/packages/modules/Wifi/service/ |
D | wifi.rc | 24 # Below are for kernel tracing related stuff. 30 mkdir /sys/kernel/debug/tracing/instances/wifi 711 31 restorecon_recursive /sys/kernel/debug/tracing/instances/wifi 32 write /sys/kernel/debug/tracing/instances/wifi/tracing_on 0 33 write /sys/kernel/debug/tracing/instances/wifi/buffer_size_kb 1 34 write /sys/kernel/debug/tracing/instances/wifi/trace_options disable_on_free 36 mkdir /sys/kernel/tracing/instances/wifi 711 37 restorecon_recursive /sys/kernel/tracing/instances/wifi 38 write /sys/kernel/tracing/instances/wifi/tracing_on 0 39 write /sys/kernel/tracing/instances/wifi/buffer_size_kb 1 [all …]
|
/packages/modules/Virtualization/pvmfw/avb/tests/ |
D | api_test.rs | 231 let mut kernel = load_latest_signed_kernel()?; in tampered_kernel_fails_verification() localVariable 232 kernel[1] = !kernel[1]; // Flip the bits in tampered_kernel_fails_verification() 235 &kernel, in tampered_kernel_fails_verification() 245 let mut kernel = load_latest_signed_kernel()?; in kernel_footer_with_vbmeta_offset_overwritten_fails_verification() localVariable 246 let total_len = kernel.len() as u64; in kernel_footer_with_vbmeta_offset_overwritten_fails_verification() 247 let footer = extract_avb_footer(&kernel)?; in kernel_footer_with_vbmeta_offset_overwritten_fails_verification() 258 let footer_start = kernel.len() - size_of::<AvbFooter>(); in kernel_footer_with_vbmeta_offset_overwritten_fails_verification() 264 kernel[vbmeta_offset_start..(vbmeta_offset_start + size_of::<u64>())] in kernel_footer_with_vbmeta_offset_overwritten_fails_verification() 268 let footer = extract_avb_footer(&kernel)?; in kernel_footer_with_vbmeta_offset_overwritten_fails_verification() 273 &kernel, in kernel_footer_with_vbmeta_offset_overwritten_fails_verification() [all …]
|
D | utils.rs | 41 kernel: &[u8], in assert_payload_verification_with_initrd_fails() 46 assert_payload_verification_fails(kernel, Some(initrd), trusted_public_key, expected_error) in assert_payload_verification_with_initrd_fails() 50 kernel: &[u8], in assert_payload_verification_fails() 55 assert_eq!(expected_error, verify_payload(kernel, initrd, trusted_public_key).unwrap_err()); in assert_payload_verification_fails() 75 pub fn extract_avb_footer(kernel: &[u8]) -> Result<AvbFooter> { in extract_avb_footer() 76 let footer_start = kernel.len() - size_of::<AvbFooter>(); in extract_avb_footer() 79 transmute::<[u8; size_of::<AvbFooter>()], AvbFooter>(kernel[footer_start..].try_into()?) in extract_avb_footer() 88 pub fn extract_vbmeta_header(kernel: &[u8], footer: &AvbFooter) -> Result<AvbVBMetaImageHeader> { in extract_vbmeta_header() 91 let vbmeta_src = &kernel[vbmeta_offset..(vbmeta_offset + vbmeta_size)]; in extract_vbmeta_header() 108 let kernel = load_latest_signed_kernel()?; in assert_latest_payload_verification_passes() localVariable [all …]
|
/packages/modules/Virtualization/microdroid/kernel/ |
D | README.md | 1 # Microdroid kernel 3 This directory contains prebuilt images of the Linux kernel that is used in 4 Microdroid. The kernel is built from the same source tree as Generic Kernel 6 turned off to make the kernel fast & slim. 13 repo init -u https://android.googlesource.com/kernel/manifest -b common-android14-6.1 32 [`--config=fast`](https://android.googlesource.com/kernel/build/+/refs/heads/main/kleaf/docs/fast.m… 38 ### Change the kernel configs 50 ## How to update Microdroid kernel prebuilts 54 Copy the built kernel image to the Android source tree directly, and build the virt APEX. 58 cp out/dist/Image <android_checkout>/packages/modules/Virtualization/microdroid/kernel/arm64/kernel… [all …]
|
D | Android.bp | 56 srcs: ["android14-6.1/arm64/kernel-6.1"], 59 srcs: ["android15-6.1/arm64/kernel-6.1"], 62 srcs: ["android15-6.6/arm64/kernel-6.6"], 65 // RELEASE_AVF_MICRODROID_KERNEL_VERSION fallback to the kernel we 69 srcs: ["android14-6.1/arm64/kernel-6.1"], 81 srcs: ["android14-6.1/x86_64/kernel-6.1"], 84 srcs: ["android15-6.1/x86_64/kernel-6.1"], 87 srcs: ["android15-6.6/x86_64/kernel-6.6"], 90 // RELEASE_AVF_MICRODROID_KERNEL_VERSION fallback to the kernel we 94 srcs: ["android14-6.1/x86_64/kernel-6.1"],
|
/packages/modules/Virtualization/docs/debug/ |
D | gdb_kernel.md | 5 Starting with Android U it is possible to attach a gdb to the guest kernel, when 29 The [kernel documentation]( 30 https://www.kernel.org/doc/html/latest/dev-tools/gdb-kernel-debugging.html) has 31 some general techniques on how to debug kernel with gdb. 35 If you are debugging Microdroid kernel that you have built [locally]( 36 ../../microdroid/kernel/README.md), then look for `out/dist/vmlinux` in your 37 kernel repository. 39 If you are debugging Microdroid kernel bundled with the `com.android.virt` APEX, 40 then you need to obtain the build ID of this kernel. You can do this by 42 `packages/modules/Virtualization/microdroid/kernel/arm64` or [all …]
|
D | ramdump.md | 3 A debuggable Microdroid VM creates a RAM dump of itself when the kernel panics. This 8 RAM dump is created automatically when there's a kernel panic. However, for 18 crashdump kernel is executed. 32 [ 14.998693][ T148] Starting crashdump kernel... 47 reboot: Restarting system with command 'kernel panic' 82 You also need the image of the kernel binary with debuggin enabled. The kernel 83 binary should be the same as the actual kernel that you used in the Microdroid 84 VM that crashed. To identify which kernel it was, look for the kernel version 94 of the kernel. 99 DON'T forget to replace `9013362` with the actual build ID of the kernel you used. [all …]
|
D | tracing.md | 5 Starting with android14-5.15 kernel it is possible to get traces from the hypervisor. 9 The user space hypervisor tracing interface is located either at /sys/kernel/tracing/hyp or at 10 /sys/kernel/debug/tracing/hyp. On the Android phones it will usually be /sys/kernel/tracing/hyp, 11 while on QEMU it will be /sys/kernel/debug/tracing/hyp.
|
/packages/modules/Virtualization/pvmfw/avb/src/ |
D | verify.rs | 171 kernel: &'a HashDescriptor<'a>, field 180 let mut kernel = None; in get() localVariable 194 PartitionName::Kernel => &mut kernel, in get() 208 kernel: kernel.ok_or(DescriptorError::InvalidContents)?, in get() 250 kernel: &[u8], in verify_payload() 254 let payload = Payload::new(kernel, initrd, trusted_public_key); in verify_payload() 274 kernel_digest: copy_digest(hash_descriptors.kernel)?, in verify_payload() 294 kernel_digest: copy_digest(hash_descriptors.kernel)?, in verify_payload()
|
D | ops.rs | 25 kernel: &'a [u8], field 32 kernel: &'a [u8], in new() 36 Self { kernel, initrd, trusted_public_key } in new() 41 PartitionName::Kernel => Ok(self.kernel), in get_partition()
|
/packages/modules/Virtualization/pvmfw/src/ |
D | entry.rs | 81 kernel: &'a [u8], field 88 kernel: usize, in new() 153 MEMORY.lock().as_mut().unwrap().alloc(kernel, kernel_size).map_err(|e| { in new() 162 let kernel = kernel_range.start as *const u8; in new() localVariable 164 let kernel = unsafe { slice::from_raw_parts(kernel, kernel_range.len()) }; in new() localVariable 181 Ok(Self { fdt, kernel, ramdisk }) in new() 242 slices.kernel, in main_wrapper() 268 Ok((slices.kernel.as_ptr() as usize, next_bcc)) in main_wrapper()
|
/packages/modules/Virtualization/service_vm/requests/src/ |
D | client_vm.rs | 210 kernel: &DiceChainEntryPayload, in validate_kernel_authority_hash() 213 if expected_kernel_authority_hash(service_vm_entry)? == kernel.authority_hash { in validate_kernel_authority_hash() 224 let kernel = dice_chain.microdroid_kernel(); in validate_kernel_code_hash() localVariable 225 if matches_any_kernel_code_hash(&kernel.code_hash, /* is_debug= */ false)? { in validate_kernel_code_hash() 228 if matches_any_kernel_code_hash(&kernel.code_hash, /* is_debug= */ true)? { in validate_kernel_code_hash() 242 code_hash[0..KERNEL_HASH_SIZE].copy_from_slice(&os_hash.kernel); in matches_any_kernel_code_hash()
|
/packages/modules/Virtualization/libs/vmconfig/src/ |
D | lib.rs | 42 pub kernel: Option<PathBuf>, field 76 if self.bootloader.is_none() && self.kernel.is_none() { in validate() 79 if self.bootloader.is_some() && (self.kernel.is_some() || self.initrd.is_some()) { in validate() 113 kernel: maybe_open_parcel_file(&self.kernel, false)?, in to_parcelable()
|
/packages/modules/Virtualization/docs/ |
D | custom_vm.md | 13 "kernel": "/data/local/tmp/kernel", 19 adb push <kernel> /data/local/tmp/kernel 138 Optionally, if you have touched the kernel source code (which is under 139 ~/chromiumos/src/third_party/kernel/v5.15), you have to tell the cros sdk that 144 (cr) cros workon -b ferrochrome start chromeos-kernel-5_15 168 * The kernel: ~/chromiumos/src/build/images/ferrochrome/latest/boot_images/vmlinuz 172 Push the kernel and the main image to the Android device. 176 $ adb push ~/chromiumos/out/build/ferrochrome/boot/vmlinuz /data/local/tmp/kernel 185 "kernel": "/data/local/tmp/kernel",
|
D | hugepages.md | 4 Linux feature which allows the kernel to allocate, when possible, a huge-page 23 /sys/kernel/mm/transparent_hugepages/shmem_enabled 33 /sys/kernel/mm/transparent_hugepages/defrag 40 [admin guide](https://docs.kernel.org/admin-guide/mm/transhuge.html).
|
/packages/modules/Virtualization/pvmfw/avb/fuzz/ |
D | without_footer_verify_fuzzer.rs | 21 fuzz_target!(|kernel: &[u8]| { 27 let _ = verify_payload(kernel, /*initrd=*/ None, &[0u8; 64]);
|
/packages/services/Car/car_product/sepolicy/private/ |
D | property.te | 1 # Only kernel, init, and vendor init can write to car_boot_prop properties 2 neverallow { domain -kernel -init -vendor_init } car_boot_prop:property_service set;
|
/packages/modules/Virtualization/microdroid/kdump/kernel/ |
D | Android.bp | 18 src: "arm64/kernel-5.15", 21 src: "x86_64/kernel-5.15",
|
/packages/modules/Virtualization/microdroid/ |
D | bootconfig.normal | 5 kernel.printk.devkmsg=off 6 kernel.console=ttynull
|
D | bootconfig.debuggable | 5 kernel.printk.devkmsg=on 6 kernel.console=hvc0
|
D | init.rc | 15 # Android doesn't need kernel module autoloading, and it causes SELinux 18 write /proc/sys/kernel/modprobe \n 66 mount tracefs tracefs /sys/kernel/tracing gid=3012 126 chmod 0755 /sys/kernel/tracing 127 chmod 0755 /sys/kernel/debug/tracing
|
D | extract_microdroid_kernel_hashes.py | 28 num_kernel_images = len(args.kernel) 42 for kernel_image_path in args.kernel:
|
/packages/modules/Virtualization/pvmfw/ |
D | README.md | 38 Otherwise, it hands over the pVM to the guest kernel by jumping to its first 70 image (recorded in the `kernel_size` field), as it already does for the kernel 291 [dice-dt]: https://www.kernel.org/doc/Documentation/devicetree/bindings/reserved-memory/google%2Cop… 358 - the kernel in the `/config` DT node _e.g._ 363 kernel-address = <0x80200000>; 364 kernel-size = <0x1000000>; 380 [Linux ABI]: https://www.kernel.org/doc/Documentation/arm64/booting.txt 384 After verifying the guest kernel, pvmfw boots it using the Linux ABI described 414 pvmfw verifies the guest kernel image (loaded by the VMM) by re-using tools and 416 kernel region (see `/config/kernel-{address,size}` described above) to contain [all …]
|
/packages/modules/Gki/libkver/ |
D | Android.bp | 15 // A library to parse kernel versions, including kernel releases and KMI versions.
|
/packages/modules/Virtualization/ |
D | README.md | 20 * [Microdroid kernel](microdroid/kernel/README.md)
|