packages/services/Car/car_product/sepolicy/private/
Dproperty.te1 # Only kernel, init, and vendor init can write to car_boot_prop properties
2 neverallow { domain -kernel -init -vendor_init } car_boot_prop:property_service set;
/packages/modules/Virtualization/microdroid/kdump/kernel/
DAndroid.bp18 src: "arm64/kernel-5.15",
21 src: "x86_64/kernel-5.15",
/packages/modules/Virtualization/microdroid/
Dbootconfig.normal5 kernel.printk.devkmsg=off
6 kernel.console=ttynull
Dbootconfig.debuggable5 kernel.printk.devkmsg=on
6 kernel.console=hvc0
Dinit.rc15 # Android doesn't need kernel module autoloading, and it causes SELinux
18 write /proc/sys/kernel/modprobe \n
66 mount tracefs tracefs /sys/kernel/tracing gid=3012
126 chmod 0755 /sys/kernel/tracing
127 chmod 0755 /sys/kernel/debug/tracing
Dextract_microdroid_kernel_hashes.py28 num_kernel_images = len(args.kernel)
42 for kernel_image_path in args.kernel:
/packages/modules/Virtualization/pvmfw/
DREADME.md38 Otherwise, it hands over the pVM to the guest kernel by jumping to its first
70 image (recorded in the `kernel_size` field), as it already does for the kernel
291 [dice-dt]: https://www.kernel.org/doc/Documentation/devicetree/bindings/reserved-memory/google%2Cop…
358 - the kernel in the `/config` DT node _e.g._
363 kernel-address = <0x80200000>;
364 kernel-size = <0x1000000>;
380 [Linux ABI]: https://www.kernel.org/doc/Documentation/arm64/booting.txt
384 After verifying the guest kernel, pvmfw boots it using the Linux ABI described
414 pvmfw verifies the guest kernel image (loaded by the VMM) by re-using tools and
416 kernel region (see `/config/kernel-{address,size}` described above) to contain
[all …]
/packages/modules/Gki/libkver/
DAndroid.bp15 // A library to parse kernel versions, including kernel releases and KMI versions.
/packages/modules/Virtualization/
DREADME.md20 * [Microdroid kernel](microdroid/kernel/README.md)

123