*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
#
|
|
|
|
# Automatically generated file; DO NOT EDIT.
|
|
|
|
# Linux/arm64 3.10.84 Kernel Configuration
|
|
|
|
#
|
|
|
|
CONFIG_ARM64=y
|
|
|
|
CONFIG_64BIT=y
|
|
|
|
CONFIG_ARCH_PHYS_ADDR_T_64BIT=y
|
|
|
|
CONFIG_MMU=y
|
|
|
|
CONFIG_NO_IOPORT_MAP=y
|
|
|
|
CONFIG_ARCH_MMAP_RND_BITS_MIN=18
|
|
|
|
CONFIG_ARCH_MMAP_RND_BITS_MAX=24
|
|
|
|
CONFIG_ARCH_MMAP_RND_COMPAT_BITS_MIN=11
|
|
|
|
CONFIG_ARCH_MMAP_RND_COMPAT_BITS_MAX=16
|
|
|
|
CONFIG_ILLEGAL_POINTER_VALUE=0xdead000000000000
|
|
|
|
CONFIG_STACKTRACE_SUPPORT=y
|
|
|
|
CONFIG_LOCKDEP_SUPPORT=y
|
|
|
|
CONFIG_TRACE_IRQFLAGS_SUPPORT=y
|
|
|
|
CONFIG_RWSEM_XCHGADD_ALGORITHM=y
|
|
|
|
CONFIG_GENERIC_BUG=y
|
|
|
|
CONFIG_GENERIC_HWEIGHT=y
|
|
|
|
CONFIG_GENERIC_CSUM=y
|
|
|
|
CONFIG_GENERIC_CALIBRATE_DELAY=y
|
|
|
|
CONFIG_ZONE_DMA=y
|
|
|
|
CONFIG_ARCH_DMA_ADDR_T_64BIT=y
|
|
|
|
CONFIG_NEED_DMA_MAP_STATE=y
|
|
|
|
CONFIG_NEED_SG_DMA_LENGTH=y
|
|
|
|
CONFIG_ARM64_DMA_USE_IOMMU=y
|
|
|
|
CONFIG_ARM64_DMA_IOMMU_ALIGNMENT=8
|
|
|
|
CONFIG_SWIOTLB=y
|
|
|
|
CONFIG_IOMMU_HELPER=y
|
|
|
|
CONFIG_KERNEL_MODE_NEON=y
|
|
|
|
CONFIG_ARCH_HAS_CPUFREQ=y
|
|
|
|
CONFIG_FIX_EARLYCON_MEM=y
|
|
|
|
CONFIG_DEFCONFIG_LIST="/lib/modules/$UNAME_RELEASE/.config"
|
|
|
|
CONFIG_IRQ_WORK=y
|
|
|
|
CONFIG_BUILDTIME_EXTABLE_SORT=y
|
2020-05-31 10:32:05 +00:00
|
|
|
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
#
|
|
|
|
# General setup
|
|
|
|
#
|
|
|
|
CONFIG_INIT_ENV_ARG_LIMIT=32
|
|
|
|
CONFIG_CROSS_COMPILE=""
|
|
|
|
CONFIG_LOCALVERSION=""
|
|
|
|
CONFIG_LOCALVERSION_AUTO=y
|
|
|
|
CONFIG_DEFAULT_HOSTNAME="(none)"
|
|
|
|
CONFIG_SWAP=y
|
|
|
|
CONFIG_SYSVIPC=y
|
|
|
|
CONFIG_SYSVIPC_SYSCTL=y
|
|
|
|
# CONFIG_POSIX_MQUEUE is not set
|
|
|
|
# CONFIG_FHANDLE is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_AUDIT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_AUDIT_LOGINUID_IMMUTABLE is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# IRQ subsystem
|
|
|
|
#
|
|
|
|
CONFIG_GENERIC_IRQ_PROBE=y
|
|
|
|
CONFIG_GENERIC_IRQ_SHOW=y
|
|
|
|
CONFIG_HARDIRQS_SW_RESEND=y
|
|
|
|
CONFIG_IRQ_DOMAIN=y
|
|
|
|
# CONFIG_IRQ_DOMAIN_DEBUG is not set
|
|
|
|
CONFIG_SPARSE_IRQ=y
|
|
|
|
CONFIG_GENERIC_TIME_VSYSCALL=y
|
|
|
|
CONFIG_GENERIC_CLOCKEVENTS=y
|
|
|
|
CONFIG_GENERIC_CLOCKEVENTS_BUILD=y
|
|
|
|
CONFIG_ARCH_HAS_TICK_BROADCAST=y
|
|
|
|
CONFIG_GENERIC_CLOCKEVENTS_BROADCAST=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# Timers subsystem
|
|
|
|
#
|
|
|
|
CONFIG_TICK_ONESHOT=y
|
|
|
|
CONFIG_NO_HZ_COMMON=y
|
|
|
|
# CONFIG_HZ_PERIODIC is not set
|
|
|
|
CONFIG_NO_HZ_IDLE=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NO_HZ=y
|
|
|
|
CONFIG_HIGH_RES_TIMERS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# CPU/Task time and stats accounting
|
|
|
|
#
|
|
|
|
# CONFIG_TICK_CPU_ACCOUNTING is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_IRQ_TIME_ACCOUNTING=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_BSD_PROCESS_ACCT is not set
|
|
|
|
# CONFIG_TASKSTATS is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# RCU Subsystem
|
|
|
|
#
|
|
|
|
CONFIG_TREE_PREEMPT_RCU=y
|
|
|
|
CONFIG_PREEMPT_RCU=y
|
|
|
|
CONFIG_RCU_STALL_COMMON=y
|
|
|
|
CONFIG_RCU_FANOUT=64
|
|
|
|
CONFIG_RCU_FANOUT_LEAF=16
|
|
|
|
# CONFIG_RCU_FANOUT_EXACT is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_RCU_FAST_NO_HZ=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_TREE_RCU_TRACE is not set
|
|
|
|
# CONFIG_RCU_BOOST is not set
|
|
|
|
# CONFIG_RCU_NOCB_CPU is not set
|
|
|
|
# CONFIG_IKCONFIG is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_LOG_BUF_SHIFT=18
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_GENERIC_SCHED_CLOCK=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_CGROUPS=y
|
|
|
|
CONFIG_CGROUP_DEBUG=y
|
|
|
|
CONFIG_CGROUP_FREEZER=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_CGROUP_DEVICE is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_CPUSETS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_PROC_PID_CPUSET=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_CGROUP_CPUACCT=y
|
|
|
|
CONFIG_RESOURCE_COUNTERS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MEMCG is not set
|
|
|
|
# CONFIG_CGROUP_PERF is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_CGROUP_SCHED=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_FAIR_GROUP_SCHED=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_CFS_BANDWIDTH=y
|
|
|
|
CONFIG_RT_GROUP_SCHED=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_BLK_CGROUP is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SCHED_HMP=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_CHECKPOINT_RESTORE is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NAMESPACES=y
|
|
|
|
# CONFIG_UTS_NS is not set
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_IPC_NS=y
|
|
|
|
# CONFIG_USER_NS is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
# CONFIG_PID_NS is not set
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_NET_NS=y
|
|
|
|
CONFIG_UIDGID_CONVERTED=y
|
|
|
|
# CONFIG_UIDGID_STRICT_TYPE_CHECKS is not set
|
|
|
|
# CONFIG_SCHED_AUTOGROUP is not set
|
|
|
|
# CONFIG_SYSFS_DEPRECATED is not set
|
|
|
|
# CONFIG_RELAY is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_BLK_DEV_INITRD=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_INITRAMFS_SOURCE=""
|
|
|
|
CONFIG_RD_GZIP=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_RD_BZIP2=y
|
|
|
|
CONFIG_RD_LZMA=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_RD_XZ is not set
|
|
|
|
# CONFIG_RD_LZO is not set
|
|
|
|
# CONFIG_RD_LZ4 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_CC_OPTIMIZE_FOR_SIZE=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_SYSCTL=y
|
|
|
|
CONFIG_ANON_INODES=y
|
|
|
|
CONFIG_HAVE_UID16=y
|
|
|
|
CONFIG_SYSCTL_EXCEPTION_TRACE=y
|
|
|
|
CONFIG_HOTPLUG=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_PANIC_TIMEOUT=5
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_EXPERT=y
|
|
|
|
CONFIG_UID16=y
|
|
|
|
# CONFIG_SYSCTL_SYSCALL is not set
|
|
|
|
CONFIG_KALLSYMS=y
|
|
|
|
# CONFIG_KALLSYMS_ALL is not set
|
|
|
|
CONFIG_PRINTK=y
|
|
|
|
CONFIG_BUG=y
|
|
|
|
CONFIG_BASE_FULL=y
|
|
|
|
CONFIG_FUTEX=y
|
|
|
|
CONFIG_EPOLL=y
|
|
|
|
CONFIG_SIGNALFD=y
|
|
|
|
CONFIG_TIMERFD=y
|
|
|
|
CONFIG_EVENTFD=y
|
|
|
|
CONFIG_SHMEM=y
|
|
|
|
CONFIG_AIO=y
|
2020-05-31 10:32:05 +00:00
|
|
|
# CONFIG_PCI_QUIRKS is not set
|
|
|
|
CONFIG_EMBEDDED=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_HAVE_PERF_EVENTS=y
|
|
|
|
CONFIG_PERF_USE_VMALLOC=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# Kernel Performance Events And Counters
|
|
|
|
#
|
|
|
|
CONFIG_PERF_EVENTS=y
|
|
|
|
# CONFIG_DEBUG_PERF_USE_VMALLOC is not set
|
|
|
|
CONFIG_VM_EVENT_COUNTERS=y
|
2020-05-31 10:32:05 +00:00
|
|
|
# CONFIG_SLUB_DEBUG is not set
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_COMPAT_BRK=y
|
|
|
|
# CONFIG_SLAB is not set
|
|
|
|
CONFIG_SLUB=y
|
|
|
|
# CONFIG_SLOB is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_PROFILING=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_TRACEPOINTS=y
|
|
|
|
# CONFIG_JUMP_LABEL is not set
|
|
|
|
# CONFIG_HAVE_64BIT_ALIGNED_ACCESS is not set
|
|
|
|
CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS=y
|
|
|
|
CONFIG_HAVE_ARCH_TRACEHOOK=y
|
|
|
|
CONFIG_HAVE_DMA_ATTRS=y
|
|
|
|
CONFIG_HAVE_DMA_CONTIGUOUS=y
|
|
|
|
CONFIG_GENERIC_SMP_IDLE_THREAD=y
|
|
|
|
CONFIG_HAVE_CLK=y
|
|
|
|
CONFIG_HAVE_DMA_API_DEBUG=y
|
|
|
|
CONFIG_HAVE_PERF_REGS=y
|
|
|
|
CONFIG_HAVE_PERF_USER_STACK_DUMP=y
|
|
|
|
CONFIG_HAVE_ARCH_JUMP_LABEL=y
|
|
|
|
CONFIG_ARCH_WANT_COMPAT_IPC_PARSE_VERSION=y
|
|
|
|
CONFIG_HAVE_ARCH_SECCOMP_FILTER=y
|
|
|
|
CONFIG_SECCOMP_FILTER=y
|
|
|
|
CONFIG_HAVE_CC_STACKPROTECTOR=y
|
|
|
|
CONFIG_CC_STACKPROTECTOR=y
|
|
|
|
# CONFIG_CC_STACKPROTECTOR_NONE is not set
|
|
|
|
# CONFIG_CC_STACKPROTECTOR_REGULAR is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_CC_STACKPROTECTOR_STRONG=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_HAVE_IRQ_TIME_ACCOUNTING=y
|
|
|
|
CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE=y
|
|
|
|
CONFIG_MODULES_USE_ELF_RELA=y
|
|
|
|
CONFIG_HAVE_ARCH_MMAP_RND_BITS=y
|
|
|
|
CONFIG_ARCH_MMAP_RND_BITS=18
|
|
|
|
CONFIG_HAVE_ARCH_MMAP_RND_COMPAT_BITS=y
|
|
|
|
CONFIG_ARCH_MMAP_RND_COMPAT_BITS=11
|
|
|
|
CONFIG_CLONE_BACKWARDS=y
|
|
|
|
CONFIG_OLD_SIGSUSPEND3=y
|
|
|
|
CONFIG_COMPAT_OLD_SIGACTION=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# GCOV-based kernel profiling
|
|
|
|
#
|
|
|
|
# CONFIG_GCOV_KERNEL is not set
|
|
|
|
CONFIG_HAVE_GENERIC_DMA_COHERENT=y
|
|
|
|
CONFIG_RT_MUTEXES=y
|
|
|
|
CONFIG_BASE_SMALL=0
|
|
|
|
# CONFIG_SYSTEM_TRUSTED_KEYRING is not set
|
|
|
|
# CONFIG_MODULES is not set
|
|
|
|
CONFIG_STOP_MACHINE=y
|
|
|
|
CONFIG_BLOCK=y
|
|
|
|
CONFIG_BLK_DEV_BSG=y
|
|
|
|
# CONFIG_BLK_DEV_BSGLIB is not set
|
|
|
|
# CONFIG_BLK_DEV_INTEGRITY is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Partition Types
|
|
|
|
#
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_PARTITION_ADVANCED=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_ACORN_PARTITION is not set
|
|
|
|
# CONFIG_OSF_PARTITION is not set
|
|
|
|
# CONFIG_AMIGA_PARTITION is not set
|
|
|
|
# CONFIG_ATARI_PARTITION is not set
|
|
|
|
# CONFIG_MAC_PARTITION is not set
|
|
|
|
CONFIG_MSDOS_PARTITION=y
|
|
|
|
# CONFIG_BSD_DISKLABEL is not set
|
|
|
|
# CONFIG_MINIX_SUBPARTITION is not set
|
|
|
|
# CONFIG_SOLARIS_X86_PARTITION is not set
|
|
|
|
# CONFIG_UNIXWARE_DISKLABEL is not set
|
|
|
|
# CONFIG_LDM_PARTITION is not set
|
|
|
|
# CONFIG_SGI_PARTITION is not set
|
|
|
|
# CONFIG_ULTRIX_PARTITION is not set
|
|
|
|
# CONFIG_SUN_PARTITION is not set
|
|
|
|
# CONFIG_KARMA_PARTITION is not set
|
|
|
|
CONFIG_EFI_PARTITION=y
|
|
|
|
# CONFIG_SYSV68_PARTITION is not set
|
|
|
|
CONFIG_BLOCK_COMPAT=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# IO Schedulers
|
|
|
|
#
|
|
|
|
CONFIG_IOSCHED_NOOP=y
|
2020-05-31 10:32:05 +00:00
|
|
|
# CONFIG_IOSCHED_TEST is not set
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_IOSCHED_DEADLINE=y
|
|
|
|
CONFIG_IOSCHED_ROW=y
|
|
|
|
CONFIG_IOSCHED_CFQ=y
|
|
|
|
# CONFIG_DEFAULT_DEADLINE is not set
|
|
|
|
# CONFIG_DEFAULT_ROW is not set
|
|
|
|
CONFIG_DEFAULT_CFQ=y
|
|
|
|
# CONFIG_DEFAULT_NOOP is not set
|
|
|
|
CONFIG_DEFAULT_IOSCHED="cfq"
|
|
|
|
CONFIG_ASN1=y
|
|
|
|
CONFIG_UNINLINE_SPIN_UNLOCK=y
|
|
|
|
CONFIG_ARCH_SUPPORTS_ATOMIC_RMW=y
|
|
|
|
CONFIG_MUTEX_SPIN_ON_OWNER=y
|
|
|
|
CONFIG_FREEZER=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# Platform selection
|
|
|
|
#
|
|
|
|
# CONFIG_ARCH_VEXPRESS is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_ARCH_MSM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_ARCH_MSM8916 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_ARCH_MSM8994=y
|
|
|
|
CONFIG_ARCH_MSM8994_V1_TLBI_WA=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_ARCH_MSM8992 is not set
|
|
|
|
# CONFIG_ARCH_XGENE is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_ARCH_SONY_KITAKAMI=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MACH_SONY_IVY is not set
|
|
|
|
# CONFIG_MACH_SONY_IVY_DSDS is not set
|
|
|
|
# CONFIG_MACH_SONY_KARIN is not set
|
|
|
|
# CONFIG_MACH_SONY_KARIN_WINDY is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MACH_SONY_SUMIRE=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MACH_SONY_SUMIRE_DSDS is not set
|
|
|
|
# CONFIG_MACH_SONY_SUZURAN is not set
|
|
|
|
# CONFIG_MACH_SONY_SATSUKI is not set
|
|
|
|
# CONFIG_MACH_SONY_SATSUKI_DSDS is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Bus support
|
|
|
|
#
|
|
|
|
CONFIG_ARM_AMBA=y
|
|
|
|
CONFIG_PCI=y
|
|
|
|
CONFIG_PCI_DOMAINS=y
|
|
|
|
CONFIG_PCI_SYSCALL=y
|
|
|
|
CONFIG_ARCH_SUPPORTS_MSI=y
|
|
|
|
CONFIG_PCI_MSI=y
|
|
|
|
# CONFIG_PCI_DEBUG is not set
|
|
|
|
# CONFIG_PCI_REALLOC_ENABLE_AUTO is not set
|
|
|
|
# CONFIG_PCI_STUB is not set
|
|
|
|
# CONFIG_PCI_IOV is not set
|
|
|
|
# CONFIG_PCI_PRI is not set
|
|
|
|
# CONFIG_PCI_PASID is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_PCI_MSM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_PCIEPORTBUS is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Kernel Features
|
|
|
|
#
|
|
|
|
# CONFIG_ARM64_DCACHE_DISABLE is not set
|
|
|
|
# CONFIG_ARM64_ICACHE_DISABLE is not set
|
|
|
|
# CONFIG_ARM64_64K_PAGES is not set
|
|
|
|
# CONFIG_CPU_BIG_ENDIAN is not set
|
|
|
|
CONFIG_ARM64_ERRATUM_845719=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_ARM64_A57_ERRATA_832075=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_ARM64_SEV_IN_LOCK_UNLOCK=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SMP=y
|
|
|
|
CONFIG_SCHED_MC=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SCHED_SMT is not set
|
|
|
|
# CONFIG_ARCH_WANTS_CTXSW_LOGGING is not set
|
|
|
|
CONFIG_NR_CPUS=8
|
|
|
|
CONFIG_HOTPLUG_CPU=y
|
|
|
|
# CONFIG_PREEMPT_NONE is not set
|
|
|
|
# CONFIG_PREEMPT_VOLUNTARY is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_PREEMPT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_PREEMPT_COUNT=y
|
|
|
|
CONFIG_SWP_EMULATE=y
|
|
|
|
CONFIG_HZ=100
|
|
|
|
CONFIG_ARCH_HAS_HOLES_MEMORYMODEL=y
|
|
|
|
CONFIG_ARCH_SPARSEMEM_ENABLE=y
|
|
|
|
CONFIG_ARCH_SPARSEMEM_DEFAULT=y
|
|
|
|
CONFIG_ARCH_SELECT_MEMORY_MODEL=y
|
|
|
|
CONFIG_HAVE_ARCH_PFN_VALID=y
|
|
|
|
CONFIG_HW_PERF_EVENTS=y
|
|
|
|
# CONFIG_PERF_EVENTS_USERMODE is not set
|
|
|
|
# CONFIG_PERF_EVENTS_RESET_PMU_DEBUGFS is not set
|
|
|
|
CONFIG_SYS_SUPPORTS_HUGETLBFS=y
|
|
|
|
CONFIG_ARCH_WANT_GENERAL_HUGETLB=y
|
|
|
|
CONFIG_ARCH_WANT_HUGE_PMD_SHARE=y
|
|
|
|
CONFIG_ARCH_HAS_CACHE_LINE_SIZE=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_ARMV7_COMPAT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_ARMV7_COMPAT_CPUINFO=y
|
|
|
|
CONFIG_SELECT_MEMORY_MODEL=y
|
|
|
|
CONFIG_SPARSEMEM_MANUAL=y
|
|
|
|
CONFIG_SPARSEMEM=y
|
|
|
|
CONFIG_HAVE_MEMORY_PRESENT=y
|
|
|
|
CONFIG_SPARSEMEM_EXTREME=y
|
|
|
|
CONFIG_SPARSEMEM_VMEMMAP_ENABLE=y
|
|
|
|
CONFIG_SPARSEMEM_VMEMMAP=y
|
|
|
|
CONFIG_HAVE_MEMBLOCK=y
|
|
|
|
CONFIG_NO_BOOTMEM=y
|
|
|
|
CONFIG_MEMORY_ISOLATION=y
|
|
|
|
# CONFIG_HAVE_BOOTMEM_INFO_NODE is not set
|
|
|
|
CONFIG_PAGEFLAGS_EXTENDED=y
|
|
|
|
CONFIG_SPLIT_PTLOCK_CPUS=4
|
|
|
|
CONFIG_COMPACTION=y
|
|
|
|
CONFIG_MIGRATION=y
|
|
|
|
CONFIG_PHYS_ADDR_T_64BIT=y
|
|
|
|
CONFIG_ZONE_DMA_FLAG=1
|
|
|
|
CONFIG_BOUNCE=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_KSM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_DEFAULT_MMAP_MIN_ADDR=4096
|
|
|
|
# CONFIG_TRANSPARENT_HUGEPAGE is not set
|
|
|
|
CONFIG_CROSS_MEMORY_ATTACH=y
|
|
|
|
# CONFIG_CLEANCACHE is not set
|
|
|
|
# CONFIG_FRONTSWAP is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SWAP_CONSIDER_CMA_FREE=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_USE_USER_ACCESSIBLE_TIMERS is not set
|
|
|
|
# CONFIG_ZBUD is not set
|
|
|
|
# CONFIG_Z3FOLD is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_BALANCE_ANON_FILE_RECLAIM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_GENERIC_EARLY_IOREMAP=y
|
|
|
|
CONFIG_KSWAPD_CPU_AFFINITY_MASK=""
|
|
|
|
# CONFIG_PROCESS_RECLAIM is not set
|
|
|
|
CONFIG_ZPOOL=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_ZSMALLOC=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_PGTABLE_MAPPING is not set
|
|
|
|
# CONFIG_ZSMALLOC_STAT is not set
|
|
|
|
# CONFIG_XEN is not set
|
|
|
|
CONFIG_FORCE_MAX_ZONEORDER=11
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SECCOMP=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# Boot options
|
|
|
|
#
|
|
|
|
CONFIG_CMDLINE=""
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_BUILD_ARM64_APPENDED_DTB_IMAGE=y
|
|
|
|
CONFIG_BUILD_ARM64_APPENDED_DTB_IMAGE_NAMES="msm8994-v2.0-kitakami_sumire_generic msm8994-v2.1-kitakami_sumire_generic"
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_EFI is not set
|
|
|
|
# CONFIG_CRASH_NOTES is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Userspace binary formats
|
|
|
|
#
|
|
|
|
CONFIG_BINFMT_ELF=y
|
|
|
|
CONFIG_COMPAT_BINFMT_ELF=y
|
|
|
|
CONFIG_BINFMT_SCRIPT=y
|
|
|
|
# CONFIG_HAVE_AOUT is not set
|
|
|
|
# CONFIG_BINFMT_MISC is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
# CONFIG_COREDUMP is not set
|
|
|
|
CONFIG_COMPAT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_SYSVIPC_COMPAT=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# Power management options
|
|
|
|
#
|
|
|
|
CONFIG_SUSPEND=y
|
|
|
|
CONFIG_SUSPEND_FREEZER=y
|
|
|
|
CONFIG_HAS_WAKELOCK=y
|
|
|
|
CONFIG_WAKELOCK=y
|
|
|
|
CONFIG_PM_SLEEP=y
|
|
|
|
CONFIG_PM_SLEEP_SMP=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_PM_AUTOSLEEP=y
|
|
|
|
CONFIG_PM_WAKELOCKS=y
|
|
|
|
CONFIG_PM_WAKELOCKS_LIMIT=0
|
|
|
|
# CONFIG_PM_WAKELOCKS_GC is not set
|
|
|
|
CONFIG_PM_RUNTIME=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_PM=y
|
|
|
|
# CONFIG_PM_DEBUG is not set
|
|
|
|
CONFIG_PM_WAKEUP_TIMES=y
|
|
|
|
CONFIG_PM_OPP=y
|
|
|
|
CONFIG_PM_CLK=y
|
|
|
|
CONFIG_CPU_PM=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SUSPEND_TIME=y
|
|
|
|
CONFIG_WAKEUP_IRQ_DEBUG=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_ARCH_SUSPEND_POSSIBLE=y
|
|
|
|
CONFIG_ARM64_CPU_SUSPEND=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# CPU Power Management
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# CPU Frequency scaling
|
|
|
|
#
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_CPU_FREQ=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_CPU_FREQ_GOV_COMMON=y
|
|
|
|
# CONFIG_SCHED_FREQ_INPUT is not set
|
|
|
|
CONFIG_CPU_FREQ_STAT=y
|
|
|
|
# CONFIG_CPU_FREQ_STAT_DETAILS is not set
|
|
|
|
CONFIG_CPU_FREQ_DEFAULT_GOV_PERFORMANCE=y
|
|
|
|
# CONFIG_CPU_FREQ_DEFAULT_GOV_POWERSAVE is not set
|
|
|
|
# CONFIG_CPU_FREQ_DEFAULT_GOV_USERSPACE is not set
|
|
|
|
# CONFIG_CPU_FREQ_DEFAULT_GOV_ONDEMAND is not set
|
|
|
|
# CONFIG_CPU_FREQ_DEFAULT_GOV_CONSERVATIVE is not set
|
|
|
|
# CONFIG_CPU_FREQ_DEFAULT_GOV_INTERACTIVE is not set
|
|
|
|
CONFIG_CPU_FREQ_GOV_PERFORMANCE=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_CPU_FREQ_GOV_POWERSAVE=y
|
|
|
|
CONFIG_CPU_FREQ_GOV_USERSPACE=y
|
|
|
|
CONFIG_CPU_FREQ_GOV_ONDEMAND=y
|
|
|
|
CONFIG_CPU_FREQ_GOV_INTERACTIVE=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_CPU_FREQ_GOV_CONSERVATIVE is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_CPU_BOOST=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_GENERIC_CPUFREQ_CPU0 is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# ARM CPU frequency scaling drivers
|
|
|
|
#
|
|
|
|
# CONFIG_ARM_EXYNOS4210_CPUFREQ is not set
|
|
|
|
# CONFIG_ARM_EXYNOS4X12_CPUFREQ is not set
|
|
|
|
# CONFIG_ARM_EXYNOS5250_CPUFREQ is not set
|
|
|
|
# CONFIG_ARM_EXYNOS5440_CPUFREQ is not set
|
|
|
|
# CONFIG_ARM_KIRKWOOD_CPUFREQ is not set
|
|
|
|
CONFIG_CPU_FREQ_MSM=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_CPU_IDLE=y
|
|
|
|
CONFIG_CPU_IDLE_MULTIPLE_DRIVERS=y
|
|
|
|
# CONFIG_CPU_IDLE_GOV_LADDER is not set
|
|
|
|
# CONFIG_CPU_IDLE_GOV_MENU is not set
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_CPU_IDLE_GOV_NULL=y
|
|
|
|
# CONFIG_ARCH_NEEDS_CPU_IDLE_COUPLED is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NET=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_COMPAT_NETLINK_MESSAGES=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# Networking options
|
|
|
|
#
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_PACKET=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_PACKET_DIAG is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_UNIX=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_UNIX_DIAG is not set
|
|
|
|
CONFIG_XFRM=y
|
|
|
|
CONFIG_XFRM_ALGO=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_XFRM_USER=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_XFRM_SUB_POLICY is not set
|
|
|
|
# CONFIG_XFRM_MIGRATE is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_XFRM_STATISTICS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_XFRM_IPCOMP=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NET_KEY=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NET_KEY_MIGRATE is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_XFRM_RFC_4868_TRUNCATION=y
|
|
|
|
CONFIG_INET=y
|
|
|
|
CONFIG_IP_MULTICAST=y
|
|
|
|
CONFIG_IP_ADVANCED_ROUTER=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_IP_FIB_TRIE_STATS is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_IP_MULTIPLE_TABLES=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_IP_ROUTE_MULTIPATH is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_IP_ROUTE_VERBOSE=y
|
|
|
|
CONFIG_IP_PNP=y
|
|
|
|
CONFIG_IP_PNP_DHCP=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_IP_PNP_BOOTP is not set
|
|
|
|
# CONFIG_IP_PNP_RARP is not set
|
|
|
|
# CONFIG_NET_IPIP is not set
|
|
|
|
# CONFIG_NET_IPGRE_DEMUX is not set
|
|
|
|
CONFIG_NET_IP_TUNNEL=y
|
|
|
|
# CONFIG_IP_MROUTE is not set
|
|
|
|
# CONFIG_ARPD is not set
|
|
|
|
# CONFIG_SYN_COOKIES is not set
|
|
|
|
# CONFIG_NET_IPVTI is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_INET_AH=y
|
|
|
|
CONFIG_INET_ESP=y
|
|
|
|
CONFIG_INET_IPCOMP=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_INET_XFRM_TUNNEL=y
|
|
|
|
CONFIG_INET_TUNNEL=y
|
|
|
|
CONFIG_INET_XFRM_MODE_TRANSPORT=y
|
|
|
|
CONFIG_INET_XFRM_MODE_TUNNEL=y
|
|
|
|
CONFIG_INET_XFRM_MODE_BEET=y
|
2020-05-31 10:32:05 +00:00
|
|
|
# CONFIG_INET_LRO is not set
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_INET_DIAG=y
|
|
|
|
CONFIG_INET_TCP_DIAG=y
|
|
|
|
# CONFIG_INET_UDP_DIAG is not set
|
|
|
|
# CONFIG_INET_DIAG_DESTROY is not set
|
|
|
|
# CONFIG_TCP_CONG_ADVANCED is not set
|
|
|
|
CONFIG_TCP_CONG_CUBIC=y
|
|
|
|
CONFIG_DEFAULT_TCP_CONG="cubic"
|
|
|
|
# CONFIG_TCP_MD5SIG is not set
|
|
|
|
CONFIG_IPV6=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_IPV6_PRIVACY=y
|
|
|
|
CONFIG_IPV6_ROUTER_PREF=y
|
|
|
|
CONFIG_IPV6_ROUTE_INFO=y
|
|
|
|
CONFIG_IPV6_OPTIMISTIC_DAD=y
|
|
|
|
CONFIG_INET6_AH=y
|
|
|
|
CONFIG_INET6_ESP=y
|
|
|
|
CONFIG_INET6_IPCOMP=y
|
|
|
|
CONFIG_IPV6_MIP6=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_INET6_XFRM_TUNNEL=y
|
|
|
|
CONFIG_INET6_TUNNEL=y
|
|
|
|
CONFIG_INET6_XFRM_MODE_TRANSPORT=y
|
|
|
|
CONFIG_INET6_XFRM_MODE_TUNNEL=y
|
|
|
|
CONFIG_INET6_XFRM_MODE_BEET=y
|
|
|
|
# CONFIG_INET6_XFRM_MODE_ROUTEOPTIMIZATION is not set
|
|
|
|
CONFIG_IPV6_SIT=y
|
|
|
|
# CONFIG_IPV6_SIT_6RD is not set
|
|
|
|
CONFIG_IPV6_NDISC_NODETYPE=y
|
|
|
|
# CONFIG_IPV6_TUNNEL is not set
|
|
|
|
# CONFIG_IPV6_GRE is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_IPV6_MULTIPLE_TABLES=y
|
|
|
|
CONFIG_IPV6_SUBTREES=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_IPV6_MROUTE is not set
|
|
|
|
# CONFIG_NETLABEL is not set
|
|
|
|
# CONFIG_ANDROID_PARANOID_NETWORK is not set
|
|
|
|
CONFIG_NET_ACTIVITY_STATS=y
|
|
|
|
CONFIG_NETWORK_SECMARK=y
|
|
|
|
# CONFIG_NETWORK_PHY_TIMESTAMPING is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NETFILTER=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NETFILTER_DEBUG is not set
|
|
|
|
CONFIG_NETFILTER_ADVANCED=y
|
|
|
|
CONFIG_BRIDGE_NETFILTER=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# Core Netfilter Configuration
|
|
|
|
#
|
|
|
|
CONFIG_NETFILTER_NETLINK=y
|
|
|
|
# CONFIG_NETFILTER_NETLINK_ACCT is not set
|
|
|
|
CONFIG_NETFILTER_NETLINK_QUEUE=y
|
|
|
|
CONFIG_NETFILTER_NETLINK_LOG=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NF_CONNTRACK=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_NF_CONNTRACK_MARK=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NF_CONNTRACK_SECMARK=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NF_CONNTRACK_ZONES is not set
|
|
|
|
CONFIG_NF_CONNTRACK_PROCFS=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NF_CONNTRACK_EVENTS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NF_CONNTRACK_TIMEOUT is not set
|
|
|
|
# CONFIG_NF_CONNTRACK_TIMESTAMP is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NF_CT_PROTO_DCCP=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_NF_CT_PROTO_GRE=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NF_CT_PROTO_SCTP=y
|
|
|
|
CONFIG_NF_CT_PROTO_UDPLITE=y
|
|
|
|
CONFIG_NF_CONNTRACK_AMANDA=y
|
|
|
|
CONFIG_NF_CONNTRACK_FTP=y
|
|
|
|
CONFIG_NF_CONNTRACK_H323=y
|
|
|
|
CONFIG_NF_CONNTRACK_IRC=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_NF_CONNTRACK_BROADCAST=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NF_CONNTRACK_NETBIOS_NS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NF_CONNTRACK_SNMP is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NF_CONNTRACK_PPTP=y
|
|
|
|
CONFIG_NF_CONNTRACK_SANE=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NF_CONNTRACK_SIP is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NF_CONNTRACK_TFTP=y
|
|
|
|
CONFIG_NF_CT_NETLINK=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NF_CT_NETLINK_TIMEOUT is not set
|
|
|
|
# CONFIG_NETFILTER_NETLINK_QUEUE_CT is not set
|
|
|
|
CONFIG_NF_NAT=y
|
|
|
|
CONFIG_NF_NAT_NEEDED=y
|
|
|
|
CONFIG_NF_NAT_PROTO_DCCP=y
|
|
|
|
CONFIG_NF_NAT_PROTO_UDPLITE=y
|
|
|
|
CONFIG_NF_NAT_PROTO_SCTP=y
|
|
|
|
CONFIG_NF_NAT_AMANDA=y
|
|
|
|
CONFIG_NF_NAT_FTP=y
|
|
|
|
CONFIG_NF_NAT_IRC=y
|
|
|
|
# CONFIG_NF_NAT_SIP is not set
|
|
|
|
CONFIG_NF_NAT_TFTP=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NETFILTER_TPROXY=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_NETFILTER_XTABLES=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# Xtables combined modules
|
|
|
|
#
|
|
|
|
CONFIG_NETFILTER_XT_MARK=y
|
|
|
|
CONFIG_NETFILTER_XT_CONNMARK=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# Xtables targets
|
|
|
|
#
|
|
|
|
# CONFIG_NETFILTER_XT_TARGET_AUDIT is not set
|
|
|
|
# CONFIG_NETFILTER_XT_TARGET_CHECKSUM is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NETFILTER_XT_TARGET_CLASSIFY=y
|
|
|
|
CONFIG_NETFILTER_XT_TARGET_CONNMARK=y
|
|
|
|
CONFIG_NETFILTER_XT_TARGET_CONNSECMARK=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_NETFILTER_XT_TARGET_CT=y
|
|
|
|
# CONFIG_NETFILTER_XT_TARGET_DSCP is not set
|
|
|
|
# CONFIG_NETFILTER_XT_TARGET_HL is not set
|
|
|
|
# CONFIG_NETFILTER_XT_TARGET_HMARK is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NETFILTER_XT_TARGET_IDLETIMER=y
|
|
|
|
CONFIG_NETFILTER_XT_TARGET_HARDIDLETIMER=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NETFILTER_XT_TARGET_LED is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NETFILTER_XT_TARGET_LOG=y
|
|
|
|
CONFIG_NETFILTER_XT_TARGET_MARK=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_NETFILTER_XT_TARGET_NETMAP=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NETFILTER_XT_TARGET_NFLOG=y
|
|
|
|
CONFIG_NETFILTER_XT_TARGET_NFQUEUE=y
|
|
|
|
CONFIG_NETFILTER_XT_TARGET_NOTRACK=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NETFILTER_XT_TARGET_RATEEST is not set
|
|
|
|
CONFIG_NETFILTER_XT_TARGET_REDIRECT=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NETFILTER_XT_TARGET_TEE=y
|
|
|
|
CONFIG_NETFILTER_XT_TARGET_TPROXY=y
|
|
|
|
CONFIG_NETFILTER_XT_TARGET_TRACE=y
|
|
|
|
CONFIG_NETFILTER_XT_TARGET_SECMARK=y
|
|
|
|
CONFIG_NETFILTER_XT_TARGET_TCPMSS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NETFILTER_XT_TARGET_TCPOPTSTRIP is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Xtables matches
|
|
|
|
#
|
|
|
|
# CONFIG_NETFILTER_XT_MATCH_ADDRTYPE is not set
|
|
|
|
# CONFIG_NETFILTER_XT_MATCH_BPF is not set
|
|
|
|
# CONFIG_NETFILTER_XT_MATCH_CLUSTER is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NETFILTER_XT_MATCH_COMMENT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NETFILTER_XT_MATCH_CONNBYTES is not set
|
|
|
|
# CONFIG_NETFILTER_XT_MATCH_CONNLABEL is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NETFILTER_XT_MATCH_CONNLIMIT=y
|
|
|
|
CONFIG_NETFILTER_XT_MATCH_CONNMARK=y
|
|
|
|
CONFIG_NETFILTER_XT_MATCH_CONNTRACK=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NETFILTER_XT_MATCH_CPU is not set
|
|
|
|
# CONFIG_NETFILTER_XT_MATCH_DCCP is not set
|
|
|
|
# CONFIG_NETFILTER_XT_MATCH_DEVGROUP is not set
|
|
|
|
# CONFIG_NETFILTER_XT_MATCH_DSCP is not set
|
|
|
|
CONFIG_NETFILTER_XT_MATCH_ECN=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NETFILTER_XT_MATCH_ESP=y
|
|
|
|
CONFIG_NETFILTER_XT_MATCH_HASHLIMIT=y
|
|
|
|
CONFIG_NETFILTER_XT_MATCH_HELPER=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_NETFILTER_XT_MATCH_HL=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NETFILTER_XT_MATCH_IPRANGE=y
|
|
|
|
CONFIG_NETFILTER_XT_MATCH_LENGTH=y
|
|
|
|
CONFIG_NETFILTER_XT_MATCH_LIMIT=y
|
|
|
|
CONFIG_NETFILTER_XT_MATCH_MAC=y
|
|
|
|
CONFIG_NETFILTER_XT_MATCH_MARK=y
|
|
|
|
CONFIG_NETFILTER_XT_MATCH_MULTIPORT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NETFILTER_XT_MATCH_NFACCT is not set
|
|
|
|
# CONFIG_NETFILTER_XT_MATCH_OSF is not set
|
|
|
|
# CONFIG_NETFILTER_XT_MATCH_OWNER is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NETFILTER_XT_MATCH_POLICY=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NETFILTER_XT_MATCH_PHYSDEV is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NETFILTER_XT_MATCH_PKTTYPE=y
|
|
|
|
CONFIG_NETFILTER_XT_MATCH_QTAGUID=y
|
|
|
|
CONFIG_NETFILTER_XT_MATCH_QUOTA=y
|
|
|
|
CONFIG_NETFILTER_XT_MATCH_QUOTA2=y
|
|
|
|
CONFIG_NETFILTER_XT_MATCH_QUOTA2_LOG=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NETFILTER_XT_MATCH_RATEEST is not set
|
|
|
|
# CONFIG_NETFILTER_XT_MATCH_REALM is not set
|
|
|
|
# CONFIG_NETFILTER_XT_MATCH_RECENT is not set
|
|
|
|
# CONFIG_NETFILTER_XT_MATCH_SCTP is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NETFILTER_XT_MATCH_SOCKET=y
|
|
|
|
CONFIG_NETFILTER_XT_MATCH_STATE=y
|
|
|
|
CONFIG_NETFILTER_XT_MATCH_STATISTIC=y
|
|
|
|
CONFIG_NETFILTER_XT_MATCH_STRING=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NETFILTER_XT_MATCH_TCPMSS is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NETFILTER_XT_MATCH_TIME=y
|
|
|
|
CONFIG_NETFILTER_XT_MATCH_U32=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_IP_SET is not set
|
|
|
|
# CONFIG_IP_VS is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# IP: Netfilter Configuration
|
|
|
|
#
|
|
|
|
CONFIG_NF_DEFRAG_IPV4=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NF_CONNTRACK_IPV4=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_NF_CONNTRACK_PROC_COMPAT=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_IP_NF_IPTABLES=y
|
|
|
|
CONFIG_IP_NF_MATCH_AH=y
|
|
|
|
CONFIG_IP_NF_MATCH_ECN=y
|
|
|
|
CONFIG_IP_NF_MATCH_RPFILTER=y
|
|
|
|
CONFIG_IP_NF_MATCH_TTL=y
|
|
|
|
CONFIG_IP_NF_FILTER=y
|
|
|
|
CONFIG_IP_NF_TARGET_REJECT=y
|
|
|
|
CONFIG_IP_NF_TARGET_REJECT_SKERR=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_IP_NF_TARGET_ULOG is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NF_NAT_IPV4=y
|
|
|
|
CONFIG_IP_NF_TARGET_MASQUERADE=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_IP_NF_TARGET_NATTYPE_MODULE is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_IP_NF_TARGET_NETMAP=y
|
|
|
|
CONFIG_IP_NF_TARGET_REDIRECT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_NF_NAT_PROTO_GRE=y
|
|
|
|
CONFIG_NF_NAT_PPTP=y
|
|
|
|
CONFIG_NF_NAT_H323=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_IP_NF_MANGLE=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_IP_NF_TARGET_CLUSTERIP is not set
|
|
|
|
# CONFIG_IP_NF_TARGET_ECN is not set
|
|
|
|
# CONFIG_IP_NF_TARGET_TTL is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_IP_NF_RAW=y
|
|
|
|
CONFIG_IP_NF_SECURITY=y
|
|
|
|
CONFIG_IP_NF_ARPTABLES=y
|
|
|
|
CONFIG_IP_NF_ARPFILTER=y
|
|
|
|
CONFIG_IP_NF_ARP_MANGLE=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# IPv6: Netfilter Configuration
|
|
|
|
#
|
|
|
|
CONFIG_NF_DEFRAG_IPV6=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NF_CONNTRACK_IPV6=y
|
|
|
|
CONFIG_IP6_NF_IPTABLES=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_IP6_NF_MATCH_AH is not set
|
|
|
|
# CONFIG_IP6_NF_MATCH_EUI64 is not set
|
|
|
|
# CONFIG_IP6_NF_MATCH_FRAG is not set
|
|
|
|
# CONFIG_IP6_NF_MATCH_OPTS is not set
|
|
|
|
# CONFIG_IP6_NF_MATCH_HL is not set
|
|
|
|
# CONFIG_IP6_NF_MATCH_IPV6HEADER is not set
|
|
|
|
# CONFIG_IP6_NF_MATCH_MH is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_IP6_NF_MATCH_RPFILTER=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_IP6_NF_MATCH_RT is not set
|
|
|
|
# CONFIG_IP6_NF_TARGET_HL is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_IP6_NF_FILTER=y
|
|
|
|
CONFIG_IP6_NF_TARGET_REJECT=y
|
|
|
|
CONFIG_IP6_NF_TARGET_REJECT_SKERR=y
|
|
|
|
CONFIG_IP6_NF_MANGLE=y
|
|
|
|
CONFIG_IP6_NF_RAW=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_IP6_NF_SECURITY is not set
|
|
|
|
# CONFIG_NF_NAT_IPV6 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_BRIDGE_NF_EBTABLES=y
|
|
|
|
CONFIG_BRIDGE_EBT_BROUTE=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_BRIDGE_EBT_T_FILTER is not set
|
|
|
|
# CONFIG_BRIDGE_EBT_T_NAT is not set
|
|
|
|
# CONFIG_BRIDGE_EBT_802_3 is not set
|
|
|
|
# CONFIG_BRIDGE_EBT_AMONG is not set
|
|
|
|
# CONFIG_BRIDGE_EBT_ARP is not set
|
|
|
|
# CONFIG_BRIDGE_EBT_IP is not set
|
|
|
|
# CONFIG_BRIDGE_EBT_IP6 is not set
|
|
|
|
# CONFIG_BRIDGE_EBT_LIMIT is not set
|
|
|
|
# CONFIG_BRIDGE_EBT_MARK is not set
|
|
|
|
# CONFIG_BRIDGE_EBT_PKTTYPE is not set
|
|
|
|
# CONFIG_BRIDGE_EBT_STP is not set
|
|
|
|
# CONFIG_BRIDGE_EBT_VLAN is not set
|
|
|
|
# CONFIG_BRIDGE_EBT_ARPREPLY is not set
|
|
|
|
# CONFIG_BRIDGE_EBT_DNAT is not set
|
|
|
|
# CONFIG_BRIDGE_EBT_MARK_T is not set
|
|
|
|
# CONFIG_BRIDGE_EBT_REDIRECT is not set
|
|
|
|
# CONFIG_BRIDGE_EBT_SNAT is not set
|
|
|
|
# CONFIG_BRIDGE_EBT_LOG is not set
|
|
|
|
# CONFIG_BRIDGE_EBT_ULOG is not set
|
|
|
|
# CONFIG_BRIDGE_EBT_NFLOG is not set
|
|
|
|
# CONFIG_IP_DCCP is not set
|
|
|
|
# CONFIG_IP_SCTP is not set
|
|
|
|
# CONFIG_RDS is not set
|
|
|
|
# CONFIG_TIPC is not set
|
|
|
|
# CONFIG_ATM is not set
|
|
|
|
# CONFIG_L2TP is not set
|
|
|
|
CONFIG_STP=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_BRIDGE=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_BRIDGE_IGMP_SNOOPING=y
|
|
|
|
CONFIG_HAVE_NET_DSA=y
|
|
|
|
# CONFIG_VLAN_8021Q is not set
|
|
|
|
# CONFIG_DECNET is not set
|
|
|
|
CONFIG_LLC=y
|
|
|
|
# CONFIG_LLC2 is not set
|
|
|
|
# CONFIG_IPX is not set
|
|
|
|
# CONFIG_ATALK is not set
|
|
|
|
# CONFIG_X25 is not set
|
|
|
|
# CONFIG_LAPB is not set
|
|
|
|
# CONFIG_PHONET is not set
|
|
|
|
# CONFIG_IEEE802154 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NET_SCHED=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# Queueing/Scheduling
|
|
|
|
#
|
|
|
|
# CONFIG_NET_SCH_CBQ is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NET_SCH_HTB=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NET_SCH_HFSC is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NET_SCH_PRIO=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NET_SCH_MULTIQ is not set
|
|
|
|
# CONFIG_NET_SCH_RED is not set
|
|
|
|
# CONFIG_NET_SCH_SFB is not set
|
|
|
|
# CONFIG_NET_SCH_SFQ is not set
|
|
|
|
# CONFIG_NET_SCH_TEQL is not set
|
|
|
|
# CONFIG_NET_SCH_TBF is not set
|
|
|
|
# CONFIG_NET_SCH_GRED is not set
|
|
|
|
# CONFIG_NET_SCH_DSMARK is not set
|
|
|
|
# CONFIG_NET_SCH_NETEM is not set
|
|
|
|
# CONFIG_NET_SCH_DRR is not set
|
|
|
|
# CONFIG_NET_SCH_MQPRIO is not set
|
|
|
|
# CONFIG_NET_SCH_CHOKE is not set
|
|
|
|
# CONFIG_NET_SCH_QFQ is not set
|
|
|
|
# CONFIG_NET_SCH_CODEL is not set
|
|
|
|
# CONFIG_NET_SCH_FQ_CODEL is not set
|
|
|
|
# CONFIG_NET_SCH_INGRESS is not set
|
|
|
|
# CONFIG_NET_SCH_PLUG is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Classification
|
|
|
|
#
|
|
|
|
CONFIG_NET_CLS=y
|
|
|
|
# CONFIG_NET_CLS_BASIC is not set
|
|
|
|
# CONFIG_NET_CLS_TCINDEX is not set
|
|
|
|
# CONFIG_NET_CLS_ROUTE4 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NET_CLS_FW=y
|
|
|
|
CONFIG_NET_CLS_U32=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_CLS_U32_PERF is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_CLS_U32_MARK=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NET_CLS_RSVP is not set
|
|
|
|
# CONFIG_NET_CLS_RSVP6 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NET_CLS_FLOW=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NET_CLS_CGROUP is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NET_EMATCH=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_NET_EMATCH_STACK=32
|
|
|
|
# CONFIG_NET_EMATCH_CMP is not set
|
|
|
|
# CONFIG_NET_EMATCH_NBYTE is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NET_EMATCH_U32=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NET_EMATCH_META is not set
|
|
|
|
# CONFIG_NET_EMATCH_TEXT is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NET_CLS_ACT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NET_ACT_POLICE is not set
|
|
|
|
# CONFIG_NET_ACT_GACT is not set
|
|
|
|
# CONFIG_NET_ACT_MIRRED is not set
|
|
|
|
# CONFIG_NET_ACT_IPT is not set
|
|
|
|
# CONFIG_NET_ACT_NAT is not set
|
|
|
|
# CONFIG_NET_ACT_PEDIT is not set
|
|
|
|
# CONFIG_NET_ACT_SIMP is not set
|
|
|
|
# CONFIG_NET_ACT_SKBEDIT is not set
|
|
|
|
# CONFIG_NET_ACT_CSUM is not set
|
|
|
|
# CONFIG_NET_CLS_IND is not set
|
|
|
|
CONFIG_NET_SCH_FIFO=y
|
|
|
|
# CONFIG_DCB is not set
|
|
|
|
CONFIG_DNS_RESOLVER=y
|
|
|
|
# CONFIG_BATMAN_ADV is not set
|
|
|
|
# CONFIG_OPENVSWITCH is not set
|
|
|
|
# CONFIG_VSOCKETS is not set
|
|
|
|
# CONFIG_NETLINK_MMAP is not set
|
|
|
|
# CONFIG_NETLINK_DIAG is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_RMNET_DATA=y
|
|
|
|
CONFIG_RMNET_DATA_FC=y
|
|
|
|
CONFIG_RMNET_DATA_DEBUG_PKT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_RPS=y
|
|
|
|
CONFIG_RFS_ACCEL=y
|
|
|
|
CONFIG_XPS=y
|
|
|
|
# CONFIG_NETPRIO_CGROUP is not set
|
|
|
|
CONFIG_BQL=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SOCKEV_NLMCAST=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# Network testing
|
|
|
|
#
|
|
|
|
# CONFIG_NET_PKTGEN is not set
|
|
|
|
# CONFIG_NET_DROP_MONITOR is not set
|
|
|
|
# CONFIG_HAMRADIO is not set
|
|
|
|
# CONFIG_CAN is not set
|
|
|
|
# CONFIG_IRDA is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_BT=y
|
|
|
|
CONFIG_BT_RFCOMM=y
|
|
|
|
CONFIG_BT_RFCOMM_TTY=y
|
|
|
|
CONFIG_BT_BNEP=y
|
|
|
|
CONFIG_BT_BNEP_MC_FILTER=y
|
|
|
|
CONFIG_BT_BNEP_PROTO_FILTER=y
|
|
|
|
CONFIG_BT_HIDP=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# Bluetooth device drivers
|
|
|
|
#
|
|
|
|
# CONFIG_BT_HCIBTUSB is not set
|
|
|
|
# CONFIG_BT_HCIBTSDIO is not set
|
|
|
|
# CONFIG_BT_HCIUART is not set
|
|
|
|
# CONFIG_BT_HCIBCM203X is not set
|
|
|
|
# CONFIG_BT_HCIBPA10X is not set
|
|
|
|
# CONFIG_BT_HCIBFUSB is not set
|
|
|
|
# CONFIG_BT_HCIVHCI is not set
|
|
|
|
# CONFIG_BT_MRVL is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
# CONFIG_MSM_BT_POWER is not set
|
|
|
|
CONFIG_BT_BCM43XX=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# BROADCOM V4L2 BT/FM device drivers
|
|
|
|
#
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_BT_PROTOCOL_DRIVER=y
|
|
|
|
CONFIG_LINE_DISCIPLINE_DRIVER=y
|
|
|
|
CONFIG_V4L2_ANT_DRIVER=y
|
|
|
|
CONFIG_V4L2_FM_DRIVER=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_AF_RXRPC is not set
|
|
|
|
CONFIG_FIB_RULES=y
|
|
|
|
CONFIG_WIRELESS=y
|
|
|
|
CONFIG_WIRELESS_EXT=y
|
|
|
|
CONFIG_WEXT_CORE=y
|
|
|
|
CONFIG_WEXT_PROC=y
|
|
|
|
CONFIG_WEXT_SPY=y
|
|
|
|
CONFIG_WEXT_PRIV=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_CFG80211=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_NL80211_TESTMODE=y
|
|
|
|
# CONFIG_CFG80211_DEVELOPER_WARNINGS is not set
|
|
|
|
# CONFIG_CFG80211_REG_DEBUG is not set
|
|
|
|
# CONFIG_CFG80211_CERTIFICATION_ONUS is not set
|
|
|
|
CONFIG_CFG80211_DEFAULT_PS=y
|
|
|
|
# CONFIG_CFG80211_DEBUGFS is not set
|
|
|
|
# CONFIG_CFG80211_INTERNAL_REGDB is not set
|
|
|
|
# CONFIG_CFG80211_WEXT is not set
|
|
|
|
# CONFIG_LIB80211 is not set
|
|
|
|
# CONFIG_CFG80211_ALLOW_RECONNECT is not set
|
|
|
|
# CONFIG_MAC80211 is not set
|
|
|
|
# CONFIG_WIMAX is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_RFKILL=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_RFKILL_PM=y
|
|
|
|
CONFIG_RFKILL_LEDS=y
|
|
|
|
# CONFIG_RFKILL_INPUT is not set
|
|
|
|
# CONFIG_RFKILL_REGULATOR is not set
|
|
|
|
# CONFIG_RFKILL_GPIO is not set
|
|
|
|
# CONFIG_NET_9P is not set
|
|
|
|
# CONFIG_CAIF is not set
|
|
|
|
# CONFIG_CEPH_LIB is not set
|
|
|
|
# CONFIG_NFC is not set
|
|
|
|
# CONFIG_NFC_QNCI is not set
|
|
|
|
# CONFIG_NFC_NQ is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_IPC_ROUTER=y
|
|
|
|
CONFIG_IPC_ROUTER_SECURITY=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# Device Drivers
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# Generic Driver Options
|
|
|
|
#
|
|
|
|
CONFIG_UEVENT_HELPER_PATH=""
|
|
|
|
CONFIG_DEVTMPFS=y
|
|
|
|
# CONFIG_DEVTMPFS_MOUNT is not set
|
|
|
|
CONFIG_STANDALONE=y
|
|
|
|
CONFIG_PREVENT_FIRMWARE_BUILD=y
|
|
|
|
CONFIG_FW_LOADER=y
|
|
|
|
CONFIG_FIRMWARE_IN_KERNEL=y
|
|
|
|
CONFIG_EXTRA_FIRMWARE=""
|
|
|
|
CONFIG_FW_LOADER_USER_HELPER=y
|
|
|
|
# CONFIG_DEBUG_DRIVER is not set
|
|
|
|
# CONFIG_DEBUG_DEVRES is not set
|
|
|
|
# CONFIG_SYS_HYPERVISOR is not set
|
|
|
|
# CONFIG_GENERIC_CPU_DEVICES is not set
|
|
|
|
CONFIG_HAVE_CPU_AUTOPROBE=y
|
|
|
|
CONFIG_GENERIC_CPU_AUTOPROBE=y
|
|
|
|
CONFIG_SOC_BUS=y
|
|
|
|
CONFIG_REGMAP=y
|
|
|
|
CONFIG_REGMAP_I2C=y
|
|
|
|
CONFIG_REGMAP_SPI=y
|
|
|
|
CONFIG_DMA_SHARED_BUFFER=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_CMA=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_CMA_DEBUG is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Default contiguous memory area size:
|
|
|
|
#
|
|
|
|
CONFIG_CMA_SIZE_MBYTES=16
|
|
|
|
CONFIG_CMA_SIZE_SEL_MBYTES=y
|
|
|
|
# CONFIG_CMA_SIZE_SEL_PERCENTAGE is not set
|
|
|
|
# CONFIG_CMA_SIZE_SEL_MIN is not set
|
|
|
|
# CONFIG_CMA_SIZE_SEL_MAX is not set
|
|
|
|
CONFIG_CMA_ALIGNMENT=8
|
|
|
|
CONFIG_CMA_AREAS=15
|
|
|
|
# CONFIG_CMA_RESERVE_DEFAULT_AREA is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Bus devices
|
|
|
|
#
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_ARM_CCI=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_CONNECTOR is not set
|
|
|
|
# CONFIG_MTD is not set
|
|
|
|
CONFIG_DTC=y
|
|
|
|
CONFIG_OF=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# Device Tree and Open Firmware support
|
|
|
|
#
|
|
|
|
# CONFIG_PROC_DEVICETREE is not set
|
|
|
|
# CONFIG_OF_SELFTEST is not set
|
|
|
|
CONFIG_OF_FLATTREE=y
|
|
|
|
CONFIG_OF_EARLY_FLATTREE=y
|
|
|
|
CONFIG_OF_ADDRESS=y
|
|
|
|
CONFIG_OF_IRQ=y
|
|
|
|
CONFIG_OF_DEVICE=y
|
|
|
|
CONFIG_OF_I2C=y
|
|
|
|
CONFIG_OF_NET=y
|
|
|
|
CONFIG_OF_MDIO=y
|
|
|
|
CONFIG_OF_PCI=y
|
|
|
|
CONFIG_OF_PCI_IRQ=y
|
|
|
|
CONFIG_OF_SPMI=y
|
|
|
|
CONFIG_OF_SLIMBUS=y
|
|
|
|
CONFIG_OF_BATTERYDATA=y
|
|
|
|
CONFIG_OF_RESERVED_MEM=y
|
|
|
|
# CONFIG_PARPORT is not set
|
|
|
|
CONFIG_BLK_DEV=y
|
|
|
|
# CONFIG_BLK_DEV_PCIESSD_MTIP32XX is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_ZRAM=y
|
|
|
|
CONFIG_ZRAM_LZ4_COMPRESS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_ZRAM_DEBUG is not set
|
|
|
|
# CONFIG_BLK_CPQ_CISS_DA is not set
|
|
|
|
# CONFIG_BLK_DEV_DAC960 is not set
|
|
|
|
# CONFIG_BLK_DEV_UMEM is not set
|
|
|
|
# CONFIG_BLK_DEV_COW_COMMON is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_BLK_DEV_LOOP=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_BLK_DEV_LOOP_MIN_COUNT=8
|
|
|
|
# CONFIG_BLK_DEV_CRYPTOLOOP is not set
|
|
|
|
# CONFIG_BLK_DEV_DRBD is not set
|
|
|
|
# CONFIG_BLK_DEV_NBD is not set
|
|
|
|
# CONFIG_BLK_DEV_NVME is not set
|
|
|
|
# CONFIG_BLK_DEV_SX8 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_BLK_DEV_RAM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_BLK_DEV_RAM_COUNT=16
|
|
|
|
CONFIG_BLK_DEV_RAM_SIZE=4096
|
|
|
|
# CONFIG_BLK_DEV_XIP is not set
|
|
|
|
# CONFIG_CDROM_PKTCDVD is not set
|
|
|
|
# CONFIG_ATA_OVER_ETH is not set
|
|
|
|
# CONFIG_BLK_DEV_RBD is not set
|
|
|
|
# CONFIG_BLK_DEV_RSXX is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Misc devices
|
|
|
|
#
|
|
|
|
# CONFIG_SENSORS_LIS3LV02D is not set
|
|
|
|
# CONFIG_AD525X_DPOT is not set
|
|
|
|
# CONFIG_ATMEL_PWM is not set
|
|
|
|
# CONFIG_DUMMY_IRQ is not set
|
|
|
|
# CONFIG_PHANTOM is not set
|
|
|
|
# CONFIG_INTEL_MID_PTI is not set
|
|
|
|
# CONFIG_SGI_IOC4 is not set
|
|
|
|
# CONFIG_TIFM_CORE is not set
|
|
|
|
# CONFIG_ICS932S401 is not set
|
|
|
|
# CONFIG_ATMEL_SSC is not set
|
|
|
|
# CONFIG_ENCLOSURE_SERVICES is not set
|
|
|
|
# CONFIG_HP_ILO is not set
|
|
|
|
# CONFIG_APDS9802ALS is not set
|
|
|
|
# CONFIG_APDS9930 is not set
|
|
|
|
# CONFIG_ISL29003 is not set
|
|
|
|
# CONFIG_ISL29020 is not set
|
|
|
|
# CONFIG_SENSORS_TSL2550 is not set
|
|
|
|
# CONFIG_SENSORS_BH1780 is not set
|
|
|
|
# CONFIG_SENSORS_BH1770 is not set
|
|
|
|
# CONFIG_SENSORS_APDS990X is not set
|
|
|
|
# CONFIG_HMC6352 is not set
|
|
|
|
# CONFIG_DS1682 is not set
|
|
|
|
# CONFIG_TI_DAC7512 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_UID_STAT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_BMP085_I2C is not set
|
|
|
|
# CONFIG_BMP085_SPI is not set
|
|
|
|
# CONFIG_PCH_PHUB is not set
|
|
|
|
# CONFIG_USB_SWITCH_FSA9480 is not set
|
|
|
|
# CONFIG_LATTICE_ECP3_CONFIG is not set
|
|
|
|
# CONFIG_SRAM is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_UID_CPUTIME=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_HAPTIC_ISA1200 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_PMI8994_FLASH=y
|
|
|
|
CONFIG_QSEECOM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_QFP_FUSE is not set
|
|
|
|
# CONFIG_QPNP_MISC is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NFC_PN547=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NFC_PN547_PMC_CLK_REQ is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_TI_DRV2667=y
|
|
|
|
CONFIG_QCOM_LIQUID_DOCK=y
|
|
|
|
CONFIG_RAMDUMP_TAGS=y
|
|
|
|
CONFIG_POWERKEY_FORCECRASH=y
|
|
|
|
CONFIG_RAMDUMP_MEMDESC=y
|
|
|
|
CONFIG_CRASH_LAST_LOGS=y
|
|
|
|
CONFIG_BCM_WLAN_RAMDUMP=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_BD7602_POWER_IC is not set
|
|
|
|
# CONFIG_CXD224X_NFC is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_LDO_VIBRATOR=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_AD7146 is not set
|
|
|
|
# CONFIG_ONESEG_TUNER_SMTVJ19X is not set
|
|
|
|
# CONFIG_ISDBT_TUNER_SMTEJ12X is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SIM_DETECT=y
|
|
|
|
CONFIG_TRAY_SHARED_INTERRUPT_DETECT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_C2PORT is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# EEPROM support
|
|
|
|
#
|
|
|
|
# CONFIG_EEPROM_AT24 is not set
|
|
|
|
# CONFIG_EEPROM_AT25 is not set
|
|
|
|
# CONFIG_EEPROM_LEGACY is not set
|
|
|
|
# CONFIG_EEPROM_MAX6875 is not set
|
|
|
|
# CONFIG_EEPROM_93CX6 is not set
|
|
|
|
# CONFIG_EEPROM_93XX46 is not set
|
|
|
|
# CONFIG_CB710_CORE is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Texas Instruments shared transport line discipline
|
|
|
|
#
|
|
|
|
# CONFIG_TI_ST is not set
|
|
|
|
# CONFIG_SENSORS_LIS3_SPI is not set
|
|
|
|
# CONFIG_SENSORS_LIS3_I2C is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Altera FPGA firmware download module
|
|
|
|
#
|
|
|
|
# CONFIG_ALTERA_STAPL is not set
|
|
|
|
CONFIG_MSM_QDSP6V2_CODECS=y
|
|
|
|
CONFIG_MSM_ULTRASOUND=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# SCSI device support
|
|
|
|
#
|
|
|
|
CONFIG_SCSI_MOD=y
|
|
|
|
# CONFIG_RAID_ATTRS is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SCSI=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_SCSI_DMA=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SCSI_TGT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SCSI_NETLINK is not set
|
|
|
|
CONFIG_SCSI_PROC_FS=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# SCSI support type (disk, tape, CD-ROM)
|
|
|
|
#
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_BLK_DEV_SD=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_CHR_DEV_ST is not set
|
|
|
|
# CONFIG_CHR_DEV_OSST is not set
|
|
|
|
# CONFIG_BLK_DEV_SR is not set
|
|
|
|
# CONFIG_CHR_DEV_SG is not set
|
|
|
|
# CONFIG_CHR_DEV_SCH is not set
|
|
|
|
# CONFIG_SCSI_MULTI_LUN is not set
|
|
|
|
# CONFIG_SCSI_CONSTANTS is not set
|
|
|
|
# CONFIG_SCSI_LOGGING is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SCSI_SCAN_ASYNC=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# SCSI Transports
|
|
|
|
#
|
|
|
|
# CONFIG_SCSI_SPI_ATTRS is not set
|
|
|
|
# CONFIG_SCSI_FC_ATTRS is not set
|
|
|
|
# CONFIG_SCSI_ISCSI_ATTRS is not set
|
|
|
|
# CONFIG_SCSI_SAS_ATTRS is not set
|
|
|
|
# CONFIG_SCSI_SAS_LIBSAS is not set
|
|
|
|
# CONFIG_SCSI_SRP_ATTRS is not set
|
|
|
|
CONFIG_SCSI_LOWLEVEL=y
|
|
|
|
# CONFIG_ISCSI_TCP is not set
|
|
|
|
# CONFIG_ISCSI_BOOT_SYSFS is not set
|
|
|
|
# CONFIG_SCSI_CXGB3_ISCSI is not set
|
|
|
|
# CONFIG_SCSI_CXGB4_ISCSI is not set
|
|
|
|
# CONFIG_SCSI_BNX2_ISCSI is not set
|
|
|
|
# CONFIG_SCSI_BNX2X_FCOE is not set
|
|
|
|
# CONFIG_BE2ISCSI is not set
|
|
|
|
# CONFIG_BLK_DEV_3W_XXXX_RAID is not set
|
|
|
|
# CONFIG_SCSI_HPSA is not set
|
|
|
|
# CONFIG_SCSI_3W_9XXX is not set
|
|
|
|
# CONFIG_SCSI_3W_SAS is not set
|
|
|
|
# CONFIG_SCSI_ACARD is not set
|
|
|
|
# CONFIG_SCSI_AACRAID is not set
|
|
|
|
# CONFIG_SCSI_AIC7XXX is not set
|
|
|
|
# CONFIG_SCSI_AIC7XXX_OLD is not set
|
|
|
|
# CONFIG_SCSI_AIC79XX is not set
|
|
|
|
# CONFIG_SCSI_AIC94XX is not set
|
|
|
|
# CONFIG_SCSI_MVSAS is not set
|
|
|
|
# CONFIG_SCSI_MVUMI is not set
|
|
|
|
# CONFIG_SCSI_ARCMSR is not set
|
|
|
|
# CONFIG_MEGARAID_NEWGEN is not set
|
|
|
|
# CONFIG_MEGARAID_LEGACY is not set
|
|
|
|
# CONFIG_MEGARAID_SAS is not set
|
|
|
|
# CONFIG_SCSI_MPT2SAS is not set
|
|
|
|
# CONFIG_SCSI_MPT3SAS is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SCSI_UFSHCD=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SCSI_UFSHCD_PCI is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SCSI_UFSHCD_PLATFORM=y
|
|
|
|
CONFIG_SCSI_UFS_QCOM=y
|
|
|
|
CONFIG_SCSI_UFS_QCOM_ICE=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SCSI_HPTIOP is not set
|
|
|
|
# CONFIG_LIBFC is not set
|
|
|
|
# CONFIG_LIBFCOE is not set
|
|
|
|
# CONFIG_FCOE is not set
|
|
|
|
# CONFIG_SCSI_DMX3191D is not set
|
|
|
|
# CONFIG_SCSI_FUTURE_DOMAIN is not set
|
|
|
|
# CONFIG_SCSI_IPS is not set
|
|
|
|
# CONFIG_SCSI_INITIO is not set
|
|
|
|
# CONFIG_SCSI_INIA100 is not set
|
|
|
|
# CONFIG_SCSI_STEX is not set
|
|
|
|
# CONFIG_SCSI_SYM53C8XX_2 is not set
|
|
|
|
# CONFIG_SCSI_QLOGIC_1280 is not set
|
|
|
|
# CONFIG_SCSI_QLA_FC is not set
|
|
|
|
# CONFIG_SCSI_QLA_ISCSI is not set
|
|
|
|
# CONFIG_SCSI_LPFC is not set
|
|
|
|
# CONFIG_SCSI_DC395x is not set
|
|
|
|
# CONFIG_SCSI_DC390T is not set
|
|
|
|
# CONFIG_SCSI_DEBUG is not set
|
|
|
|
# CONFIG_SCSI_PMCRAID is not set
|
|
|
|
# CONFIG_SCSI_PM8001 is not set
|
|
|
|
# CONFIG_SCSI_SRP is not set
|
|
|
|
# CONFIG_SCSI_BFA_FC is not set
|
|
|
|
# CONFIG_SCSI_CHELSIO_FCOE is not set
|
|
|
|
# CONFIG_SCSI_LOWLEVEL_PCMCIA is not set
|
|
|
|
# CONFIG_SCSI_DH is not set
|
|
|
|
# CONFIG_SCSI_OSD_INITIATOR is not set
|
|
|
|
CONFIG_HAVE_PATA_PLATFORM=y
|
|
|
|
# CONFIG_ATA is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MD=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_BLK_DEV_MD is not set
|
|
|
|
# CONFIG_BCACHE is not set
|
|
|
|
CONFIG_BLK_DEV_DM_BUILTIN=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_BLK_DEV_DM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_DM_DEBUG is not set
|
|
|
|
CONFIG_DM_BUFIO=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_DM_CRYPT=y
|
|
|
|
CONFIG_DM_REQ_CRYPT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_DM_SNAPSHOT is not set
|
|
|
|
# CONFIG_DM_THIN_PROVISIONING is not set
|
|
|
|
# CONFIG_DM_CACHE is not set
|
|
|
|
# CONFIG_DM_MIRROR is not set
|
|
|
|
# CONFIG_DM_RAID is not set
|
|
|
|
# CONFIG_DM_ZERO is not set
|
|
|
|
# CONFIG_DM_MULTIPATH is not set
|
|
|
|
# CONFIG_DM_DELAY is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_DM_UEVENT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_DM_FLAKEY is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_DM_VERITY=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_DM_VERITY_FEC is not set
|
|
|
|
# CONFIG_PANIC_ON_DM_VERITY_ERRORS is not set
|
|
|
|
# CONFIG_TARGET_CORE is not set
|
|
|
|
# CONFIG_FUSION is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# IEEE 1394 (FireWire) support
|
|
|
|
#
|
|
|
|
# CONFIG_FIREWIRE is not set
|
|
|
|
# CONFIG_FIREWIRE_NOSY is not set
|
|
|
|
# CONFIG_I2O is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NETDEVICES=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_NET_CORE=y
|
|
|
|
# CONFIG_BONDING is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_DUMMY=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_EQUALIZER is not set
|
|
|
|
# CONFIG_NET_FC is not set
|
|
|
|
CONFIG_MII=y
|
|
|
|
# CONFIG_IFB is not set
|
|
|
|
# CONFIG_NET_TEAM is not set
|
|
|
|
# CONFIG_MACVLAN is not set
|
|
|
|
# CONFIG_VXLAN is not set
|
|
|
|
# CONFIG_NETCONSOLE is not set
|
|
|
|
# CONFIG_NETPOLL is not set
|
|
|
|
# CONFIG_NET_POLL_CONTROLLER is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_TUN=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_VETH is not set
|
|
|
|
# CONFIG_ARCNET is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# CAIF transport drivers
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# Distributed Switch Architecture drivers
|
|
|
|
#
|
|
|
|
# CONFIG_NET_DSA_MV88E6XXX is not set
|
|
|
|
# CONFIG_NET_DSA_MV88E6060 is not set
|
|
|
|
# CONFIG_NET_DSA_MV88E6XXX_NEED_PPU is not set
|
|
|
|
# CONFIG_NET_DSA_MV88E6131 is not set
|
|
|
|
# CONFIG_NET_DSA_MV88E6123_61_65 is not set
|
|
|
|
CONFIG_ETHERNET=y
|
|
|
|
CONFIG_NET_VENDOR_3COM=y
|
|
|
|
# CONFIG_TYPHOON is not set
|
|
|
|
CONFIG_NET_VENDOR_ADAPTEC=y
|
|
|
|
# CONFIG_ADAPTEC_STARFIRE is not set
|
|
|
|
CONFIG_NET_VENDOR_ALTEON=y
|
|
|
|
# CONFIG_ACENIC is not set
|
|
|
|
CONFIG_NET_VENDOR_AMD=y
|
|
|
|
# CONFIG_AMD8111_ETH is not set
|
|
|
|
# CONFIG_PCNET32 is not set
|
|
|
|
CONFIG_NET_VENDOR_ATHEROS=y
|
|
|
|
# CONFIG_ATL2 is not set
|
|
|
|
# CONFIG_ATL1 is not set
|
|
|
|
# CONFIG_ATL1E is not set
|
|
|
|
# CONFIG_ATL1C is not set
|
|
|
|
# CONFIG_ALX is not set
|
|
|
|
CONFIG_NET_CADENCE=y
|
|
|
|
# CONFIG_ARM_AT91_ETHER is not set
|
|
|
|
# CONFIG_MACB is not set
|
|
|
|
CONFIG_NET_VENDOR_BROADCOM=y
|
|
|
|
# CONFIG_B44 is not set
|
|
|
|
# CONFIG_BNX2 is not set
|
|
|
|
# CONFIG_CNIC is not set
|
|
|
|
# CONFIG_TIGON3 is not set
|
|
|
|
# CONFIG_BNX2X is not set
|
|
|
|
CONFIG_NET_VENDOR_BROCADE=y
|
|
|
|
# CONFIG_BNA is not set
|
|
|
|
# CONFIG_NET_CALXEDA_XGMAC is not set
|
|
|
|
CONFIG_NET_VENDOR_CHELSIO=y
|
|
|
|
# CONFIG_CHELSIO_T1 is not set
|
|
|
|
# CONFIG_CHELSIO_T3 is not set
|
|
|
|
# CONFIG_CHELSIO_T4 is not set
|
|
|
|
# CONFIG_CHELSIO_T4VF is not set
|
|
|
|
CONFIG_NET_VENDOR_CISCO=y
|
|
|
|
# CONFIG_ENIC is not set
|
|
|
|
# CONFIG_DNET is not set
|
|
|
|
CONFIG_NET_VENDOR_DEC=y
|
|
|
|
# CONFIG_NET_TULIP is not set
|
|
|
|
CONFIG_NET_VENDOR_DLINK=y
|
|
|
|
# CONFIG_DL2K is not set
|
|
|
|
# CONFIG_SUNDANCE is not set
|
|
|
|
CONFIG_NET_VENDOR_EMULEX=y
|
|
|
|
# CONFIG_BE2NET is not set
|
|
|
|
CONFIG_NET_VENDOR_EXAR=y
|
|
|
|
# CONFIG_S2IO is not set
|
|
|
|
# CONFIG_VXGE is not set
|
|
|
|
CONFIG_NET_VENDOR_HP=y
|
|
|
|
# CONFIG_HP100 is not set
|
|
|
|
CONFIG_NET_VENDOR_INTEL=y
|
|
|
|
# CONFIG_E100 is not set
|
|
|
|
# CONFIG_E1000 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_E1000E=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_IGB is not set
|
|
|
|
# CONFIG_IGBVF is not set
|
|
|
|
# CONFIG_IXGB is not set
|
|
|
|
# CONFIG_IXGBE is not set
|
|
|
|
# CONFIG_IXGBEVF is not set
|
|
|
|
CONFIG_NET_VENDOR_I825XX=y
|
|
|
|
# CONFIG_IP1000 is not set
|
|
|
|
# CONFIG_JME is not set
|
|
|
|
CONFIG_NET_VENDOR_MARVELL=y
|
|
|
|
# CONFIG_MVMDIO is not set
|
|
|
|
# CONFIG_SKGE is not set
|
|
|
|
# CONFIG_SKY2 is not set
|
|
|
|
CONFIG_NET_VENDOR_MELLANOX=y
|
|
|
|
# CONFIG_MLX4_EN is not set
|
|
|
|
# CONFIG_MLX4_CORE is not set
|
|
|
|
CONFIG_NET_VENDOR_MICREL=y
|
|
|
|
# CONFIG_KS8842 is not set
|
|
|
|
# CONFIG_KS8851 is not set
|
|
|
|
# CONFIG_KS8851_MLL is not set
|
|
|
|
# CONFIG_KSZ884X_PCI is not set
|
|
|
|
CONFIG_NET_VENDOR_MICROCHIP=y
|
|
|
|
# CONFIG_ENC28J60 is not set
|
|
|
|
# CONFIG_NET_VENDOR_MSM is not set
|
|
|
|
# CONFIG_MSM_RMNET_WWAN is not set
|
|
|
|
# CONFIG_ECM_IPA is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_RNDIS_IPA=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_NET_VENDOR_MYRI=y
|
|
|
|
# CONFIG_MYRI10GE is not set
|
|
|
|
# CONFIG_FEALNX is not set
|
|
|
|
CONFIG_NET_VENDOR_NATSEMI=y
|
|
|
|
# CONFIG_NATSEMI is not set
|
|
|
|
# CONFIG_NS83820 is not set
|
|
|
|
CONFIG_NET_VENDOR_8390=y
|
|
|
|
# CONFIG_NE2K_PCI is not set
|
|
|
|
CONFIG_NET_VENDOR_NVIDIA=y
|
|
|
|
# CONFIG_FORCEDETH is not set
|
|
|
|
CONFIG_NET_VENDOR_OKI=y
|
|
|
|
# CONFIG_PCH_GBE is not set
|
|
|
|
# CONFIG_ETHOC is not set
|
|
|
|
CONFIG_NET_PACKET_ENGINE=y
|
|
|
|
# CONFIG_HAMACHI is not set
|
|
|
|
# CONFIG_YELLOWFIN is not set
|
|
|
|
CONFIG_NET_VENDOR_QLOGIC=y
|
|
|
|
# CONFIG_QLA3XXX is not set
|
|
|
|
# CONFIG_QLCNIC is not set
|
|
|
|
# CONFIG_QLGE is not set
|
|
|
|
# CONFIG_NETXEN_NIC is not set
|
|
|
|
CONFIG_NET_VENDOR_REALTEK=y
|
|
|
|
# CONFIG_8139CP is not set
|
|
|
|
# CONFIG_8139TOO is not set
|
|
|
|
# CONFIG_R8169 is not set
|
|
|
|
CONFIG_NET_VENDOR_RDC=y
|
|
|
|
# CONFIG_R6040 is not set
|
|
|
|
CONFIG_NET_VENDOR_SEEQ=y
|
|
|
|
CONFIG_NET_VENDOR_SILAN=y
|
|
|
|
# CONFIG_SC92031 is not set
|
|
|
|
CONFIG_NET_VENDOR_SIS=y
|
|
|
|
# CONFIG_SIS900 is not set
|
|
|
|
# CONFIG_SIS190 is not set
|
|
|
|
# CONFIG_SFC is not set
|
|
|
|
CONFIG_NET_VENDOR_SMSC=y
|
|
|
|
# CONFIG_SMC91X is not set
|
|
|
|
# CONFIG_EPIC100 is not set
|
|
|
|
# CONFIG_SMSC9420 is not set
|
|
|
|
CONFIG_NET_VENDOR_STMICRO=y
|
|
|
|
# CONFIG_STMMAC_ETH is not set
|
|
|
|
CONFIG_NET_VENDOR_SUN=y
|
|
|
|
# CONFIG_HAPPYMEAL is not set
|
|
|
|
# CONFIG_SUNGEM is not set
|
|
|
|
# CONFIG_CASSINI is not set
|
|
|
|
# CONFIG_NIU is not set
|
|
|
|
CONFIG_NET_VENDOR_TEHUTI=y
|
|
|
|
# CONFIG_TEHUTI is not set
|
|
|
|
CONFIG_NET_VENDOR_TI=y
|
|
|
|
# CONFIG_TLAN is not set
|
|
|
|
CONFIG_NET_VENDOR_VIA=y
|
|
|
|
# CONFIG_VIA_RHINE is not set
|
|
|
|
# CONFIG_VIA_VELOCITY is not set
|
|
|
|
CONFIG_NET_VENDOR_WIZNET=y
|
|
|
|
# CONFIG_WIZNET_W5100 is not set
|
|
|
|
# CONFIG_WIZNET_W5300 is not set
|
|
|
|
# CONFIG_FDDI is not set
|
|
|
|
# CONFIG_HIPPI is not set
|
|
|
|
CONFIG_PHYLIB=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# MII PHY device drivers
|
|
|
|
#
|
|
|
|
# CONFIG_AT803X_PHY is not set
|
|
|
|
# CONFIG_AMD_PHY is not set
|
|
|
|
# CONFIG_MARVELL_PHY is not set
|
|
|
|
# CONFIG_DAVICOM_PHY is not set
|
|
|
|
# CONFIG_QSEMI_PHY is not set
|
|
|
|
# CONFIG_LXT_PHY is not set
|
|
|
|
# CONFIG_CICADA_PHY is not set
|
|
|
|
# CONFIG_VITESSE_PHY is not set
|
|
|
|
# CONFIG_SMSC_PHY is not set
|
|
|
|
# CONFIG_BROADCOM_PHY is not set
|
|
|
|
# CONFIG_BCM87XX_PHY is not set
|
|
|
|
# CONFIG_ICPLUS_PHY is not set
|
|
|
|
# CONFIG_REALTEK_PHY is not set
|
|
|
|
# CONFIG_NATIONAL_PHY is not set
|
|
|
|
# CONFIG_STE10XP is not set
|
|
|
|
# CONFIG_LSI_ET1011C_PHY is not set
|
|
|
|
# CONFIG_MICREL_PHY is not set
|
|
|
|
# CONFIG_FIXED_PHY is not set
|
|
|
|
# CONFIG_MDIO_BITBANG is not set
|
|
|
|
# CONFIG_MDIO_BUS_MUX_GPIO is not set
|
|
|
|
# CONFIG_MDIO_BUS_MUX_MMIOREG is not set
|
|
|
|
# CONFIG_MICREL_KS8995MA is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_PPP=y
|
|
|
|
CONFIG_PPP_BSDCOMP=y
|
|
|
|
CONFIG_PPP_DEFLATE=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_PPP_FILTER is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_PPP_MPPE=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_PPP_MULTILINK is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_PPPOE=y
|
|
|
|
CONFIG_PPPOLAC=y
|
|
|
|
CONFIG_PPPOPNS=y
|
|
|
|
CONFIG_PPP_ASYNC=y
|
|
|
|
CONFIG_PPP_SYNC_TTY=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SLIP is not set
|
|
|
|
CONFIG_SLHC=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# USB Network Adapters
|
|
|
|
#
|
|
|
|
# CONFIG_USB_CATC is not set
|
|
|
|
# CONFIG_USB_KAWETH is not set
|
|
|
|
# CONFIG_USB_PEGASUS is not set
|
|
|
|
# CONFIG_USB_RTL8150 is not set
|
|
|
|
# CONFIG_USB_RTL8152 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_USB_USBNET=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_USB_NET_AX8817X=y
|
|
|
|
CONFIG_USB_NET_AX88179_178A=y
|
|
|
|
CONFIG_USB_NET_CDCETHER=y
|
|
|
|
# CONFIG_USB_NET_CDC_EEM is not set
|
|
|
|
CONFIG_USB_NET_CDC_NCM=y
|
|
|
|
# CONFIG_USB_NET_CDC_MBIM is not set
|
|
|
|
# CONFIG_USB_NET_DM9601 is not set
|
|
|
|
# CONFIG_USB_NET_SMSC75XX is not set
|
|
|
|
# CONFIG_USB_NET_SMSC95XX is not set
|
|
|
|
# CONFIG_USB_NET_GL620A is not set
|
|
|
|
CONFIG_USB_NET_NET1080=y
|
|
|
|
# CONFIG_USB_NET_PLUSB is not set
|
|
|
|
# CONFIG_USB_NET_MCS7830 is not set
|
|
|
|
# CONFIG_USB_NET_RNDIS_HOST is not set
|
|
|
|
CONFIG_USB_NET_CDC_SUBSET=y
|
|
|
|
# CONFIG_USB_ALI_M5632 is not set
|
|
|
|
# CONFIG_USB_AN2720 is not set
|
|
|
|
CONFIG_USB_BELKIN=y
|
|
|
|
CONFIG_USB_ARMLINUX=y
|
|
|
|
# CONFIG_USB_EPSON2888 is not set
|
|
|
|
# CONFIG_USB_KC2190 is not set
|
|
|
|
CONFIG_USB_NET_ZAURUS=y
|
|
|
|
# CONFIG_USB_NET_CX82310_ETH is not set
|
|
|
|
# CONFIG_USB_NET_KALMIA is not set
|
|
|
|
# CONFIG_USB_NET_QMI_WWAN is not set
|
|
|
|
# CONFIG_USB_HSO is not set
|
|
|
|
# CONFIG_USB_NET_INT51X1 is not set
|
|
|
|
# CONFIG_USB_IPHETH is not set
|
|
|
|
# CONFIG_USB_SIERRA_NET is not set
|
|
|
|
# CONFIG_USB_VL600 is not set
|
|
|
|
# CONFIG_MSM_RMNET_USB is not set
|
|
|
|
CONFIG_WLAN=y
|
|
|
|
# CONFIG_ATMEL is not set
|
|
|
|
# CONFIG_PRISM54 is not set
|
|
|
|
# CONFIG_USB_ZD1201 is not set
|
|
|
|
# CONFIG_USB_NET_RNDIS_WLAN is not set
|
|
|
|
# CONFIG_WIFI_CONTROL_FUNC is not set
|
|
|
|
# CONFIG_LIBRA_SDIOIF is not set
|
|
|
|
# CONFIG_ATH6K_LEGACY_EXT is not set
|
|
|
|
# CONFIG_WCNSS_CORE is not set
|
|
|
|
# CONFIG_WCNSS_MEM_PRE_ALLOC is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_BCMDHD_PCIE=y
|
|
|
|
CONFIG_BROADCOM_WIFI_RESERVED_MEM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_BCMDHD_DEBUG_PAGEALLOC is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_BCMDHD_PREALLOC_PKTIDMAP=y
|
|
|
|
CONFIG_SOMC_WIFI_CONTROL=y
|
|
|
|
CONFIG_ATH_CARDS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_ATH_DEBUG is not set
|
|
|
|
# CONFIG_ATH5K_PCI is not set
|
|
|
|
# CONFIG_ATH6KL is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_WIL6210=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_WIL6210_ISR_COR=y
|
|
|
|
CONFIG_WIL6210_TRACING=y
|
|
|
|
# CONFIG_WIL6210_WRITE_IOCTL is not set
|
|
|
|
CONFIG_WIL6210_PLATFORM_MSM=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_BCMDHD=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_BCM4354 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_BCM4356=y
|
|
|
|
CONFIG_BCMDHD_FW_PATH="/lib/firmware/postmarketos/bcmdhd/bcm4356/fw_bcm4356.bin"
|
|
|
|
CONFIG_BCMDHD_NVRAM_PATH="/etc/wifi/bcmdhd.cal"
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_DHD_USE_STATIC_BUF is not set
|
|
|
|
# CONFIG_DHD_USE_SCHED_SCAN is not set
|
|
|
|
# CONFIG_BCMDHD_SUZURAN is not set
|
|
|
|
# CONFIG_BRCMFMAC is not set
|
|
|
|
# CONFIG_HOSTAP is not set
|
|
|
|
# CONFIG_IPW2100 is not set
|
|
|
|
# CONFIG_LIBERTAS is not set
|
|
|
|
# CONFIG_WL_TI is not set
|
|
|
|
# CONFIG_MWIFIEX is not set
|
|
|
|
# CONFIG_CNSS is not set
|
|
|
|
# CONFIG_CNSS_PCI is not set
|
|
|
|
# CONFIG_CNSS_SDIO is not set
|
|
|
|
# CONFIG_CLD_DEBUG is not set
|
|
|
|
# CONFIG_CLD_HL_SDIO_CORE is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_CLD_LL_CORE=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# Enable WiMAX (Networking options) to see the WiMAX drivers
|
|
|
|
#
|
|
|
|
# CONFIG_WAN is not set
|
|
|
|
# CONFIG_DANIPC is not set
|
|
|
|
# CONFIG_VMXNET3 is not set
|
|
|
|
# CONFIG_ISDN is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Input device support
|
|
|
|
#
|
|
|
|
CONFIG_INPUT=y
|
|
|
|
CONFIG_INPUT_FF_MEMLESS=y
|
|
|
|
# CONFIG_INPUT_POLLDEV is not set
|
|
|
|
# CONFIG_INPUT_SPARSEKMAP is not set
|
|
|
|
# CONFIG_INPUT_MATRIXKMAP is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Userland interfaces
|
|
|
|
#
|
|
|
|
CONFIG_INPUT_MOUSEDEV=y
|
|
|
|
CONFIG_INPUT_MOUSEDEV_PSAUX=y
|
|
|
|
CONFIG_INPUT_MOUSEDEV_SCREEN_X=1024
|
|
|
|
CONFIG_INPUT_MOUSEDEV_SCREEN_Y=768
|
|
|
|
# CONFIG_INPUT_JOYDEV is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_INPUT_EVDEV=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_INPUT_EVBUG is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_INPUT_KEYRESET=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_INPUT_KEYCOMBO=y
|
|
|
|
# CONFIG_SENSORS_HALL is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Input Device Drivers
|
|
|
|
#
|
|
|
|
CONFIG_INPUT_KEYBOARD=y
|
|
|
|
# CONFIG_KEYBOARD_ADP5588 is not set
|
|
|
|
# CONFIG_KEYBOARD_ADP5589 is not set
|
|
|
|
CONFIG_KEYBOARD_ATKBD=y
|
|
|
|
# CONFIG_KEYBOARD_QT1070 is not set
|
|
|
|
# CONFIG_KEYBOARD_QT2160 is not set
|
|
|
|
# CONFIG_KEYBOARD_LKKBD is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_KEYBOARD_GPIO=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_KEYBOARD_GPIO_POLLED is not set
|
|
|
|
# CONFIG_KEYBOARD_TCA6416 is not set
|
|
|
|
# CONFIG_KEYBOARD_TCA8418 is not set
|
|
|
|
# CONFIG_KEYBOARD_MATRIX is not set
|
|
|
|
# CONFIG_KEYBOARD_LM8323 is not set
|
|
|
|
# CONFIG_KEYBOARD_LM8333 is not set
|
|
|
|
# CONFIG_KEYBOARD_MAX7359 is not set
|
|
|
|
# CONFIG_KEYBOARD_MCS is not set
|
|
|
|
# CONFIG_KEYBOARD_MPR121 is not set
|
|
|
|
# CONFIG_KEYBOARD_NEWTON is not set
|
|
|
|
# CONFIG_KEYBOARD_OPENCORES is not set
|
|
|
|
# CONFIG_KEYBOARD_QPNP is not set
|
|
|
|
# CONFIG_KEYBOARD_SAMSUNG is not set
|
|
|
|
# CONFIG_KEYBOARD_STOWAWAY is not set
|
|
|
|
# CONFIG_KEYBOARD_SUNKBD is not set
|
|
|
|
# CONFIG_KEYBOARD_XTKBD is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
# CONFIG_INPUT_MOUSE is not set
|
|
|
|
CONFIG_INPUT_JOYSTICK=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_JOYSTICK_ANALOG is not set
|
|
|
|
# CONFIG_JOYSTICK_A3D is not set
|
|
|
|
# CONFIG_JOYSTICK_ADI is not set
|
|
|
|
# CONFIG_JOYSTICK_COBRA is not set
|
|
|
|
# CONFIG_JOYSTICK_GF2K is not set
|
|
|
|
# CONFIG_JOYSTICK_GRIP is not set
|
|
|
|
# CONFIG_JOYSTICK_GRIP_MP is not set
|
|
|
|
# CONFIG_JOYSTICK_GUILLEMOT is not set
|
|
|
|
# CONFIG_JOYSTICK_INTERACT is not set
|
|
|
|
# CONFIG_JOYSTICK_SIDEWINDER is not set
|
|
|
|
# CONFIG_JOYSTICK_TMDC is not set
|
|
|
|
# CONFIG_JOYSTICK_IFORCE is not set
|
|
|
|
# CONFIG_JOYSTICK_WARRIOR is not set
|
|
|
|
# CONFIG_JOYSTICK_MAGELLAN is not set
|
|
|
|
# CONFIG_JOYSTICK_SPACEORB is not set
|
|
|
|
# CONFIG_JOYSTICK_SPACEBALL is not set
|
|
|
|
# CONFIG_JOYSTICK_STINGER is not set
|
|
|
|
# CONFIG_JOYSTICK_TWIDJOY is not set
|
|
|
|
# CONFIG_JOYSTICK_ZHENHUA is not set
|
|
|
|
# CONFIG_JOYSTICK_AS5011 is not set
|
|
|
|
# CONFIG_JOYSTICK_JOYDUMP is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_JOYSTICK_XPAD=y
|
|
|
|
CONFIG_JOYSTICK_XPAD_FF=y
|
|
|
|
CONFIG_JOYSTICK_XPAD_LEDS=y
|
|
|
|
CONFIG_INPUT_TABLET=y
|
|
|
|
CONFIG_TABLET_USB_ACECAD=y
|
|
|
|
CONFIG_TABLET_USB_AIPTEK=y
|
|
|
|
CONFIG_TABLET_USB_GTCO=y
|
|
|
|
CONFIG_TABLET_USB_HANWANG=y
|
|
|
|
CONFIG_TABLET_USB_KBTAB=y
|
|
|
|
CONFIG_TABLET_USB_WACOM=y
|
|
|
|
CONFIG_INPUT_TOUCHSCREEN=y
|
|
|
|
# CONFIG_TOUCHSCREEN_SYNAPTICS_DSX_v21 is not set
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_TOUCHSCREEN_ADS7846 is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_AD7877 is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_AD7879 is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_ATMEL_MXT is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_TOUCHSCREEN_ATMEL_MAXTOUCH_TS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_TOUCHSCREEN_AUO_PIXCIR is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_BU21013 is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_CY8CTMG110 is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_CYTTSP_CORE is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_DYNAPRO is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_HAMPSHIRE is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_EETI is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_EGALAX is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_FUJITSU is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_ILI210X is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_GUNZE is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_ELO is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_WACOM_W8001 is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_WACOM_I2C is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_MAX11801 is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_MAXIM_STI is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_MCS5000 is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_MMS114 is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_MTOUCH is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_INEXIO is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_MK712 is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_PENMOUNT is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_EDT_FT5X06 is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_SYNAPTICS_RMI4_I2C is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_TOUCHSCREEN_CLEARPAD=y
|
|
|
|
CONFIG_TOUCHSCREEN_CLEARPAD_I2C=y
|
|
|
|
CONFIG_TOUCHSCREEN_CLEARPAD_RMI_DEV=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_TOUCHSCREEN_TOUCHRIGHT is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_TOUCHWIN is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_PIXCIR is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_USB_COMPOSITE is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_TOUCHIT213 is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_TSC_SERIO is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_TSC2005 is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_TSC2007 is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_W90X900 is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_ST1232 is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_TPS6507X is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_FT5X06 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_TOUCHSCREEN_GEN_VKEYS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_TOUCHSCREEN_SYNAPTICS_I2C_RMI4 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SECURE_TOUCH=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_TOUCHSCREEN_GT9XX is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_BU21150 is not set
|
|
|
|
# CONFIG_INPUT_MT_WRAPPER is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_INPUT_MISC=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_INPUT_AD714X is not set
|
|
|
|
# CONFIG_INPUT_BMA150 is not set
|
|
|
|
# CONFIG_INPUT_HBTP_INPUT is not set
|
|
|
|
# CONFIG_INPUT_MMA8450 is not set
|
|
|
|
# CONFIG_INPUT_MPU3050 is not set
|
|
|
|
# CONFIG_SENSORS_MPU6050 is not set
|
|
|
|
# CONFIG_SENSORS_LIS3DH is not set
|
|
|
|
# CONFIG_INPUT_GP2A is not set
|
|
|
|
# CONFIG_INPUT_GPIO_TILT_POLLED is not set
|
|
|
|
# CONFIG_INPUT_ATI_REMOTE2 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_INPUT_KEYCHORD=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_INPUT_KEYSPAN_REMOTE is not set
|
|
|
|
# CONFIG_INPUT_KXTJ9 is not set
|
|
|
|
# CONFIG_INPUT_POWERMATE is not set
|
|
|
|
# CONFIG_INPUT_YEALINK is not set
|
|
|
|
# CONFIG_INPUT_CM109 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_INPUT_UINPUT=y
|
|
|
|
CONFIG_INPUT_GPIO=y
|
|
|
|
CONFIG_INPUT_BU520X1NVX=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_INPUT_ISA1200_FF_MEMLESS is not set
|
|
|
|
# CONFIG_INPUT_PCF8574 is not set
|
|
|
|
# CONFIG_INPUT_PWM_BEEPER is not set
|
|
|
|
# CONFIG_INPUT_GPIO_ROTARY_ENCODER is not set
|
|
|
|
# CONFIG_INPUT_ADXL34X is not set
|
|
|
|
# CONFIG_INPUT_IMS_PCU is not set
|
|
|
|
# CONFIG_INPUT_CMA3000 is not set
|
|
|
|
# CONFIG_BMP18X is not set
|
|
|
|
# CONFIG_SENSORS_MMA8X5X is not set
|
|
|
|
# CONFIG_SENSORS_AP3426 is not set
|
|
|
|
# CONFIG_SENSORS_LTR553 is not set
|
|
|
|
# CONFIG_SENSORS_MMC3416X is not set
|
|
|
|
# CONFIG_SENSORS_AKM09911 is not set
|
|
|
|
# CONFIG_SENSORS_AKM8963 is not set
|
|
|
|
# CONFIG_SENSORS_STK3X1X is not set
|
|
|
|
# CONFIG_SENSORS_CAPELLA_CM36283 is not set
|
|
|
|
# CONFIG_SENSORS_BMA2X2 is not set
|
|
|
|
# CONFIG_SENSORS_MC3430 is not set
|
|
|
|
# CONFIG_SENSORS_ISL29044A is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_FPC1145_TEE=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# Hardware I/O ports
|
|
|
|
#
|
|
|
|
CONFIG_SERIO=y
|
2020-05-31 10:32:05 +00:00
|
|
|
# CONFIG_SERIO_I8042 is not set
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_SERIO_SERPORT=y
|
|
|
|
# CONFIG_SERIO_AMBAKMI is not set
|
|
|
|
# CONFIG_SERIO_PCIPS2 is not set
|
|
|
|
CONFIG_SERIO_LIBPS2=y
|
|
|
|
# CONFIG_SERIO_RAW is not set
|
|
|
|
# CONFIG_SERIO_ALTERA_PS2 is not set
|
|
|
|
# CONFIG_SERIO_PS2MULT is not set
|
|
|
|
# CONFIG_SERIO_ARC_PS2 is not set
|
|
|
|
# CONFIG_SERIO_APBPS2 is not set
|
|
|
|
# CONFIG_GAMEPORT is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Character devices
|
|
|
|
#
|
|
|
|
CONFIG_TTY=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_VT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_CONSOLE_TRANSLATIONS=y
|
|
|
|
CONFIG_VT_CONSOLE=y
|
|
|
|
CONFIG_VT_CONSOLE_SLEEP=y
|
|
|
|
CONFIG_HW_CONSOLE=y
|
|
|
|
# CONFIG_VT_HW_CONSOLE_BINDING is not set
|
|
|
|
CONFIG_UNIX98_PTYS=y
|
2021-04-29 11:38:24 +00:00
|
|
|
CONFIG_DEVPTS_MULTIPLE_INSTANCES=y
|
2020-05-31 10:32:05 +00:00
|
|
|
# CONFIG_LEGACY_PTYS is not set
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SERIAL_NONSTANDARD is not set
|
|
|
|
# CONFIG_NOZOMI is not set
|
|
|
|
# CONFIG_N_GSM is not set
|
|
|
|
# CONFIG_N_SMUX is not set
|
|
|
|
# CONFIG_TRACE_SINK is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
# CONFIG_DEVMEM is not set
|
|
|
|
# CONFIG_DEVKMEM is not set
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# Serial drivers
|
|
|
|
#
|
|
|
|
# CONFIG_SERIAL_8250 is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Non-8250 serial port support
|
|
|
|
#
|
|
|
|
# CONFIG_SERIAL_AMBA_PL010 is not set
|
|
|
|
# CONFIG_SERIAL_AMBA_PL011 is not set
|
|
|
|
# CONFIG_SERIAL_MAX3100 is not set
|
|
|
|
# CONFIG_SERIAL_MAX310X is not set
|
|
|
|
# CONFIG_SERIAL_MFD_HSU is not set
|
|
|
|
CONFIG_SERIAL_CORE=y
|
|
|
|
CONFIG_SERIAL_CORE_CONSOLE=y
|
|
|
|
# CONFIG_SERIAL_JSM is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SERIAL_MSM_HS=y
|
|
|
|
CONFIG_SERIAL_MSM_HSL=y
|
|
|
|
CONFIG_SERIAL_MSM_HSL_CONSOLE=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SERIAL_SCCNXP is not set
|
|
|
|
# CONFIG_SERIAL_TIMBERDALE is not set
|
|
|
|
# CONFIG_SERIAL_ALTERA_JTAGUART is not set
|
|
|
|
# CONFIG_SERIAL_ALTERA_UART is not set
|
|
|
|
# CONFIG_SERIAL_IFX6X60 is not set
|
|
|
|
# CONFIG_SERIAL_PCH_UART is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SERIAL_MSM_SMD=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SERIAL_XILINX_PS_UART is not set
|
|
|
|
# CONFIG_SERIAL_ARC is not set
|
|
|
|
# CONFIG_SERIAL_RP2 is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Diag Support
|
|
|
|
#
|
|
|
|
CONFIG_DIAG_CHAR=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# DIAG traffic over USB
|
|
|
|
#
|
|
|
|
CONFIG_DIAG_OVER_USB=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# HSIC/SMUX support for DIAG
|
|
|
|
#
|
|
|
|
# CONFIG_TTY_PRINTK is not set
|
|
|
|
# CONFIG_HVC_DCC is not set
|
|
|
|
# CONFIG_IPMI_HANDLER is not set
|
|
|
|
CONFIG_HW_RANDOM=y
|
|
|
|
# CONFIG_HW_RANDOM_TIMERIOMEM is not set
|
|
|
|
# CONFIG_HW_RANDOM_ATMEL is not set
|
|
|
|
# CONFIG_HW_RANDOM_EXYNOS is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_HW_RANDOM_MSM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_R3964 is not set
|
|
|
|
# CONFIG_APPLICOM is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# PCMCIA character devices
|
|
|
|
#
|
|
|
|
# CONFIG_RAW_DRIVER is not set
|
|
|
|
# CONFIG_TCG_TPM is not set
|
|
|
|
CONFIG_DEVPORT=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_SMD_PKT=y
|
|
|
|
CONFIG_MSM_ADSPRPC=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MSM_RDBG is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_I2C=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_I2C_BOARDINFO=y
|
|
|
|
CONFIG_I2C_COMPAT=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_I2C_CHARDEV=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_I2C_MUX is not set
|
|
|
|
CONFIG_I2C_HELPER_AUTO=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# I2C Hardware Bus support
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# PC SMBus host controller drivers
|
|
|
|
#
|
|
|
|
# CONFIG_I2C_ALI1535 is not set
|
|
|
|
# CONFIG_I2C_ALI1563 is not set
|
|
|
|
# CONFIG_I2C_ALI15X3 is not set
|
|
|
|
# CONFIG_I2C_AMD756 is not set
|
|
|
|
# CONFIG_I2C_AMD8111 is not set
|
|
|
|
# CONFIG_I2C_I801 is not set
|
|
|
|
# CONFIG_I2C_ISCH is not set
|
|
|
|
# CONFIG_I2C_PIIX4 is not set
|
|
|
|
# CONFIG_I2C_NFORCE2 is not set
|
|
|
|
# CONFIG_I2C_SIS5595 is not set
|
|
|
|
# CONFIG_I2C_SIS630 is not set
|
|
|
|
# CONFIG_I2C_SIS96X is not set
|
|
|
|
# CONFIG_I2C_VIA is not set
|
|
|
|
# CONFIG_I2C_VIAPRO is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# I2C system bus drivers (mostly embedded / system-on-chip)
|
|
|
|
#
|
|
|
|
# CONFIG_I2C_CBUS_GPIO is not set
|
|
|
|
# CONFIG_I2C_DESIGNWARE_PLATFORM is not set
|
|
|
|
# CONFIG_I2C_DESIGNWARE_PCI is not set
|
|
|
|
# CONFIG_I2C_EG20T is not set
|
|
|
|
# CONFIG_I2C_GPIO is not set
|
|
|
|
# CONFIG_I2C_INTEL_MID is not set
|
|
|
|
# CONFIG_I2C_QUP is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_I2C_MSM_V2=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_I2C_NOMADIK is not set
|
|
|
|
# CONFIG_I2C_OCORES is not set
|
|
|
|
# CONFIG_I2C_PCA_PLATFORM is not set
|
|
|
|
# CONFIG_I2C_PXA_PCI is not set
|
|
|
|
# CONFIG_I2C_SIMTEC is not set
|
|
|
|
# CONFIG_I2C_XILINX is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# External I2C/SMBus adapter drivers
|
|
|
|
#
|
|
|
|
# CONFIG_I2C_DIOLAN_U2C is not set
|
|
|
|
# CONFIG_I2C_PARPORT_LIGHT is not set
|
|
|
|
# CONFIG_I2C_TAOS_EVM is not set
|
|
|
|
# CONFIG_I2C_TINY_USB is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Other I2C/SMBus bus drivers
|
|
|
|
#
|
|
|
|
# CONFIG_I2C_DEBUG_CORE is not set
|
|
|
|
# CONFIG_I2C_DEBUG_ALGO is not set
|
|
|
|
# CONFIG_I2C_DEBUG_BUS is not set
|
|
|
|
CONFIG_SLIMBUS=y
|
|
|
|
# CONFIG_SLIMBUS_MSM_CTRL is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SLIMBUS_MSM_NGD=y
|
|
|
|
CONFIG_SPI=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SPI_DEBUG is not set
|
|
|
|
CONFIG_SPI_MASTER=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# SPI Master Controller Drivers
|
|
|
|
#
|
|
|
|
# CONFIG_SPI_ALTERA is not set
|
|
|
|
# CONFIG_SPI_BITBANG is not set
|
|
|
|
# CONFIG_SPI_GPIO is not set
|
|
|
|
# CONFIG_SPI_FSL_SPI is not set
|
|
|
|
# CONFIG_SPI_OC_TINY is not set
|
|
|
|
# CONFIG_SPI_PL022 is not set
|
|
|
|
# CONFIG_SPI_PXA2XX is not set
|
|
|
|
# CONFIG_SPI_PXA2XX_PCI is not set
|
|
|
|
# CONFIG_SPI_SC18IS602 is not set
|
|
|
|
# CONFIG_SPI_TOPCLIFF_PCH is not set
|
|
|
|
# CONFIG_SPI_XCOMM is not set
|
|
|
|
# CONFIG_SPI_XILINX is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SPI_QUP=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SPI_DESIGNWARE is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# SPI Protocol Masters
|
|
|
|
#
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SPI_SPIDEV=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SPI_TLE62X0 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SPMI=y
|
|
|
|
CONFIG_SPMI_MSM_PMIC_ARB=y
|
|
|
|
CONFIG_MSM_QPNP_INT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MSM_SPMI_DEBUGFS_RO is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Qualcomm MSM SSBI bus support
|
|
|
|
#
|
|
|
|
# CONFIG_SSBI is not set
|
|
|
|
# CONFIG_HSI is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# PPS support
|
|
|
|
#
|
|
|
|
CONFIG_PPS=y
|
|
|
|
# CONFIG_PPS_DEBUG is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# PPS clients support
|
|
|
|
#
|
|
|
|
# CONFIG_PPS_CLIENT_KTIMER is not set
|
|
|
|
# CONFIG_PPS_CLIENT_LDISC is not set
|
|
|
|
# CONFIG_PPS_CLIENT_GPIO is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# PPS generators support
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# PTP clock support
|
|
|
|
#
|
|
|
|
CONFIG_PTP_1588_CLOCK=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# Enable PHYLIB and NETWORK_PHY_TIMESTAMPING to see the additional clocks.
|
|
|
|
#
|
|
|
|
# CONFIG_PTP_1588_CLOCK_PCH is not set
|
|
|
|
CONFIG_PINCTRL=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# Pin controllers
|
|
|
|
#
|
|
|
|
CONFIG_PINMUX=y
|
|
|
|
CONFIG_PINCONF=y
|
|
|
|
CONFIG_GENERIC_PINCONF=y
|
|
|
|
# CONFIG_DEBUG_PINCTRL is not set
|
|
|
|
# CONFIG_PINCTRL_SINGLE is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_USE_PINCTRL_IRQ=y
|
|
|
|
CONFIG_PINCTRL_MSM_TLMM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_PINCTRL_EXYNOS is not set
|
|
|
|
# CONFIG_PINCTRL_EXYNOS5440 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_PINCTRL_SOMC=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_ARCH_WANT_OPTIONAL_GPIOLIB=y
|
|
|
|
CONFIG_ARCH_REQUIRE_GPIOLIB=y
|
|
|
|
CONFIG_GPIO_DEVRES=y
|
|
|
|
CONFIG_GPIOLIB=y
|
|
|
|
CONFIG_OF_GPIO=y
|
|
|
|
# CONFIG_DEBUG_GPIO is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_GPIO_SYSFS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# Memory mapped GPIO drivers:
|
|
|
|
#
|
|
|
|
# CONFIG_GPIO_GENERIC_PLATFORM is not set
|
|
|
|
# CONFIG_GPIO_MSM_V3 is not set
|
|
|
|
# CONFIG_GPIO_TS5500 is not set
|
|
|
|
# CONFIG_GPIO_VX855 is not set
|
|
|
|
# CONFIG_GPIO_GRGPIO is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# I2C GPIO expanders:
|
|
|
|
#
|
|
|
|
# CONFIG_GPIO_MAX7300 is not set
|
|
|
|
# CONFIG_GPIO_MAX732X is not set
|
|
|
|
# CONFIG_GPIO_PCA953X is not set
|
|
|
|
# CONFIG_GPIO_PCF857X is not set
|
|
|
|
# CONFIG_GPIO_SX150X is not set
|
|
|
|
# CONFIG_GPIO_ADP5588 is not set
|
|
|
|
# CONFIG_GPIO_ADNP is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# PCI GPIO expanders:
|
|
|
|
#
|
|
|
|
# CONFIG_GPIO_BT8XX is not set
|
|
|
|
# CONFIG_GPIO_AMD8111 is not set
|
|
|
|
# CONFIG_GPIO_ML_IOH is not set
|
|
|
|
# CONFIG_GPIO_RDC321X is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# SPI GPIO expanders:
|
|
|
|
#
|
|
|
|
# CONFIG_GPIO_MAX7301 is not set
|
|
|
|
# CONFIG_GPIO_MCP23S08 is not set
|
|
|
|
# CONFIG_GPIO_MC33880 is not set
|
|
|
|
# CONFIG_GPIO_74X164 is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# AC97 GPIO expanders:
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# MODULbus GPIO expanders:
|
|
|
|
#
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_GPIO_QPNP_PIN=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_GPIO_QPNP_PIN_DEBUG is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# USB GPIO expanders:
|
|
|
|
#
|
|
|
|
# CONFIG_W1 is not set
|
|
|
|
CONFIG_POWER_SUPPLY=y
|
|
|
|
# CONFIG_POWER_SUPPLY_DEBUG is not set
|
|
|
|
# CONFIG_PDA_POWER is not set
|
|
|
|
# CONFIG_TEST_POWER is not set
|
|
|
|
# CONFIG_BATTERY_DS2780 is not set
|
|
|
|
# CONFIG_BATTERY_DS2781 is not set
|
|
|
|
# CONFIG_BATTERY_DS2782 is not set
|
|
|
|
# CONFIG_BATTERY_SBS is not set
|
|
|
|
# CONFIG_BATTERY_BQ27x00 is not set
|
|
|
|
# CONFIG_BATTERY_MAX17040 is not set
|
|
|
|
# CONFIG_BATTERY_MAX17042 is not set
|
|
|
|
# CONFIG_CHARGER_ISP1704 is not set
|
|
|
|
# CONFIG_CHARGER_MAX8903 is not set
|
|
|
|
# CONFIG_CHARGER_LP8727 is not set
|
|
|
|
# CONFIG_CHARGER_GPIO is not set
|
|
|
|
# CONFIG_CHARGER_MANAGER is not set
|
|
|
|
# CONFIG_CHARGER_BQ2415X is not set
|
|
|
|
# CONFIG_SMB137C_CHARGER is not set
|
|
|
|
# CONFIG_SMB349_USB_CHARGER is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SMB349_DUAL_CHARGER=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SMB1351_USB_CHARGER is not set
|
|
|
|
# CONFIG_SMB350_CHARGER is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SMB135X_CHARGER=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SMB1360_CHARGER_FG is not set
|
|
|
|
# CONFIG_SMB358_CHARGER is not set
|
|
|
|
# CONFIG_BATTERY_BQ28400 is not set
|
|
|
|
# CONFIG_QPNP_CHARGER is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_QPNP_SMBCHARGER_EXTENSION=y
|
|
|
|
CONFIG_QPNP_SMBCHARGER=y
|
|
|
|
CONFIG_QPNP_FG_EXTENSION=y
|
|
|
|
CONFIG_QPNP_FG=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_IDTP9028 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_BATTERY_BCL=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_CHARGER_SMB347 is not set
|
|
|
|
# CONFIG_BATTERY_GOLDFISH is not set
|
|
|
|
# CONFIG_QPNP_VM_BMS is not set
|
|
|
|
# CONFIG_QPNP_BMS is not set
|
|
|
|
# CONFIG_QPNP_LINEAR_CHARGER is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_BCL_CTL=y
|
|
|
|
CONFIG_MSM_BCL_PERIPHERAL_CTL=y
|
|
|
|
CONFIG_MSM_BCL_SOMC_CTL=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_POWER_RESET=y
|
|
|
|
# CONFIG_POWER_RESET_GPIO is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_POWER_RESET_MSM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MSM_DLOAD_MODE is not set
|
|
|
|
# CONFIG_POWER_AVS is not set
|
|
|
|
# CONFIG_POWER_AVS_MSM is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_PM=y
|
|
|
|
CONFIG_APSS_CORE_EA=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_MSM_IDLE_STATS=y
|
|
|
|
CONFIG_MSM_IDLE_STATS_FIRST_BUCKET=62500
|
|
|
|
CONFIG_MSM_IDLE_STATS_BUCKET_SHIFT=2
|
|
|
|
CONFIG_MSM_IDLE_STATS_BUCKET_COUNT=10
|
|
|
|
CONFIG_MSM_SUSPEND_STATS_FIRST_BUCKET=1000000000
|
|
|
|
CONFIG_HWMON=y
|
|
|
|
# CONFIG_HWMON_VID is not set
|
|
|
|
# CONFIG_HWMON_DEBUG_CHIP is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Native drivers
|
|
|
|
#
|
|
|
|
# CONFIG_SENSORS_AD7314 is not set
|
|
|
|
# CONFIG_SENSORS_AD7414 is not set
|
|
|
|
# CONFIG_SENSORS_AD7418 is not set
|
|
|
|
# CONFIG_SENSORS_ADCXX is not set
|
|
|
|
# CONFIG_SENSORS_ADM1021 is not set
|
|
|
|
# CONFIG_SENSORS_ADM1025 is not set
|
|
|
|
# CONFIG_SENSORS_ADM1026 is not set
|
|
|
|
# CONFIG_SENSORS_ADM1029 is not set
|
|
|
|
# CONFIG_SENSORS_ADM1031 is not set
|
|
|
|
# CONFIG_SENSORS_ADM9240 is not set
|
|
|
|
# CONFIG_SENSORS_ADT7310 is not set
|
|
|
|
# CONFIG_SENSORS_ADT7410 is not set
|
|
|
|
# CONFIG_SENSORS_ADT7411 is not set
|
|
|
|
# CONFIG_SENSORS_ADT7462 is not set
|
|
|
|
# CONFIG_SENSORS_ADT7470 is not set
|
|
|
|
# CONFIG_SENSORS_ADT7475 is not set
|
|
|
|
# CONFIG_SENSORS_ASC7621 is not set
|
|
|
|
# CONFIG_SENSORS_ATXP1 is not set
|
|
|
|
# CONFIG_SENSORS_BOOST_DYNAMIC_CONTROLLER is not set
|
|
|
|
# CONFIG_SENSORS_DS620 is not set
|
|
|
|
# CONFIG_SENSORS_DS1621 is not set
|
|
|
|
# CONFIG_SENSORS_I5K_AMB is not set
|
|
|
|
# CONFIG_SENSORS_F71805F is not set
|
|
|
|
# CONFIG_SENSORS_F71882FG is not set
|
|
|
|
# CONFIG_SENSORS_F75375S is not set
|
|
|
|
# CONFIG_SENSORS_G760A is not set
|
|
|
|
# CONFIG_SENSORS_GL518SM is not set
|
|
|
|
# CONFIG_SENSORS_GL520SM is not set
|
|
|
|
# CONFIG_SENSORS_GPIO_FAN is not set
|
|
|
|
# CONFIG_SENSORS_HIH6130 is not set
|
|
|
|
# CONFIG_SENSORS_IT87 is not set
|
|
|
|
# CONFIG_SENSORS_JC42 is not set
|
|
|
|
# CONFIG_SENSORS_LINEAGE is not set
|
|
|
|
# CONFIG_SENSORS_LM63 is not set
|
|
|
|
# CONFIG_SENSORS_LM70 is not set
|
|
|
|
# CONFIG_SENSORS_LM73 is not set
|
|
|
|
# CONFIG_SENSORS_LM75 is not set
|
|
|
|
# CONFIG_SENSORS_LM77 is not set
|
|
|
|
# CONFIG_SENSORS_LM78 is not set
|
|
|
|
# CONFIG_SENSORS_LM80 is not set
|
|
|
|
# CONFIG_SENSORS_LM83 is not set
|
|
|
|
# CONFIG_SENSORS_LM85 is not set
|
|
|
|
# CONFIG_SENSORS_LM87 is not set
|
|
|
|
# CONFIG_SENSORS_LM90 is not set
|
|
|
|
# CONFIG_SENSORS_LM92 is not set
|
|
|
|
# CONFIG_SENSORS_LM93 is not set
|
|
|
|
# CONFIG_SENSORS_LTC4151 is not set
|
|
|
|
# CONFIG_SENSORS_LTC4215 is not set
|
|
|
|
# CONFIG_SENSORS_LTC4245 is not set
|
|
|
|
# CONFIG_SENSORS_LTC4261 is not set
|
|
|
|
# CONFIG_SENSORS_LM95234 is not set
|
|
|
|
# CONFIG_SENSORS_LM95241 is not set
|
|
|
|
# CONFIG_SENSORS_LM95245 is not set
|
|
|
|
# CONFIG_SENSORS_MAX1111 is not set
|
|
|
|
# CONFIG_SENSORS_MAX16065 is not set
|
|
|
|
# CONFIG_SENSORS_MAX1619 is not set
|
|
|
|
# CONFIG_SENSORS_MAX1668 is not set
|
|
|
|
# CONFIG_SENSORS_MAX197 is not set
|
|
|
|
# CONFIG_SENSORS_MAX6639 is not set
|
|
|
|
# CONFIG_SENSORS_MAX6642 is not set
|
|
|
|
# CONFIG_SENSORS_MAX6650 is not set
|
|
|
|
# CONFIG_SENSORS_MAX6697 is not set
|
|
|
|
# CONFIG_SENSORS_MCP3021 is not set
|
|
|
|
# CONFIG_SENSORS_NCT6775 is not set
|
|
|
|
# CONFIG_SENSORS_NTC_THERMISTOR is not set
|
|
|
|
# CONFIG_SENSORS_EPM_ADC is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SENSORS_QPNP_ADC_VOLTAGE=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SENSORS_QPNP_ADC_CURRENT is not set
|
|
|
|
# CONFIG_SENSORS_QPNP_CURRENT_MONITOR is not set
|
|
|
|
# CONFIG_SENSORS_PC87360 is not set
|
|
|
|
# CONFIG_SENSORS_PC87427 is not set
|
|
|
|
# CONFIG_SENSORS_PCF8591 is not set
|
|
|
|
# CONFIG_PMBUS is not set
|
|
|
|
# CONFIG_SENSORS_SHT15 is not set
|
|
|
|
# CONFIG_SENSORS_SHT21 is not set
|
|
|
|
# CONFIG_SENSORS_SIS5595 is not set
|
|
|
|
# CONFIG_SENSORS_SMM665 is not set
|
|
|
|
# CONFIG_SENSORS_DME1737 is not set
|
|
|
|
# CONFIG_SENSORS_EMC1403 is not set
|
|
|
|
# CONFIG_SENSORS_EMC2103 is not set
|
|
|
|
# CONFIG_SENSORS_EMC6W201 is not set
|
|
|
|
# CONFIG_SENSORS_SMSC47M1 is not set
|
|
|
|
# CONFIG_SENSORS_SMSC47M192 is not set
|
|
|
|
# CONFIG_SENSORS_SMSC47B397 is not set
|
|
|
|
# CONFIG_SENSORS_SCH56XX_COMMON is not set
|
|
|
|
# CONFIG_SENSORS_ADS1015 is not set
|
|
|
|
# CONFIG_SENSORS_ADS7828 is not set
|
|
|
|
# CONFIG_SENSORS_ADS7871 is not set
|
|
|
|
# CONFIG_SENSORS_AMC6821 is not set
|
|
|
|
# CONFIG_SENSORS_INA209 is not set
|
|
|
|
# CONFIG_SENSORS_INA2XX is not set
|
|
|
|
# CONFIG_SENSORS_THMC50 is not set
|
|
|
|
# CONFIG_SENSORS_TMP102 is not set
|
|
|
|
# CONFIG_SENSORS_TMP401 is not set
|
|
|
|
# CONFIG_SENSORS_TMP421 is not set
|
|
|
|
# CONFIG_SENSORS_VIA686A is not set
|
|
|
|
# CONFIG_SENSORS_VT1211 is not set
|
|
|
|
# CONFIG_SENSORS_VT8231 is not set
|
|
|
|
# CONFIG_SENSORS_W83781D is not set
|
|
|
|
# CONFIG_SENSORS_W83791D is not set
|
|
|
|
# CONFIG_SENSORS_W83792D is not set
|
|
|
|
# CONFIG_SENSORS_W83793 is not set
|
|
|
|
# CONFIG_SENSORS_W83795 is not set
|
|
|
|
# CONFIG_SENSORS_W83L785TS is not set
|
|
|
|
# CONFIG_SENSORS_W83L786NG is not set
|
|
|
|
# CONFIG_SENSORS_W83627HF is not set
|
|
|
|
# CONFIG_SENSORS_W83627EHF is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_THERMAL=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_THERMAL_HWMON=y
|
|
|
|
CONFIG_THERMAL_DEFAULT_GOV_STEP_WISE=y
|
|
|
|
# CONFIG_THERMAL_DEFAULT_GOV_FAIR_SHARE is not set
|
|
|
|
# CONFIG_THERMAL_DEFAULT_GOV_USER_SPACE is not set
|
|
|
|
# CONFIG_THERMAL_GOV_FAIR_SHARE is not set
|
|
|
|
CONFIG_THERMAL_GOV_STEP_WISE=y
|
|
|
|
# CONFIG_THERMAL_GOV_USER_SPACE is not set
|
|
|
|
# CONFIG_CPU_THERMAL is not set
|
|
|
|
# CONFIG_THERMAL_EMULATION is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_THERMAL_TSENS8974=y
|
|
|
|
CONFIG_LIMITS_MONITOR=y
|
|
|
|
CONFIG_LIMITS_LITE_HW=y
|
|
|
|
CONFIG_THERMAL_MONITOR=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SUPPLY_LM_MONITOR is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_THERMAL_QPNP=y
|
|
|
|
CONFIG_THERMAL_QPNP_ADC_TM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_WATCHDOG is not set
|
|
|
|
CONFIG_SSB_POSSIBLE=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# Sonics Silicon Backplane
|
|
|
|
#
|
|
|
|
# CONFIG_SSB is not set
|
|
|
|
CONFIG_BCMA_POSSIBLE=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# Broadcom specific AMBA
|
|
|
|
#
|
|
|
|
# CONFIG_BCMA is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Multifunction device drivers
|
|
|
|
#
|
|
|
|
CONFIG_MFD_CORE=y
|
|
|
|
# CONFIG_MFD_AS3711 is not set
|
|
|
|
# CONFIG_PMIC_ADP5520 is not set
|
|
|
|
# CONFIG_MFD_AAT2870_CORE is not set
|
|
|
|
# CONFIG_MFD_CROS_EC is not set
|
|
|
|
# CONFIG_PMIC_DA903X is not set
|
|
|
|
# CONFIG_MFD_DA9052_SPI is not set
|
|
|
|
# CONFIG_MFD_DA9052_I2C is not set
|
|
|
|
# CONFIG_MFD_DA9055 is not set
|
|
|
|
# CONFIG_MFD_MC13XXX_SPI is not set
|
|
|
|
# CONFIG_MFD_MC13XXX_I2C is not set
|
|
|
|
# CONFIG_HTC_PASIC3 is not set
|
|
|
|
# CONFIG_HTC_I2CPLD is not set
|
|
|
|
# CONFIG_LPC_ICH is not set
|
|
|
|
# CONFIG_LPC_SCH is not set
|
|
|
|
# CONFIG_MFD_JANZ_CMODIO is not set
|
|
|
|
# CONFIG_MFD_88PM800 is not set
|
|
|
|
# CONFIG_MFD_88PM805 is not set
|
|
|
|
# CONFIG_MFD_88PM860X is not set
|
|
|
|
# CONFIG_MFD_MAX77686 is not set
|
|
|
|
# CONFIG_MFD_MAX77693 is not set
|
|
|
|
# CONFIG_MFD_MAX8907 is not set
|
|
|
|
# CONFIG_MFD_MAX8925 is not set
|
|
|
|
# CONFIG_MFD_MAX8997 is not set
|
|
|
|
# CONFIG_MFD_MAX8998 is not set
|
|
|
|
# CONFIG_EZX_PCAP is not set
|
|
|
|
# CONFIG_MFD_VIPERBOARD is not set
|
|
|
|
# CONFIG_MFD_RETU is not set
|
|
|
|
# CONFIG_MFD_PCF50633 is not set
|
|
|
|
# CONFIG_MFD_RDC321X is not set
|
|
|
|
# CONFIG_MFD_RTSX_PCI is not set
|
|
|
|
# CONFIG_MFD_RC5T583 is not set
|
|
|
|
# CONFIG_MFD_SEC_CORE is not set
|
|
|
|
# CONFIG_MFD_SI476X_CORE is not set
|
|
|
|
# CONFIG_MFD_SM501 is not set
|
|
|
|
# CONFIG_MFD_SMSC is not set
|
|
|
|
# CONFIG_ABX500_CORE is not set
|
|
|
|
# CONFIG_MFD_STMPE is not set
|
|
|
|
# CONFIG_MFD_SYSCON is not set
|
|
|
|
# CONFIG_MFD_TI_AM335X_TSCADC is not set
|
|
|
|
# CONFIG_MFD_LP8788 is not set
|
|
|
|
# CONFIG_MFD_PALMAS is not set
|
|
|
|
# CONFIG_TPS6105X is not set
|
|
|
|
# CONFIG_TPS65010 is not set
|
|
|
|
# CONFIG_TPS6507X is not set
|
|
|
|
# CONFIG_MFD_TPS65090 is not set
|
|
|
|
# CONFIG_MFD_TPS65217 is not set
|
|
|
|
# CONFIG_MFD_TPS6586X is not set
|
|
|
|
# CONFIG_MFD_TPS65910 is not set
|
|
|
|
# CONFIG_MFD_TPS65912 is not set
|
|
|
|
# CONFIG_MFD_TPS65912_I2C is not set
|
|
|
|
# CONFIG_MFD_TPS65912_SPI is not set
|
|
|
|
# CONFIG_MFD_TPS80031 is not set
|
|
|
|
# CONFIG_TWL4030_CORE is not set
|
|
|
|
# CONFIG_TWL6040_CORE is not set
|
|
|
|
# CONFIG_MFD_WL1273_CORE is not set
|
|
|
|
# CONFIG_MFD_LM3533 is not set
|
|
|
|
# CONFIG_MFD_TIMBERDALE is not set
|
|
|
|
# CONFIG_MFD_TC3589X is not set
|
|
|
|
# CONFIG_MFD_TMIO is not set
|
|
|
|
# CONFIG_MFD_VX855 is not set
|
|
|
|
# CONFIG_MFD_ARIZONA_I2C is not set
|
|
|
|
# CONFIG_MFD_ARIZONA_SPI is not set
|
|
|
|
# CONFIG_MFD_WM8400 is not set
|
|
|
|
# CONFIG_MFD_WM831X_I2C is not set
|
|
|
|
# CONFIG_MFD_WM831X_SPI is not set
|
|
|
|
# CONFIG_MFD_WM8350_I2C is not set
|
|
|
|
# CONFIG_MFD_WM8994 is not set
|
|
|
|
# CONFIG_WCD9304_CODEC is not set
|
|
|
|
# CONFIG_WCD9310_CODEC is not set
|
|
|
|
# CONFIG_WCD9320_CODEC is not set
|
|
|
|
# CONFIG_WCD9306_CODEC is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_WCD9330_CODEC=y
|
|
|
|
CONFIG_REGULATOR=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_REGULATOR_DEBUG is not set
|
|
|
|
# CONFIG_REGULATOR_DUMMY is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_REGULATOR_FIXED_VOLTAGE=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_REGULATOR_VIRTUAL_CONSUMER is not set
|
|
|
|
# CONFIG_REGULATOR_USERSPACE_CONSUMER is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_REGULATOR_PROXY_CONSUMER=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_REGULATOR_GPIO is not set
|
|
|
|
# CONFIG_REGULATOR_AD5398 is not set
|
|
|
|
# CONFIG_REGULATOR_FAN53555 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_REGULATOR_MEM_ACC=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_REGULATOR_ISL6271A is not set
|
|
|
|
# CONFIG_REGULATOR_MAX1586 is not set
|
|
|
|
# CONFIG_REGULATOR_MAX8649 is not set
|
|
|
|
# CONFIG_REGULATOR_MAX8660 is not set
|
|
|
|
# CONFIG_REGULATOR_MAX8952 is not set
|
|
|
|
# CONFIG_REGULATOR_MAX8973 is not set
|
|
|
|
# CONFIG_REGULATOR_ONSEMI_NCP6335D is not set
|
|
|
|
# CONFIG_REGULATOR_LP3971 is not set
|
|
|
|
# CONFIG_REGULATOR_LP3972 is not set
|
|
|
|
# CONFIG_REGULATOR_LP872X is not set
|
|
|
|
# CONFIG_REGULATOR_LP8755 is not set
|
|
|
|
# CONFIG_REGULATOR_TPS51632 is not set
|
|
|
|
# CONFIG_REGULATOR_TPS62360 is not set
|
|
|
|
# CONFIG_REGULATOR_TPS65023 is not set
|
|
|
|
# CONFIG_REGULATOR_TPS6507X is not set
|
|
|
|
# CONFIG_REGULATOR_TPS6524X is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_REGULATOR_TPS65132=y
|
|
|
|
CONFIG_REGULATOR_STUB=y
|
|
|
|
CONFIG_REGULATOR_RPM_SMD=y
|
|
|
|
CONFIG_REGULATOR_QPNP=y
|
|
|
|
CONFIG_REGULATOR_QPNP_LABIBB=y
|
|
|
|
CONFIG_REGULATOR_SPM=y
|
|
|
|
CONFIG_REGULATOR_CPR=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_REGULATOR_FPF2495 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SOMC_LCD_OCP_ENABLED=y
|
|
|
|
CONFIG_MEDIA_SUPPORT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# Multimedia core support
|
|
|
|
#
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MEDIA_CAMERA_SUPPORT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MEDIA_ANALOG_TV_SUPPORT is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MEDIA_DIGITAL_TV_SUPPORT=y
|
|
|
|
CONFIG_MEDIA_RADIO_SUPPORT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MEDIA_RC_SUPPORT is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MEDIA_CONTROLLER=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_VIDEO_DEV=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_VIDEO_V4L2_SUBDEV_API=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_VIDEO_V4L2=y
|
|
|
|
# CONFIG_VIDEO_ADV_DEBUG is not set
|
|
|
|
# CONFIG_VIDEO_FIXED_MINOR_RANGES is not set
|
|
|
|
CONFIG_VIDEOBUF2_CORE=y
|
|
|
|
CONFIG_VIDEOBUF2_MEMOPS=y
|
|
|
|
CONFIG_VIDEOBUF2_DMA_CONTIG=y
|
|
|
|
CONFIG_VIDEOBUF2_VMALLOC=y
|
|
|
|
CONFIG_VIDEOBUF2_DMA_SG=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_VIDEOBUF2_MSM_MEM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_VIDEO_V4L2_INT_DEVICE is not set
|
|
|
|
CONFIG_DVB_CORE=y
|
|
|
|
CONFIG_DVB_NET=y
|
|
|
|
# CONFIG_TTPCI_EEPROM is not set
|
|
|
|
CONFIG_DVB_MAX_ADAPTERS=8
|
|
|
|
# CONFIG_DVB_DYNAMIC_MINORS is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Media drivers
|
|
|
|
#
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MEDIA_USB_SUPPORT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# Webcam devices
|
|
|
|
#
|
|
|
|
# CONFIG_USB_VIDEO_CLASS is not set
|
|
|
|
CONFIG_USB_GSPCA=y
|
|
|
|
# CONFIG_USB_M5602 is not set
|
|
|
|
# CONFIG_USB_STV06XX is not set
|
|
|
|
# CONFIG_USB_GL860 is not set
|
|
|
|
# CONFIG_USB_GSPCA_BENQ is not set
|
|
|
|
# CONFIG_USB_GSPCA_CONEX is not set
|
|
|
|
# CONFIG_USB_GSPCA_CPIA1 is not set
|
|
|
|
# CONFIG_USB_GSPCA_ETOMS is not set
|
|
|
|
# CONFIG_USB_GSPCA_FINEPIX is not set
|
|
|
|
# CONFIG_USB_GSPCA_JEILINJ is not set
|
|
|
|
# CONFIG_USB_GSPCA_JL2005BCD is not set
|
|
|
|
# CONFIG_USB_GSPCA_KINECT is not set
|
|
|
|
# CONFIG_USB_GSPCA_KONICA is not set
|
|
|
|
# CONFIG_USB_GSPCA_MARS is not set
|
|
|
|
# CONFIG_USB_GSPCA_MR97310A is not set
|
|
|
|
# CONFIG_USB_GSPCA_NW80X is not set
|
|
|
|
# CONFIG_USB_GSPCA_OV519 is not set
|
|
|
|
# CONFIG_USB_GSPCA_OV534 is not set
|
|
|
|
# CONFIG_USB_GSPCA_OV534_9 is not set
|
|
|
|
# CONFIG_USB_GSPCA_PAC207 is not set
|
|
|
|
# CONFIG_USB_GSPCA_PAC7302 is not set
|
|
|
|
# CONFIG_USB_GSPCA_PAC7311 is not set
|
|
|
|
# CONFIG_USB_GSPCA_SE401 is not set
|
|
|
|
# CONFIG_USB_GSPCA_SN9C2028 is not set
|
|
|
|
# CONFIG_USB_GSPCA_SN9C20X is not set
|
|
|
|
# CONFIG_USB_GSPCA_SONIXB is not set
|
|
|
|
# CONFIG_USB_GSPCA_SONIXJ is not set
|
|
|
|
# CONFIG_USB_GSPCA_SPCA500 is not set
|
|
|
|
# CONFIG_USB_GSPCA_SPCA501 is not set
|
|
|
|
# CONFIG_USB_GSPCA_SPCA505 is not set
|
|
|
|
# CONFIG_USB_GSPCA_SPCA506 is not set
|
|
|
|
# CONFIG_USB_GSPCA_SPCA508 is not set
|
|
|
|
# CONFIG_USB_GSPCA_SPCA561 is not set
|
|
|
|
# CONFIG_USB_GSPCA_SPCA1528 is not set
|
|
|
|
# CONFIG_USB_GSPCA_SQ905 is not set
|
|
|
|
# CONFIG_USB_GSPCA_SQ905C is not set
|
|
|
|
# CONFIG_USB_GSPCA_SQ930X is not set
|
|
|
|
# CONFIG_USB_GSPCA_STK014 is not set
|
|
|
|
# CONFIG_USB_GSPCA_STV0680 is not set
|
|
|
|
# CONFIG_USB_GSPCA_SUNPLUS is not set
|
|
|
|
# CONFIG_USB_GSPCA_T613 is not set
|
|
|
|
# CONFIG_USB_GSPCA_TOPRO is not set
|
|
|
|
# CONFIG_USB_GSPCA_TV8532 is not set
|
|
|
|
# CONFIG_USB_GSPCA_VC032X is not set
|
|
|
|
# CONFIG_USB_GSPCA_VICAM is not set
|
|
|
|
# CONFIG_USB_GSPCA_XIRLINK_CIT is not set
|
|
|
|
# CONFIG_USB_GSPCA_ZC3XX is not set
|
|
|
|
# CONFIG_USB_PWC is not set
|
|
|
|
# CONFIG_VIDEO_CPIA2 is not set
|
|
|
|
# CONFIG_USB_ZR364XX is not set
|
|
|
|
# CONFIG_USB_STKWEBCAM is not set
|
|
|
|
# CONFIG_USB_S2255 is not set
|
|
|
|
# CONFIG_USB_SN9C102 is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Analog/digital TV USB devices
|
|
|
|
#
|
|
|
|
# CONFIG_VIDEO_AU0828 is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Digital TV USB devices
|
|
|
|
#
|
|
|
|
# CONFIG_DVB_USB_V2 is not set
|
|
|
|
# CONFIG_DVB_TTUSB_BUDGET is not set
|
|
|
|
# CONFIG_DVB_TTUSB_DEC is not set
|
|
|
|
# CONFIG_SMS_USB_DRV is not set
|
|
|
|
# CONFIG_DVB_B2C2_FLEXCOP_USB is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Webcam, TV (analog/digital) USB devices
|
|
|
|
#
|
|
|
|
# CONFIG_VIDEO_EM28XX is not set
|
|
|
|
# CONFIG_MEDIA_PCI_SUPPORT is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_V4L_PLATFORM_DRIVERS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_VIDEO_CAFE_CCIC is not set
|
|
|
|
# CONFIG_VIDEO_TIMBERDALE is not set
|
|
|
|
# CONFIG_SOC_CAMERA is not set
|
|
|
|
# CONFIG_V4L_MEM2MEM_DRIVERS is not set
|
|
|
|
# CONFIG_V4L_TEST_DRIVERS is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Qualcomm MSM Camera And Video
|
|
|
|
#
|
|
|
|
# CONFIG_MSM_CAMERA is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSMB_CAMERA=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MSMB_CAMERA_DEBUG is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_CAMERA_SENSOR=y
|
|
|
|
CONFIG_MSM_CPP=y
|
|
|
|
CONFIG_MSM_CCI=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MSM_CSI20_HEADER is not set
|
|
|
|
# CONFIG_MSM_CSI22_HEADER is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_CSI30_HEADER=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MSM_CSI31_HEADER is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_CSIPHY=y
|
|
|
|
CONFIG_MSM_CSID=y
|
|
|
|
CONFIG_MSM_EEPROM=y
|
|
|
|
CONFIG_MSM_ISPIF=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MSM_ISPIF_V1 is not set
|
|
|
|
# CONFIG_IMX134 is not set
|
|
|
|
# CONFIG_IMX132 is not set
|
|
|
|
# CONFIG_OV9724 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_HI256=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_OV5648 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MT9M114=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_OV5645 is not set
|
|
|
|
# CONFIG_OV7695 is not set
|
|
|
|
# CONFIG_SP1628 is not set
|
|
|
|
# CONFIG_GC0339 is not set
|
|
|
|
# CONFIG_GC0310 is not set
|
|
|
|
# CONFIG_OV8825 is not set
|
|
|
|
# CONFIG_OV8865 is not set
|
|
|
|
# CONFIG_s5k4e1 is not set
|
|
|
|
# CONFIG_OV12830 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SONY_CAM_V4L2=y
|
|
|
|
CONFIG_MSM_V4L2_VIDEO_OVERLAY_DEVICE=y
|
|
|
|
CONFIG_MSMB_JPEG=y
|
|
|
|
CONFIG_MSM_FD=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MSM_VIDC_V4L2 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_DVB_MPQ=y
|
|
|
|
CONFIG_DVB_MPQ_DEMUX=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_DVB_MPQ_NUM_DMX_DEVICES=4
|
|
|
|
CONFIG_DVB_MPQ_TSPP1=y
|
|
|
|
# CONFIG_DVB_MPQ_VIDEO is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_TSPP=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_CI_BRIDGE_SPI is not set
|
|
|
|
# CONFIG_MSM_VPU is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Supported MMC/SDIO adapters
|
|
|
|
#
|
|
|
|
# CONFIG_SMS_SDIO_DRV is not set
|
|
|
|
CONFIG_RADIO_ADAPTERS=y
|
|
|
|
# CONFIG_RADIO_SI470X is not set
|
|
|
|
# CONFIG_USB_MR800 is not set
|
|
|
|
# CONFIG_USB_DSBR is not set
|
|
|
|
# CONFIG_RADIO_MAXIRADIO is not set
|
|
|
|
# CONFIG_RADIO_SHARK is not set
|
|
|
|
# CONFIG_RADIO_SHARK2 is not set
|
|
|
|
# CONFIG_I2C_SI4713 is not set
|
|
|
|
# CONFIG_RADIO_SI4713 is not set
|
|
|
|
# CONFIG_USB_KEENE is not set
|
|
|
|
# CONFIG_USB_MA901 is not set
|
|
|
|
# CONFIG_RADIO_TEA5764 is not set
|
|
|
|
# CONFIG_RADIO_SAA7706H is not set
|
|
|
|
# CONFIG_RADIO_TEF6862 is not set
|
|
|
|
# CONFIG_RADIO_WL1273 is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Texas Instruments WL128x FM driver (ST based)
|
|
|
|
#
|
|
|
|
# CONFIG_RADIO_WL128X is not set
|
|
|
|
# CONFIG_RADIO_IRIS is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_RADIO_SILABS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_CYPRESS_FIRMWARE is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Media ancillary drivers (tuners, sensors, i2c, frontends)
|
|
|
|
#
|
|
|
|
CONFIG_MEDIA_SUBDRV_AUTOSELECT=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# Audio decoders, processors and mixers
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# RDS decoders
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# Video decoders
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# Video and audio decoders
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# Video encoders
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# Camera sensor devices
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# Flash devices
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# Video improvement chips
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# Miscelaneous helper chips
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# Sensors used on soc_camera driver
|
|
|
|
#
|
|
|
|
CONFIG_MEDIA_TUNER=y
|
|
|
|
CONFIG_MEDIA_TUNER_SIMPLE=y
|
|
|
|
CONFIG_MEDIA_TUNER_TDA8290=y
|
|
|
|
CONFIG_MEDIA_TUNER_TDA827X=y
|
|
|
|
CONFIG_MEDIA_TUNER_TDA18271=y
|
|
|
|
CONFIG_MEDIA_TUNER_TDA9887=y
|
|
|
|
CONFIG_MEDIA_TUNER_TEA5761=y
|
|
|
|
CONFIG_MEDIA_TUNER_TEA5767=y
|
|
|
|
CONFIG_MEDIA_TUNER_MT20XX=y
|
|
|
|
CONFIG_MEDIA_TUNER_XC2028=y
|
|
|
|
CONFIG_MEDIA_TUNER_XC5000=y
|
|
|
|
CONFIG_MEDIA_TUNER_XC4000=y
|
|
|
|
CONFIG_MEDIA_TUNER_MC44S803=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# Multistandard (satellite) frontends
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# Multistandard (cable + terrestrial) frontends
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# DVB-S (satellite) frontends
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# DVB-T (terrestrial) frontends
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# DVB-C (cable) frontends
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# ATSC (North American/Korean Terrestrial/Cable DTV) frontends
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# ISDB-T (terrestrial) frontends
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# Digital terrestrial only tuners/PLL
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# SEC control devices for DVB-S
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# Tools to develop new frontends
|
|
|
|
#
|
|
|
|
# CONFIG_DVB_DUMMY_FE is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Graphics support
|
|
|
|
#
|
|
|
|
CONFIG_VGA_ARB=y
|
|
|
|
CONFIG_VGA_ARB_MAX_GPUS=16
|
|
|
|
# CONFIG_DRM is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_KGSL=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MSM_KGSL_CFF_DUMP is not set
|
|
|
|
CONFIG_MSM_ADRENO_DEFAULT_GOVERNOR="msm-adreno-tz"
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_KGSL_PER_PROCESS_PAGE_TABLE=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_VGASTATE is not set
|
|
|
|
# CONFIG_VIDEO_OUTPUT_CONTROL is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_FB=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_FIRMWARE_EDID is not set
|
|
|
|
# CONFIG_FB_DDC is not set
|
|
|
|
# CONFIG_FB_BOOT_VESA_SUPPORT is not set
|
|
|
|
CONFIG_FB_CFB_FILLRECT=y
|
|
|
|
CONFIG_FB_CFB_COPYAREA=y
|
|
|
|
CONFIG_FB_CFB_IMAGEBLIT=y
|
|
|
|
# CONFIG_FB_CFB_REV_PIXELS_IN_BYTE is not set
|
|
|
|
# CONFIG_FB_SYS_FILLRECT is not set
|
|
|
|
# CONFIG_FB_SYS_COPYAREA is not set
|
|
|
|
# CONFIG_FB_SYS_IMAGEBLIT is not set
|
|
|
|
# CONFIG_FB_FOREIGN_ENDIAN is not set
|
|
|
|
# CONFIG_FB_SYS_FOPS is not set
|
|
|
|
# CONFIG_FB_SVGALIB is not set
|
|
|
|
# CONFIG_FB_MACMODES is not set
|
|
|
|
# CONFIG_FB_MODE_HELPERS is not set
|
|
|
|
# CONFIG_FB_TILEBLITTING is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Frame buffer hardware drivers
|
|
|
|
#
|
|
|
|
# CONFIG_FB_CIRRUS is not set
|
|
|
|
# CONFIG_FB_PM2 is not set
|
|
|
|
# CONFIG_FB_CYBER2000 is not set
|
|
|
|
# CONFIG_FB_ASILIANT is not set
|
|
|
|
# CONFIG_FB_IMSTT is not set
|
|
|
|
# CONFIG_FB_S1D13XXX is not set
|
|
|
|
# CONFIG_FB_NVIDIA is not set
|
|
|
|
# CONFIG_FB_RIVA is not set
|
|
|
|
# CONFIG_FB_I740 is not set
|
|
|
|
# CONFIG_FB_MATROX is not set
|
|
|
|
# CONFIG_FB_RADEON is not set
|
|
|
|
# CONFIG_FB_ATY128 is not set
|
|
|
|
# CONFIG_FB_ATY is not set
|
|
|
|
# CONFIG_FB_S3 is not set
|
|
|
|
# CONFIG_FB_SAVAGE is not set
|
|
|
|
# CONFIG_FB_SIS is not set
|
|
|
|
# CONFIG_FB_NEOMAGIC is not set
|
|
|
|
# CONFIG_FB_KYRO is not set
|
|
|
|
# CONFIG_FB_3DFX is not set
|
|
|
|
# CONFIG_FB_VOODOO1 is not set
|
|
|
|
# CONFIG_FB_VT8623 is not set
|
|
|
|
# CONFIG_FB_TRIDENT is not set
|
|
|
|
# CONFIG_FB_ARK is not set
|
|
|
|
# CONFIG_FB_PM3 is not set
|
|
|
|
# CONFIG_FB_CARMINE is not set
|
|
|
|
# CONFIG_FB_TMIO is not set
|
|
|
|
# CONFIG_FB_SMSCUFX is not set
|
|
|
|
# CONFIG_FB_UDL is not set
|
|
|
|
# CONFIG_FB_GOLDFISH is not set
|
|
|
|
# CONFIG_FB_VIRTUAL is not set
|
|
|
|
# CONFIG_FB_METRONOME is not set
|
|
|
|
# CONFIG_FB_MB862XX is not set
|
|
|
|
# CONFIG_FB_BROADSHEET is not set
|
|
|
|
# CONFIG_FB_AUO_K190X is not set
|
|
|
|
# CONFIG_FB_SIMPLE is not set
|
|
|
|
# CONFIG_MSM_VIDC_CONTENT_PROTECTION is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_FB_MSM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_FB_MSM_BACKLIGHT=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_FB_MSM_LOGO=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_FB_MSM_LCDC_HW is not set
|
|
|
|
# CONFIG_FB_MSM_TRIPLE_BUFFER is not set
|
|
|
|
# CONFIG_FB_MSM_MDP_HW is not set
|
|
|
|
CONFIG_FB_MSM_MDSS_COMMON=y
|
|
|
|
# CONFIG_FB_MSM_MDP22 is not set
|
|
|
|
# CONFIG_FB_MSM_MDP30 is not set
|
|
|
|
# CONFIG_FB_MSM_MDP31 is not set
|
|
|
|
# CONFIG_FB_MSM_MDP40 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_FB_MSM_MDSS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_FB_MSM_MDP_NONE is not set
|
|
|
|
# CONFIG_FB_MSM_MDDI is not set
|
|
|
|
# CONFIG_FB_MSM_MIPI_DSI is not set
|
|
|
|
# CONFIG_FB_MSM_EXTMDDI is not set
|
|
|
|
# CONFIG_FB_MSM_MDDI_AUTO_DETECT is not set
|
|
|
|
# CONFIG_FB_MSM_LCDC_AUTO_DETECT is not set
|
|
|
|
CONFIG_FB_MSM_LVDS_CHIMEI_WXGA_PANEL=y
|
|
|
|
# CONFIG_FB_MSM_LVDS_FRC_FHD_PANEL is not set
|
|
|
|
# CONFIG_FB_MSM_MIPI_PANEL_DETECT is not set
|
|
|
|
# CONFIG_FB_MSM_MDDI_PANEL_AUTO_DETECT is not set
|
|
|
|
# CONFIG_FB_MSM_LCDC_PANEL_AUTO_DETECT is not set
|
|
|
|
# CONFIG_FB_MSM_LCDC_MIPI_PANEL_AUTO_DETECT is not set
|
|
|
|
# CONFIG_FB_MSM_LVDS_MIPI_PANEL_DETECT is not set
|
|
|
|
# CONFIG_FB_MSM_MDDI_TOSHIBA_VGA is not set
|
|
|
|
# CONFIG_FB_MSM_MIPI_TOSHIBA_VIDEO_WVGA_PT_PANEL is not set
|
|
|
|
# CONFIG_FB_MSM_MIPI_TOSHIBA_VIDEO_WSVGA_PT_PANEL is not set
|
|
|
|
# CONFIG_FB_MSM_MIPI_TOSHIBA_VIDEO_WUXGA_PANEL is not set
|
|
|
|
# CONFIG_FB_MSM_MIPI_NOVATEK_VIDEO_QHD_PT_PANEL is not set
|
|
|
|
# CONFIG_FB_MSM_MIPI_NOVATEK_CMD_QHD_PT_PANEL is not set
|
|
|
|
# CONFIG_FB_MSM_MIPI_ORISE_VIDEO_720P_PT_PANEL is not set
|
|
|
|
# CONFIG_FB_MSM_MIPI_ORISE_CMD_720P_PT_PANEL is not set
|
|
|
|
# CONFIG_FB_MSM_MIPI_RENESAS_VIDEO_FWVGA_PT_PANEL is not set
|
|
|
|
# CONFIG_FB_MSM_MIPI_RENESAS_CMD_FWVGA_PT_PANEL is not set
|
|
|
|
# CONFIG_FB_MSM_MIPI_CHIMEI_WXGA_PANEL is not set
|
|
|
|
# CONFIG_FB_MSM_MIPI_CHIMEI_WUXGA_PANEL is not set
|
|
|
|
# CONFIG_FB_MSM_MIPI_TRULY_VIDEO_WVGA_PT_PANEL is not set
|
|
|
|
# CONFIG_FB_MSM_MIPI_NT35510_VIDEO_WVGA_PT_PANEL is not set
|
|
|
|
# CONFIG_FB_MSM_MIPI_NT35510_CMD_WVGA_PT_PANEL is not set
|
|
|
|
# CONFIG_FB_MSM_MIPI_NT35516_VIDEO_QHD_PT_PANEL is not set
|
|
|
|
# CONFIG_FB_MSM_MIPI_NT35516_CMD_QHD_PT_PANEL is not set
|
|
|
|
# CONFIG_FB_MSM_MIPI_SIMULATOR_VIDEO_PANEL is not set
|
|
|
|
# CONFIG_FB_MSM_PANEL_NONE is not set
|
|
|
|
# CONFIG_FB_MSM_HDMI_COMMON is not set
|
|
|
|
# CONFIG_FB_MSM_HDMI_3D is not set
|
|
|
|
# CONFIG_FB_MSM_EBI2_PANEL_DETECT is not set
|
|
|
|
# CONFIG_FB_MSM_QPIC_ILI_QVGA_PANEL is not set
|
|
|
|
# CONFIG_FB_MSM_QPIC_PANEL_DETECT is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_FB_MSM_MDSS_WRITEBACK=y
|
|
|
|
CONFIG_FB_MSM_MDSS_SPECIFIC_PANEL=y
|
|
|
|
CONFIG_FB_MSM_MDSS_HDMI_PANEL=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_FB_MSM_MDSS_HDMI_MHL_SII8334 is not set
|
|
|
|
# CONFIG_FB_MSM_MDSS_MHL3 is not set
|
|
|
|
# CONFIG_FB_MSM_MDSS_DSI_CTRL_STATUS is not set
|
|
|
|
# CONFIG_FB_MSM_MDSS_EDP_PANEL is not set
|
|
|
|
# CONFIG_FB_MSM_MDSS_MDP3 is not set
|
|
|
|
# CONFIG_FB_MSM_MDSS_XLOG_DEBUG is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MHL_SIMG_SONY=y
|
|
|
|
CONFIG_MHL_DEVICE_ID=0x07
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_MHL_UPSTREAM_HPD_PUSH_PULL=y
|
|
|
|
CONFIG_MHL_HPD_UPSTREAM_HDMI_IS_HIGH_TRIGGER=y
|
|
|
|
# CONFIG_MHL_SUPPORT_UNPOWERED_DONGLE is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MHL_BIST=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SUPPORT_CHG_TIMING is not set
|
|
|
|
# CONFIG_EXYNOS_VIDEO is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_BACKLIGHT_LCD_SUPPORT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_LCD_CLASS_DEVICE=y
|
|
|
|
# CONFIG_LCD_L4F00242T03 is not set
|
|
|
|
# CONFIG_LCD_LMS283GF05 is not set
|
|
|
|
# CONFIG_LCD_LTV350QV is not set
|
|
|
|
# CONFIG_LCD_ILI922X is not set
|
|
|
|
# CONFIG_LCD_ILI9320 is not set
|
|
|
|
# CONFIG_LCD_TDO24M is not set
|
|
|
|
# CONFIG_LCD_VGG2432A4 is not set
|
|
|
|
# CONFIG_LCD_PLATFORM is not set
|
|
|
|
# CONFIG_LCD_S6E63M0 is not set
|
|
|
|
# CONFIG_LCD_LD9040 is not set
|
|
|
|
# CONFIG_LCD_AMS369FG06 is not set
|
|
|
|
# CONFIG_LCD_LMS501KF03 is not set
|
|
|
|
# CONFIG_LCD_HX8357 is not set
|
|
|
|
CONFIG_BACKLIGHT_CLASS_DEVICE=y
|
|
|
|
CONFIG_BACKLIGHT_GENERIC=y
|
|
|
|
# CONFIG_BACKLIGHT_PWM is not set
|
|
|
|
# CONFIG_BACKLIGHT_ADP8860 is not set
|
|
|
|
# CONFIG_BACKLIGHT_ADP8870 is not set
|
|
|
|
# CONFIG_BACKLIGHT_LM3630 is not set
|
|
|
|
# CONFIG_BACKLIGHT_LM3639 is not set
|
|
|
|
# CONFIG_BACKLIGHT_LP855X is not set
|
|
|
|
# CONFIG_ADF is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Console display driver support
|
|
|
|
#
|
|
|
|
CONFIG_DUMMY_CONSOLE=y
|
|
|
|
CONFIG_FRAMEBUFFER_CONSOLE=y
|
|
|
|
CONFIG_FRAMEBUFFER_CONSOLE_DETECT_PRIMARY=y
|
|
|
|
# CONFIG_FRAMEBUFFER_CONSOLE_ROTATION is not set
|
|
|
|
# CONFIG_FONTS is not set
|
|
|
|
CONFIG_FONT_8x8=y
|
|
|
|
CONFIG_FONT_8x16=y
|
|
|
|
# CONFIG_LOGO is not set
|
|
|
|
# CONFIG_FB_SSD1307 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SOUND=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SOUND_OSS_CORE is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SND=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_SND_TIMER=y
|
|
|
|
CONFIG_SND_PCM=y
|
|
|
|
CONFIG_SND_HWDEP=y
|
|
|
|
CONFIG_SND_RAWMIDI=y
|
|
|
|
CONFIG_SND_COMPRESS_OFFLOAD=y
|
|
|
|
CONFIG_SND_JACK=y
|
|
|
|
# CONFIG_SND_SEQUENCER is not set
|
|
|
|
# CONFIG_SND_MIXER_OSS is not set
|
|
|
|
# CONFIG_SND_PCM_OSS is not set
|
|
|
|
# CONFIG_SND_HRTIMER is not set
|
|
|
|
CONFIG_SND_DYNAMIC_MINORS=y
|
2020-05-31 10:32:05 +00:00
|
|
|
# CONFIG_SND_SUPPORT_OLD_API is not set
|
|
|
|
# CONFIG_SND_VERBOSE_PROCFS is not set
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SND_VERBOSE_PRINTK is not set
|
|
|
|
# CONFIG_SND_DEBUG is not set
|
|
|
|
# CONFIG_SND_RAWMIDI_SEQ is not set
|
|
|
|
# CONFIG_SND_OPL3_LIB_SEQ is not set
|
|
|
|
# CONFIG_SND_OPL4_LIB_SEQ is not set
|
|
|
|
# CONFIG_SND_SBAWE_SEQ is not set
|
|
|
|
# CONFIG_SND_EMU10K1_SEQ is not set
|
|
|
|
CONFIG_SND_DRIVERS=y
|
|
|
|
# CONFIG_SND_DUMMY is not set
|
|
|
|
# CONFIG_SND_ALOOP is not set
|
|
|
|
# CONFIG_SND_MTPAV is not set
|
|
|
|
# CONFIG_SND_SERIAL_U16550 is not set
|
|
|
|
# CONFIG_SND_MPU401 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
# CONFIG_SND_PCI is not set
|
|
|
|
# CONFIG_SND_SPI is not set
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_SND_USB=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SND_USB_AUDIO=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SND_USB_UA101 is not set
|
|
|
|
# CONFIG_SND_USB_CAIAQ is not set
|
|
|
|
# CONFIG_SND_USB_6FIRE is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SND_SOC=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SND_ATMEL_SOC is not set
|
|
|
|
# CONFIG_SND_DESIGNWARE_I2S is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# MSM SoC Audio support
|
|
|
|
#
|
|
|
|
CONFIG_SND_SOC_MSM_HOSTLESS_PCM=y
|
|
|
|
CONFIG_SND_SOC_MSM_QDSP6V2_INTF=y
|
|
|
|
# CONFIG_SND_SOC_QDSP6 is not set
|
|
|
|
CONFIG_SND_SOC_QDSP6V2=y
|
|
|
|
# CONFIG_AUDIO_OCMEM is not set
|
|
|
|
# CONFIG_DOLBY_DAP is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_AHC=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_DTS_EAGLE=y
|
|
|
|
CONFIG_DOLBY_DS2=y
|
|
|
|
CONFIG_DTS_SRS_TM=y
|
|
|
|
CONFIG_QTI_PP=y
|
|
|
|
CONFIG_SND_SOC_CPE=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SND_SOC_MSM8994=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_PLUG_DET_TH_MID is not set
|
|
|
|
CONFIG_SND_SOC_I2C_AND_SPI=y
|
|
|
|
# CONFIG_SND_SOC_ALL_CODECS is not set
|
|
|
|
CONFIG_SND_SOC_WCD9330=y
|
|
|
|
CONFIG_SND_SOC_WCD9XXX=y
|
|
|
|
CONFIG_SND_SOC_WCD_CPE=y
|
|
|
|
CONFIG_SND_SOC_MSM_STUB=y
|
|
|
|
CONFIG_SND_SOC_MSM_HDMI_CODEC_RX=y
|
|
|
|
# CONFIG_SND_SIMPLE_CARD is not set
|
|
|
|
# CONFIG_SOUND_PRIME is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# HID support
|
|
|
|
#
|
|
|
|
CONFIG_HID=y
|
|
|
|
# CONFIG_HID_BATTERY_STRENGTH is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_HIDRAW=y
|
|
|
|
CONFIG_UHID=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_HID_GENERIC=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# Special HID drivers
|
|
|
|
#
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_HID_A4TECH=y
|
|
|
|
CONFIG_HID_ACRUX=y
|
|
|
|
CONFIG_HID_ACRUX_FF=y
|
|
|
|
CONFIG_HID_APPLE=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_HID_APPLEIR is not set
|
|
|
|
# CONFIG_HID_AUREAL is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_HID_BELKIN=y
|
|
|
|
CONFIG_HID_CHERRY=y
|
|
|
|
CONFIG_HID_CHICONY=y
|
|
|
|
CONFIG_HID_PRODIKEYS=y
|
|
|
|
CONFIG_HID_CYPRESS=y
|
|
|
|
CONFIG_HID_DRAGONRISE=y
|
|
|
|
CONFIG_DRAGONRISE_FF=y
|
|
|
|
CONFIG_HID_EMS_FF=y
|
|
|
|
CONFIG_HID_ELECOM=y
|
|
|
|
CONFIG_HID_EZKEY=y
|
|
|
|
CONFIG_HID_HOLTEK=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_HOLTEK_FF is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_HID_KEYTOUCH=y
|
|
|
|
CONFIG_HID_KYE=y
|
|
|
|
CONFIG_HID_UCLOGIC=y
|
|
|
|
CONFIG_HID_WALTOP=y
|
|
|
|
CONFIG_HID_GYRATION=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_HID_ICADE is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_HID_TWINHAN=y
|
|
|
|
CONFIG_HID_KENSINGTON=y
|
|
|
|
CONFIG_HID_LCPOWER=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_HID_LENOVO_TPKBD is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_HID_LOGITECH=y
|
|
|
|
CONFIG_HID_LOGITECH_DJ=y
|
|
|
|
CONFIG_LOGITECH_FF=y
|
|
|
|
CONFIG_LOGIRUMBLEPAD2_FF=y
|
|
|
|
CONFIG_LOGIG940_FF=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_LOGIWHEELS_FF=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_HID_MAGICMOUSE=y
|
|
|
|
CONFIG_HID_MICROSOFT=y
|
|
|
|
CONFIG_HID_MONTEREY=y
|
|
|
|
CONFIG_HID_MULTITOUCH=y
|
|
|
|
CONFIG_HID_NTRIG=y
|
|
|
|
CONFIG_HID_ORTEK=y
|
|
|
|
CONFIG_HID_PANTHERLORD=y
|
|
|
|
CONFIG_PANTHERLORD_FF=y
|
|
|
|
CONFIG_HID_PETALYNX=y
|
|
|
|
CONFIG_HID_PICOLCD=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_HID_PICOLCD_FB is not set
|
|
|
|
# CONFIG_HID_PICOLCD_BACKLIGHT is not set
|
|
|
|
# CONFIG_HID_PICOLCD_LCD is not set
|
|
|
|
# CONFIG_HID_PICOLCD_LEDS is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_HID_PRIMAX=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_HID_PS3REMOTE is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_HID_ROCCAT=y
|
|
|
|
CONFIG_HID_SAITEK=y
|
|
|
|
CONFIG_HID_SAMSUNG=y
|
|
|
|
CONFIG_HID_SONY=y
|
|
|
|
CONFIG_HID_SPEEDLINK=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_HID_STEELSERIES is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_HID_SUNPLUS=y
|
|
|
|
CONFIG_HID_GREENASIA=y
|
|
|
|
CONFIG_GREENASIA_FF=y
|
|
|
|
CONFIG_HID_SMARTJOYPLUS=y
|
|
|
|
CONFIG_SMARTJOYPLUS_FF=y
|
|
|
|
CONFIG_HID_TIVO=y
|
|
|
|
CONFIG_HID_TOPSEED=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_HID_THINGM is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_HID_THRUSTMASTER=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_THRUSTMASTER_FF is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_HID_WACOM=y
|
|
|
|
CONFIG_HID_WIIMOTE=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_HID_WIIMOTE_EXT=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_HID_ZEROPLUS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_ZEROPLUS_FF is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_HID_ZYDACRON=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_HID_SENSOR_HUB is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# USB HID support
|
|
|
|
#
|
|
|
|
CONFIG_USB_HID=y
|
|
|
|
# CONFIG_HID_PID is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_USB_HIDDEV=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# I2C HID support
|
|
|
|
#
|
|
|
|
# CONFIG_I2C_HID is not set
|
|
|
|
CONFIG_USB_SUPPORT=y
|
|
|
|
CONFIG_USB_COMMON=y
|
|
|
|
CONFIG_USB_ARCH_HAS_HCD=y
|
|
|
|
CONFIG_USB=y
|
|
|
|
# CONFIG_USB_DEBUG is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_USB_ANNOUNCE_NEW_DEVICES=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# Miscellaneous USB options
|
|
|
|
#
|
|
|
|
CONFIG_USB_DEFAULT_PERSIST=y
|
|
|
|
# CONFIG_USB_DYNAMIC_MINORS is not set
|
|
|
|
# CONFIG_USB_OTG is not set
|
|
|
|
# CONFIG_USB_OTG_WHITELIST is not set
|
|
|
|
# CONFIG_USB_OTG_BLACKLIST_HUB is not set
|
|
|
|
# CONFIG_USB_MON is not set
|
|
|
|
# CONFIG_USB_WUSB_CBAF is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# USB Host Controller Drivers
|
|
|
|
#
|
|
|
|
# CONFIG_USB_C67X00_HCD is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_USB_XHCI_HCD=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_USB_XHCI_PLATFORM=y
|
|
|
|
# CONFIG_USB_XHCI_MSM_HSIC is not set
|
|
|
|
# CONFIG_USB_XHCI_HCD_DEBUGGING is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_USB_EHCI_HCD=y
|
|
|
|
CONFIG_USB_EHCI_EHSET=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_USB_EHCI_ROOT_HUB_TT=y
|
|
|
|
CONFIG_USB_EHCI_TT_NEWSCHED=y
|
|
|
|
CONFIG_USB_EHCI_PCI=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_USB_EHCI_MSM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_USB_EHCI_MSM_HSIC is not set
|
|
|
|
# CONFIG_USB_EHCI_MSM_UICC is not set
|
|
|
|
# CONFIG_USB_EHCI_HCD_PLATFORM is not set
|
|
|
|
# CONFIG_USB_OXU210HP_HCD is not set
|
|
|
|
# CONFIG_USB_ISP116X_HCD is not set
|
|
|
|
# CONFIG_USB_ISP1760_HCD is not set
|
|
|
|
# CONFIG_USB_ISP1362_HCD is not set
|
|
|
|
# CONFIG_USB_OHCI_HCD is not set
|
|
|
|
# CONFIG_USB_UHCI_HCD is not set
|
|
|
|
# CONFIG_USB_SL811_HCD is not set
|
|
|
|
# CONFIG_USB_R8A66597_HCD is not set
|
|
|
|
# CONFIG_USB_ICE40_HCD is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_USB_HOST_EXTRA_NOTIFICATION=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_USB_MUSB_HDRC is not set
|
|
|
|
# CONFIG_USB_RENESAS_USBHS is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# USB Device Class drivers
|
|
|
|
#
|
|
|
|
# CONFIG_USB_ACM is not set
|
|
|
|
# CONFIG_USB_PRINTER is not set
|
|
|
|
# CONFIG_USB_WDM is not set
|
|
|
|
# CONFIG_USB_TMC is not set
|
|
|
|
# CONFIG_USB_CCID_BRIDGE is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# NOTE: USB_STORAGE depends on SCSI but BLK_DEV_SD may
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# also be needed; see USB_STORAGE Help for more info
|
|
|
|
#
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_USB_STORAGE=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_USB_STORAGE_DEBUG is not set
|
|
|
|
# CONFIG_USB_STORAGE_REALTEK is not set
|
|
|
|
# CONFIG_USB_STORAGE_DATAFAB is not set
|
|
|
|
# CONFIG_USB_STORAGE_FREECOM is not set
|
|
|
|
# CONFIG_USB_STORAGE_ISD200 is not set
|
|
|
|
# CONFIG_USB_STORAGE_USBAT is not set
|
|
|
|
# CONFIG_USB_STORAGE_SDDR09 is not set
|
|
|
|
# CONFIG_USB_STORAGE_SDDR55 is not set
|
|
|
|
# CONFIG_USB_STORAGE_JUMPSHOT is not set
|
|
|
|
# CONFIG_USB_STORAGE_ALAUDA is not set
|
|
|
|
# CONFIG_USB_STORAGE_ONETOUCH is not set
|
|
|
|
# CONFIG_USB_STORAGE_KARMA is not set
|
|
|
|
# CONFIG_USB_STORAGE_CYPRESS_ATACB is not set
|
|
|
|
# CONFIG_USB_STORAGE_ENE_UB6250 is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# USB Imaging devices
|
|
|
|
#
|
|
|
|
# CONFIG_USB_MDC800 is not set
|
|
|
|
# CONFIG_USB_MICROTEK is not set
|
|
|
|
CONFIG_USB_DWC3=y
|
|
|
|
# CONFIG_USB_DWC3_HOST is not set
|
|
|
|
# CONFIG_USB_DWC3_GADGET is not set
|
|
|
|
CONFIG_USB_DWC3_DUAL_ROLE=y
|
|
|
|
# CONFIG_USB_DWC3_DEBUG is not set
|
|
|
|
# CONFIG_USB_CHIPIDEA is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# USB port drivers
|
|
|
|
#
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_USB_SERIAL=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_USB_SERIAL_CONSOLE is not set
|
|
|
|
# CONFIG_USB_SERIAL_GENERIC is not set
|
|
|
|
# CONFIG_USB_SERIAL_AIRCABLE is not set
|
|
|
|
# CONFIG_USB_SERIAL_ARK3116 is not set
|
|
|
|
# CONFIG_USB_SERIAL_BELKIN is not set
|
|
|
|
# CONFIG_USB_SERIAL_CH341 is not set
|
|
|
|
# CONFIG_USB_SERIAL_WHITEHEAT is not set
|
|
|
|
# CONFIG_USB_SERIAL_DIGI_ACCELEPORT is not set
|
|
|
|
# CONFIG_USB_SERIAL_CP210X is not set
|
|
|
|
# CONFIG_USB_SERIAL_CYPRESS_M8 is not set
|
|
|
|
# CONFIG_USB_SERIAL_EMPEG is not set
|
|
|
|
# CONFIG_USB_SERIAL_FTDI_SIO is not set
|
|
|
|
# CONFIG_USB_SERIAL_FUNSOFT is not set
|
|
|
|
# CONFIG_USB_SERIAL_VISOR is not set
|
|
|
|
# CONFIG_USB_SERIAL_IPAQ is not set
|
|
|
|
# CONFIG_USB_SERIAL_IR is not set
|
|
|
|
# CONFIG_USB_SERIAL_EDGEPORT is not set
|
|
|
|
# CONFIG_USB_SERIAL_EDGEPORT_TI is not set
|
|
|
|
# CONFIG_USB_SERIAL_F81232 is not set
|
|
|
|
# CONFIG_USB_SERIAL_GARMIN is not set
|
|
|
|
# CONFIG_USB_SERIAL_IPW is not set
|
|
|
|
# CONFIG_USB_SERIAL_IUU is not set
|
|
|
|
# CONFIG_USB_SERIAL_KEYSPAN_PDA is not set
|
|
|
|
# CONFIG_USB_SERIAL_KEYSPAN is not set
|
|
|
|
# CONFIG_USB_SERIAL_KLSI is not set
|
|
|
|
# CONFIG_USB_SERIAL_KOBIL_SCT is not set
|
|
|
|
# CONFIG_USB_SERIAL_MCT_U232 is not set
|
|
|
|
# CONFIG_USB_SERIAL_METRO is not set
|
|
|
|
# CONFIG_USB_SERIAL_MOS7720 is not set
|
|
|
|
# CONFIG_USB_SERIAL_MOS7840 is not set
|
|
|
|
# CONFIG_USB_SERIAL_MOTOROLA is not set
|
|
|
|
# CONFIG_USB_SERIAL_NAVMAN is not set
|
|
|
|
# CONFIG_USB_SERIAL_PL2303 is not set
|
|
|
|
# CONFIG_USB_SERIAL_OTI6858 is not set
|
|
|
|
# CONFIG_USB_SERIAL_QCAUX is not set
|
|
|
|
# CONFIG_USB_SERIAL_QUALCOMM is not set
|
|
|
|
# CONFIG_USB_SERIAL_SPCP8X5 is not set
|
|
|
|
# CONFIG_USB_SERIAL_HP4X is not set
|
|
|
|
# CONFIG_USB_SERIAL_SAFE is not set
|
|
|
|
# CONFIG_USB_SERIAL_SIEMENS_MPI is not set
|
|
|
|
# CONFIG_USB_SERIAL_SIERRAWIRELESS is not set
|
|
|
|
# CONFIG_USB_SERIAL_SYMBOL is not set
|
|
|
|
# CONFIG_USB_SERIAL_TI is not set
|
|
|
|
# CONFIG_USB_SERIAL_CYBERJACK is not set
|
|
|
|
# CONFIG_USB_SERIAL_XIRCOM is not set
|
|
|
|
# CONFIG_USB_SERIAL_OPTION is not set
|
|
|
|
# CONFIG_USB_SERIAL_OMNINET is not set
|
|
|
|
# CONFIG_USB_SERIAL_OPTICON is not set
|
|
|
|
# CONFIG_USB_SERIAL_VIVOPAY_SERIAL is not set
|
|
|
|
# CONFIG_USB_SERIAL_XSENS_MT is not set
|
|
|
|
# CONFIG_USB_SERIAL_ZIO is not set
|
|
|
|
# CONFIG_USB_SERIAL_WISHBONE is not set
|
|
|
|
# CONFIG_USB_SERIAL_ZTE is not set
|
|
|
|
# CONFIG_USB_SERIAL_SSU100 is not set
|
|
|
|
# CONFIG_USB_SERIAL_QT2 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_USB_SERIAL_CSVT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_USB_SERIAL_DEBUG is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# USB Miscellaneous drivers
|
|
|
|
#
|
|
|
|
# CONFIG_USB_EMI62 is not set
|
|
|
|
# CONFIG_USB_EMI26 is not set
|
|
|
|
# CONFIG_USB_ADUTUX is not set
|
|
|
|
# CONFIG_USB_SEVSEG is not set
|
|
|
|
# CONFIG_USB_RIO500 is not set
|
|
|
|
# CONFIG_USB_LEGOTOWER is not set
|
|
|
|
# CONFIG_USB_LCD is not set
|
|
|
|
# CONFIG_USB_LED is not set
|
|
|
|
# CONFIG_USB_CYPRESS_CY7C63 is not set
|
|
|
|
# CONFIG_USB_CYTHERM is not set
|
|
|
|
# CONFIG_USB_IDMOUSE is not set
|
|
|
|
# CONFIG_USB_FTDI_ELAN is not set
|
|
|
|
# CONFIG_USB_APPLEDISPLAY is not set
|
|
|
|
# CONFIG_USB_SISUSBVGA is not set
|
|
|
|
# CONFIG_USB_LD is not set
|
|
|
|
# CONFIG_USB_TRANCEVIBRATOR is not set
|
|
|
|
# CONFIG_USB_IOWARRIOR is not set
|
|
|
|
# CONFIG_USB_TEST is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_USB_EHSET_TEST_FIXTURE=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_USB_ISIGHTFW is not set
|
|
|
|
# CONFIG_USB_YUREX is not set
|
|
|
|
# CONFIG_USB_EZUSB_FX2 is not set
|
|
|
|
# CONFIG_USB_HSIC_USB3503 is not set
|
|
|
|
# CONFIG_USB_QCOM_DIAG_BRIDGE is not set
|
|
|
|
# CONFIG_USB_QCOM_MDM_BRIDGE is not set
|
|
|
|
# CONFIG_USB_QCOM_KS_BRIDGE is not set
|
|
|
|
# CONFIG_USB_QCOM_IPC_BRIDGE is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_USB_PHY=y
|
|
|
|
CONFIG_USB_OTG_WAKELOCK=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NOP_USB_XCEIV is not set
|
|
|
|
# CONFIG_OMAP_CONTROL_USB is not set
|
|
|
|
# CONFIG_OMAP_USB3 is not set
|
|
|
|
# CONFIG_SAMSUNG_USBPHY is not set
|
|
|
|
# CONFIG_SAMSUNG_USB2PHY is not set
|
|
|
|
# CONFIG_SAMSUNG_USB3PHY is not set
|
|
|
|
# CONFIG_USB_MSM_OTG_72K is not set
|
|
|
|
# CONFIG_USB_GPIO_VBUS is not set
|
|
|
|
# CONFIG_USB_ISP1301 is not set
|
|
|
|
CONFIG_USB_MSM_OTG=y
|
|
|
|
# CONFIG_USB_MSM_ACA is not set
|
|
|
|
CONFIG_USB_MSM_HSPHY=y
|
|
|
|
CONFIG_USB_MSM_SSPHY=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_USB_MSM_SSPHY_QMP=y
|
|
|
|
CONFIG_MSM_QUSB_PHY=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_USB_RCAR_PHY is not set
|
|
|
|
# CONFIG_DUAL_ROLE_USB_INTF is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_USB_GADGET=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_USB_GADGET_DEBUG is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_USB_GADGET_DEBUG_FILES=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_USB_GADGET_DEBUG_FS is not set
|
|
|
|
CONFIG_USB_GADGET_VBUS_DRAW=500
|
|
|
|
CONFIG_USB_GADGET_STORAGE_NUM_BUFFERS=2
|
|
|
|
|
|
|
|
#
|
|
|
|
# USB Peripheral Controller
|
|
|
|
#
|
|
|
|
# CONFIG_USB_R8A66597 is not set
|
|
|
|
# CONFIG_USB_PXA27X is not set
|
|
|
|
# CONFIG_USB_MV_UDC is not set
|
|
|
|
# CONFIG_USB_MV_U3D is not set
|
|
|
|
# CONFIG_USB_M66592 is not set
|
|
|
|
# CONFIG_USB_AMD5536UDC is not set
|
|
|
|
# CONFIG_USB_NET2272 is not set
|
|
|
|
# CONFIG_USB_NET2280 is not set
|
|
|
|
# CONFIG_USB_GOKU is not set
|
|
|
|
# CONFIG_USB_EG20T is not set
|
|
|
|
# CONFIG_USB_CI13XXX_MSM is not set
|
|
|
|
# CONFIG_USB_CI13XXX_MSM_HSIC is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_USB_DWC3_MSM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_USB_DUMMY_HCD is not set
|
|
|
|
CONFIG_USB_LIBCOMPOSITE=y
|
|
|
|
CONFIG_USB_F_ACM=y
|
|
|
|
CONFIG_USB_U_SERIAL=y
|
|
|
|
CONFIG_USB_F_SERIAL=y
|
|
|
|
# CONFIG_USB_ZERO is not set
|
|
|
|
# CONFIG_USB_AUDIO is not set
|
|
|
|
# CONFIG_USB_ETH is not set
|
|
|
|
# CONFIG_USB_G_NCM is not set
|
|
|
|
# CONFIG_USB_GADGETFS is not set
|
|
|
|
# CONFIG_USB_FUNCTIONFS is not set
|
|
|
|
# CONFIG_USB_MASS_STORAGE is not set
|
|
|
|
# CONFIG_USB_G_SERIAL is not set
|
|
|
|
# CONFIG_USB_MIDI_GADGET is not set
|
|
|
|
# CONFIG_USB_G_PRINTER is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_USB_G_ANDROID=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_USB_ANDROID_RNDIS_DWORD_ALIGNED is not set
|
|
|
|
# CONFIG_USB_AUTO_CDROM_EJECTION is not set
|
|
|
|
# CONFIG_USB_CDC_COMPOSITE is not set
|
|
|
|
# CONFIG_USB_G_ACM_MS is not set
|
|
|
|
# CONFIG_USB_G_MULTI is not set
|
|
|
|
# CONFIG_USB_G_HID is not set
|
|
|
|
# CONFIG_USB_G_DBGP is not set
|
|
|
|
# CONFIG_USB_G_WEBCAM is not set
|
|
|
|
CONFIG_USB_CSW_HACK=y
|
|
|
|
# CONFIG_USB_MSC_PROFILING is not set
|
|
|
|
CONFIG_MODEM_SUPPORT=y
|
|
|
|
CONFIG_RMNET_SMD_CTL_CHANNEL=""
|
|
|
|
CONFIG_RMNET_SMD_DATA_CHANNEL=""
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_USB_MIRRORLINK=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_UWB is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MMC=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MMC_DEBUG is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MMC_PERF_PROFILING=y
|
|
|
|
CONFIG_MMC_UNSAFE_RESUME=y
|
|
|
|
CONFIG_MMC_CLKGATE=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MMC_EMBEDDED_SDIO is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MMC_PARANOID_SD_INIT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_MMC_DISABLE_SD_SDR104=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MMC_CMD_DEBUG=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_MMC_CMD_QUEUE_SIZE=256
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MMC_DDR50_MAX_DTR_LMT=y
|
|
|
|
CONFIG_MMC_SUPPORT_SVS_INTERVAL=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# MMC/SD/SDIO Card Drivers
|
|
|
|
#
|
|
|
|
CONFIG_MMC_BLOCK=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MMC_BLOCK_MINORS=32
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_MMC_BLOCK_BOUNCE=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MMC_BLOCK_DEFERRED_RESUME=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SDIO_UART is not set
|
|
|
|
# CONFIG_MMC_TEST is not set
|
|
|
|
# CONFIG_MMC_FFU is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# MMC/SD/SDIO Host Controller Drivers
|
|
|
|
#
|
|
|
|
# CONFIG_MMC_ARMMMCI is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MMC_SDHCI=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MMC_SDHCI_PCI is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MMC_SDHCI_PLTFM=y
|
|
|
|
CONFIG_MMC_SDHCI_MSM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MMC_SDHCI_PXAV3 is not set
|
|
|
|
# CONFIG_MMC_SDHCI_PXAV2 is not set
|
|
|
|
# CONFIG_MMC_TIFM_SD is not set
|
|
|
|
# CONFIG_MMC_SPI is not set
|
|
|
|
# CONFIG_MMC_CB710 is not set
|
|
|
|
# CONFIG_MMC_VIA_SDMMC is not set
|
|
|
|
# CONFIG_MMC_VUB300 is not set
|
|
|
|
# CONFIG_MMC_USHC is not set
|
|
|
|
# CONFIG_MMC_ENABLE_CLK_SCALE is not set
|
|
|
|
# CONFIG_MEMSTICK is not set
|
|
|
|
CONFIG_NEW_LEDS=y
|
|
|
|
CONFIG_LEDS_CLASS=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# LED drivers
|
|
|
|
#
|
|
|
|
# CONFIG_LEDS_LM3530 is not set
|
|
|
|
# CONFIG_LEDS_LM3642 is not set
|
|
|
|
# CONFIG_LEDS_PCA9532 is not set
|
|
|
|
# CONFIG_LEDS_GPIO is not set
|
|
|
|
# CONFIG_LEDS_LP3944 is not set
|
|
|
|
# CONFIG_LEDS_LP5521 is not set
|
|
|
|
# CONFIG_LEDS_LP5523 is not set
|
|
|
|
# CONFIG_LEDS_LP5562 is not set
|
|
|
|
# CONFIG_LEDS_LP855X is not set
|
|
|
|
# CONFIG_LEDS_PCA955X is not set
|
|
|
|
# CONFIG_LEDS_PCA9633 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_LEDS_QPNP=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_LEDS_QPNP_FLASH is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_LEDS_QPNP_WLED=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_LEDS_MSM_GPIO_FLASH is not set
|
|
|
|
# CONFIG_LEDS_DAC124S085 is not set
|
|
|
|
# CONFIG_LEDS_PWM is not set
|
|
|
|
# CONFIG_LEDS_REGULATOR is not set
|
|
|
|
# CONFIG_LEDS_BD2802 is not set
|
|
|
|
# CONFIG_LEDS_LT3593 is not set
|
|
|
|
# CONFIG_LEDS_RENESAS_TPU is not set
|
|
|
|
# CONFIG_LEDS_TCA6507 is not set
|
|
|
|
# CONFIG_LEDS_LM355x is not set
|
|
|
|
# CONFIG_LEDS_OT200 is not set
|
|
|
|
# CONFIG_LEDS_BLINKM is not set
|
|
|
|
# CONFIG_LEDS_AW2013 is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# LED Triggers
|
|
|
|
#
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_LEDS_TRIGGERS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_LEDS_TRIGGER_TIMER is not set
|
|
|
|
# CONFIG_LEDS_TRIGGER_ONESHOT is not set
|
|
|
|
# CONFIG_LEDS_TRIGGER_HEARTBEAT is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_LEDS_TRIGGER_BACKLIGHT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_LEDS_TRIGGER_CPU is not set
|
|
|
|
# CONFIG_LEDS_TRIGGER_GPIO is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_LEDS_TRIGGER_DEFAULT_ON=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# iptables trigger is under Netfilter config (LED target)
|
|
|
|
#
|
|
|
|
# CONFIG_LEDS_TRIGGER_TRANSIENT is not set
|
|
|
|
# CONFIG_LEDS_TRIGGER_CAMERA is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SWITCH=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SWITCH_GPIO is not set
|
|
|
|
# CONFIG_ACCESSIBILITY is not set
|
|
|
|
# CONFIG_INFINIBAND is not set
|
|
|
|
CONFIG_EDAC_SUPPORT=y
|
|
|
|
# CONFIG_EDAC is not set
|
|
|
|
CONFIG_RTC_LIB=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_RTC_CLASS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_RTC_HCTOSYS=y
|
|
|
|
CONFIG_RTC_SYSTOHC=y
|
|
|
|
CONFIG_RTC_HCTOSYS_DEVICE="rtc0"
|
|
|
|
# CONFIG_RTC_DEBUG is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# RTC interfaces
|
|
|
|
#
|
|
|
|
CONFIG_RTC_INTF_SYSFS=y
|
|
|
|
CONFIG_RTC_INTF_PROC=y
|
|
|
|
CONFIG_RTC_INTF_DEV=y
|
|
|
|
# CONFIG_RTC_INTF_DEV_UIE_EMUL is not set
|
|
|
|
# CONFIG_RTC_DRV_TEST is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# I2C RTC drivers
|
|
|
|
#
|
|
|
|
# CONFIG_RTC_DRV_DS1307 is not set
|
|
|
|
# CONFIG_RTC_DRV_DS1374 is not set
|
|
|
|
# CONFIG_RTC_DRV_DS1672 is not set
|
|
|
|
# CONFIG_RTC_DRV_DS3232 is not set
|
|
|
|
# CONFIG_RTC_DRV_MAX6900 is not set
|
|
|
|
# CONFIG_RTC_DRV_RS5C372 is not set
|
|
|
|
# CONFIG_RTC_DRV_ISL1208 is not set
|
|
|
|
# CONFIG_RTC_DRV_ISL12022 is not set
|
|
|
|
# CONFIG_RTC_DRV_X1205 is not set
|
|
|
|
# CONFIG_RTC_DRV_PCF8523 is not set
|
|
|
|
# CONFIG_RTC_DRV_PCF8563 is not set
|
|
|
|
# CONFIG_RTC_DRV_PCF8583 is not set
|
|
|
|
# CONFIG_RTC_DRV_M41T80 is not set
|
|
|
|
# CONFIG_RTC_DRV_BQ32K is not set
|
|
|
|
# CONFIG_RTC_DRV_S35390A is not set
|
|
|
|
# CONFIG_RTC_DRV_FM3130 is not set
|
|
|
|
# CONFIG_RTC_DRV_RX8581 is not set
|
|
|
|
# CONFIG_RTC_DRV_RX8025 is not set
|
|
|
|
# CONFIG_RTC_DRV_EM3027 is not set
|
|
|
|
# CONFIG_RTC_DRV_RV3029C2 is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# SPI RTC drivers
|
|
|
|
#
|
|
|
|
# CONFIG_RTC_DRV_M41T93 is not set
|
|
|
|
# CONFIG_RTC_DRV_M41T94 is not set
|
|
|
|
# CONFIG_RTC_DRV_DS1305 is not set
|
|
|
|
# CONFIG_RTC_DRV_DS1390 is not set
|
|
|
|
# CONFIG_RTC_DRV_MAX6902 is not set
|
|
|
|
# CONFIG_RTC_DRV_R9701 is not set
|
|
|
|
# CONFIG_RTC_DRV_RS5C348 is not set
|
|
|
|
# CONFIG_RTC_DRV_DS3234 is not set
|
|
|
|
# CONFIG_RTC_DRV_PCF2123 is not set
|
|
|
|
# CONFIG_RTC_DRV_RX4581 is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Platform RTC drivers
|
|
|
|
#
|
|
|
|
# CONFIG_RTC_DRV_DS1286 is not set
|
|
|
|
# CONFIG_RTC_DRV_DS1511 is not set
|
|
|
|
# CONFIG_RTC_DRV_DS1553 is not set
|
|
|
|
# CONFIG_RTC_DRV_DS1742 is not set
|
|
|
|
# CONFIG_RTC_DRV_STK17TA8 is not set
|
|
|
|
# CONFIG_RTC_DRV_M48T86 is not set
|
|
|
|
# CONFIG_RTC_DRV_M48T35 is not set
|
|
|
|
# CONFIG_RTC_DRV_M48T59 is not set
|
|
|
|
# CONFIG_RTC_DRV_MSM6242 is not set
|
|
|
|
# CONFIG_RTC_DRV_BQ4802 is not set
|
|
|
|
# CONFIG_RTC_DRV_RP5C01 is not set
|
|
|
|
# CONFIG_RTC_DRV_V3020 is not set
|
|
|
|
# CONFIG_RTC_DRV_DS2404 is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# on-CPU RTC drivers
|
|
|
|
#
|
|
|
|
# CONFIG_RTC_DRV_PL030 is not set
|
|
|
|
# CONFIG_RTC_DRV_PL031 is not set
|
|
|
|
# CONFIG_RTC_DRV_SNVS is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_RTC_DRV_QPNP=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# HID Sensor RTC drivers
|
|
|
|
#
|
|
|
|
# CONFIG_RTC_DRV_HID_SENSOR_TIME is not set
|
|
|
|
# CONFIG_ESOC is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_DMADEVICES=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_DMADEVICES_DEBUG is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# DMA Devices
|
|
|
|
#
|
|
|
|
# CONFIG_AMBA_PL08X is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_QCOM_SPS_DMA=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_TIMB_DMA is not set
|
|
|
|
# CONFIG_PL330_DMA is not set
|
|
|
|
CONFIG_DMA_ENGINE=y
|
|
|
|
CONFIG_DMA_OF=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# DMA Clients
|
|
|
|
#
|
|
|
|
# CONFIG_ASYNC_TX_DMA is not set
|
|
|
|
# CONFIG_DMATEST is not set
|
|
|
|
# CONFIG_AUXDISPLAY is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_UIO=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_UIO_CIF is not set
|
|
|
|
# CONFIG_UIO_PDRV is not set
|
|
|
|
# CONFIG_UIO_PDRV_GENIRQ is not set
|
|
|
|
# CONFIG_UIO_DMEM_GENIRQ is not set
|
|
|
|
# CONFIG_UIO_AEC is not set
|
|
|
|
# CONFIG_UIO_SERCOS3 is not set
|
|
|
|
# CONFIG_UIO_PCI_GENERIC is not set
|
|
|
|
# CONFIG_UIO_NETX is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_UIO_MSM_SHAREDMEM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_VFIO is not set
|
|
|
|
# CONFIG_VIRT_DRIVERS is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Virtio drivers
|
|
|
|
#
|
|
|
|
# CONFIG_VIRTIO_PCI is not set
|
|
|
|
# CONFIG_VIRTIO_MMIO is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Microsoft Hyper-V guest support
|
|
|
|
#
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_STAGING=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_ET131X is not set
|
|
|
|
# CONFIG_USBIP_CORE is not set
|
|
|
|
# CONFIG_PRISM2_USB is not set
|
|
|
|
# CONFIG_ECHO is not set
|
|
|
|
# CONFIG_ASUS_OLED is not set
|
|
|
|
# CONFIG_R8712U is not set
|
|
|
|
# CONFIG_RTS5139 is not set
|
|
|
|
# CONFIG_TRANZPORT is not set
|
|
|
|
# CONFIG_LINE6_USB is not set
|
|
|
|
# CONFIG_USB_SERIAL_QUATECH2 is not set
|
|
|
|
# CONFIG_DX_SEP is not set
|
|
|
|
# CONFIG_FB_SM7XX is not set
|
|
|
|
# CONFIG_CRYSTALHD is not set
|
|
|
|
# CONFIG_FB_XGI is not set
|
|
|
|
# CONFIG_BCM_WIMAX is not set
|
|
|
|
# CONFIG_FT1000 is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Speakup console speech
|
|
|
|
#
|
|
|
|
# CONFIG_SPEAKUP is not set
|
|
|
|
# CONFIG_TOUCHSCREEN_CLEARPAD_TM1217 is not set
|
|
|
|
# CONFIG_STAGING_MEDIA is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Android
|
|
|
|
#
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_ANDROID=y
|
|
|
|
CONFIG_ASHMEM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_ANDROID_TIMED_OUTPUT=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_ANDROID_TIMED_GPIO=y
|
|
|
|
CONFIG_ANDROID_LOW_MEMORY_KILLER=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_ANDROID_LOW_MEMORY_KILLER_AUTODETECT_OOM_ADJ_VALUES=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_ANDROID_LOW_MEMORY_KILLER_CONSIDER_SWAP=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_SYNC=y
|
|
|
|
CONFIG_SW_SYNC=y
|
|
|
|
# CONFIG_SW_SYNC_USER is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_ONESHOT_SYNC=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_ONESHOT_SYNC_USER is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_ION=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_ION_TEST is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_ION_MSM=y
|
|
|
|
CONFIG_ALLOC_BUFFERS_IN_4K_CHUNKS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_FIQ_DEBUGGER is not set
|
|
|
|
# CONFIG_FIQ_WATCHDOG is not set
|
|
|
|
# CONFIG_USB_WPAN_HCD is not set
|
|
|
|
# CONFIG_WIMAX_GDM72XX is not set
|
|
|
|
CONFIG_NET_VENDOR_SILICOM=y
|
|
|
|
# CONFIG_CED1401 is not set
|
|
|
|
# CONFIG_DGRP is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Qualcomm MSM specific device drivers
|
|
|
|
#
|
|
|
|
# CONFIG_MSM_SSBI is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SPS=y
|
|
|
|
CONFIG_USB_BAM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SPS_SUPPORT_BAMDMA is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SPS_SUPPORT_NDP_BAM=y
|
|
|
|
CONFIG_QPNP_POWER_ON=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_QPNP_CLKDIV is not set
|
|
|
|
# CONFIG_QPNP_VIBRATOR is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_QPNP_REVID=y
|
|
|
|
CONFIG_QPNP_COINCELL=y
|
|
|
|
CONFIG_QPNP_USB_DETECT=y
|
|
|
|
CONFIG_IPA=y
|
|
|
|
CONFIG_RMNET_IPA=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_KLM is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_AVTIMER=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SSM is not set
|
|
|
|
# CONFIG_MSM_MHI is not set
|
|
|
|
# CONFIG_QCA1530 is not set
|
|
|
|
# CONFIG_PFT is not set
|
|
|
|
# CONFIG_MSM_SPSS is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_BUS_SCALING=y
|
|
|
|
CONFIG_BUS_TOPOLOGY_ADHOC=y
|
|
|
|
CONFIG_DEBUG_BUS_VOTER=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_I2C_MSM_PROF_DBG is not set
|
|
|
|
# CONFIG_MSM_UIM_HSL is not set
|
|
|
|
# CONFIG_QPNP_HAPTIC is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SEEMP_CORE=y
|
|
|
|
CONFIG_PON_SOMC_ORG=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_CLKDEV_LOOKUP=y
|
|
|
|
CONFIG_HAVE_CLK_PREPARE=y
|
|
|
|
# CONFIG_MSM_CLK_CONTROLLER_V2 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_CLK_SDCC2_CLK_SRC_40MHZ=y
|
|
|
|
CONFIG_MSM_MDSS_PLL=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_HWSPINLOCK=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# Hardware Spinlock drivers
|
|
|
|
#
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_REMOTE_SPINLOCK_MSM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_CLKSRC_OF=y
|
|
|
|
CONFIG_ARM_ARCH_TIMER=y
|
|
|
|
CONFIG_ARM_ARCH_TIMER_EVTSTREAM=y
|
|
|
|
# CONFIG_MAILBOX is not set
|
|
|
|
CONFIG_IOMMU_API=y
|
|
|
|
CONFIG_IOMMU_SUPPORT=y
|
|
|
|
CONFIG_OF_IOMMU=y
|
|
|
|
CONFIG_MSM_IOMMU=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_IOMMU_V1=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_IOMMU_LPAE is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_IOMMU_VBIF_CHECK=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_IOMMU_NON_SECURE is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_IOMMU_FORCE_4K_MAPPINGS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MSM_IOMMU_TLBINVAL_ON_MAP is not set
|
|
|
|
# CONFIG_MMU500_ACTIVE_PREFETCH_BUG_WITH_SECTION_MAPPING is not set
|
|
|
|
# CONFIG_ARM_SMMU is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Remoteproc drivers
|
|
|
|
#
|
|
|
|
# CONFIG_STE_MODEM_RPROC is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Rpmsg drivers
|
|
|
|
#
|
|
|
|
CONFIG_PM_DEVFREQ=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# DEVFREQ Governors
|
|
|
|
#
|
|
|
|
CONFIG_DEVFREQ_GOV_SIMPLE_ONDEMAND=y
|
|
|
|
CONFIG_DEVFREQ_GOV_PERFORMANCE=y
|
|
|
|
CONFIG_DEVFREQ_GOV_POWERSAVE=y
|
|
|
|
CONFIG_DEVFREQ_GOV_USERSPACE=y
|
|
|
|
CONFIG_DEVFREQ_GOV_CPUFREQ=y
|
|
|
|
CONFIG_DEVFREQ_GOV_MSM_ADRENO_TZ=y
|
|
|
|
CONFIG_MSM_BIMC_BWMON=y
|
|
|
|
CONFIG_DEVFREQ_GOV_MSM_GPUBW_MON=y
|
|
|
|
CONFIG_DEVFREQ_GOV_MSM_BW_HWMON=y
|
|
|
|
# CONFIG_DEVFREQ_GOV_MSM_CACHE_HWMON is not set
|
|
|
|
CONFIG_DEVFREQ_GOV_SPDM_HYP=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# DEVFREQ Drivers
|
|
|
|
#
|
|
|
|
CONFIG_DEVFREQ_SIMPLE_DEV=y
|
|
|
|
CONFIG_MSM_DEVFREQ_DEVBW=y
|
|
|
|
# CONFIG_SPDM_SCM is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_DEVFREQ_SPDM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_EXTCON is not set
|
|
|
|
# CONFIG_MEMORY is not set
|
|
|
|
# CONFIG_IIO is not set
|
|
|
|
# CONFIG_VME_BUS is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_PWM=y
|
|
|
|
CONFIG_PWM_QPNP=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_IRQCHIP=y
|
|
|
|
CONFIG_ARM_GIC=y
|
|
|
|
CONFIG_MSM_SHOW_RESUME_IRQ=y
|
|
|
|
CONFIG_MSM_IRQ=y
|
|
|
|
# CONFIG_IPACK_BUS is not set
|
|
|
|
# CONFIG_RESET_CONTROLLER is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Android
|
|
|
|
#
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_ANDROID_BINDER_IPC=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_CORESIGHT is not set
|
|
|
|
# CONFIG_BIF is not set
|
|
|
|
# CONFIG_SENSORS is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SENSORS_SSC=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# PHY Subsystem
|
|
|
|
#
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_GENERIC_PHY=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_PHY_MSM_SATA is not set
|
|
|
|
# CONFIG_CP_ACCESS64 is not set
|
|
|
|
# CONFIG_MSM_BAM_DMUX is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_EVENT_TIMER=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MSM_GLINK is not set
|
|
|
|
# CONFIG_MSM_GLINK_LOOPBACK_SERVER is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_IPC_ROUTER_SMD_XPRT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MSM_JTAG is not set
|
|
|
|
# CONFIG_MSM_JTAG_MM is not set
|
|
|
|
# CONFIG_MSM_JTAGV8 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_QMI_INTERFACE=y
|
|
|
|
CONFIG_MSM_SMD=y
|
|
|
|
CONFIG_MSM_SMD_DEBUG=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_MSM_MPM_OF=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_RPM_SMD=y
|
|
|
|
CONFIG_MSM_RPM_RBCPR_STATS_V2_LOG=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MSM_RPM_LOG is not set
|
|
|
|
# CONFIG_MSM_RPM_STATS_LOG is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_RUN_QUEUE_STATS=y
|
|
|
|
CONFIG_MSM_SMEM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MSM_SMEM_LOGGING is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_SMP2P=y
|
|
|
|
CONFIG_MSM_SMP2P_TEST=y
|
|
|
|
CONFIG_MSM_SPM=y
|
|
|
|
CONFIG_MSM_L2_SPM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_MSM_QDSP6_APRV2=y
|
|
|
|
# CONFIG_MSM_QDSP6_APRV3 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_ADSP_LOADER=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MSM_MEMORY_DUMP is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_MEMORY_DUMP_V2=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MSM_DEBUG_LAR_UNLOCK is not set
|
|
|
|
# CONFIG_MSM_DDR_HEALTH is not set
|
|
|
|
# CONFIG_MSM_COMMON_LOG is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_WATCHDOG_V2=y
|
|
|
|
CONFIG_MSM_FORCE_PANIC_ON_WDOG_BARK=y
|
|
|
|
CONFIG_MSM_FORCE_WDOG_BITE_ON_PANIC=y
|
|
|
|
CONFIG_MSM_HVC=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MSM_HYP_DEBUG is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_SUBSYSTEM_RESTART=y
|
|
|
|
CONFIG_MSM_SYSMON_COMM=y
|
|
|
|
CONFIG_MSM_PIL=y
|
|
|
|
CONFIG_MSM_PIL_SSR_GENERIC=y
|
|
|
|
CONFIG_MSM_PIL_MSS_QDSP6V5=y
|
|
|
|
CONFIG_MSM_OCMEM=y
|
|
|
|
CONFIG_MSM_OCMEM_LOCAL_POWER_CTRL=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MSM_OCMEM_DEBUG is not set
|
|
|
|
# CONFIG_MSM_OCMEM_POWER_DISABLE is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_BOOT_STATS=y
|
|
|
|
CONFIG_MSM_SCM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MAXIMUM_CURRENT_THROTTLING is not set
|
|
|
|
CONFIG_MSM_CPU_PWR_CTL=y
|
|
|
|
# CONFIG_MSM_XPU_ERR_FATAL is not set
|
|
|
|
# CONFIG_MSM_CACHE_DUMP is not set
|
|
|
|
# CONFIG_MSM_CPUSS_DUMP is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_SHARED_HEAP_ACCESS=y
|
|
|
|
CONFIG_MSM_SYSTEM_HEALTH_MONITOR=y
|
|
|
|
CONFIG_QCOM_EARLY_RANDOM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MSM_PACMAN is not set
|
|
|
|
CONFIG_MSM_CORE_CTL_HELPER=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_CORE_CTL=y
|
|
|
|
CONFIG_MSM_PERFORMANCE=y
|
|
|
|
CONFIG_QCOM_NPA_DUMP=y
|
|
|
|
CONFIG_KERNEL_TEXT_MPU_PROT=y
|
|
|
|
CONFIG_AMSS_ERR_LOG=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_MEM_SHARE_QMI_SERVICE is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Firmware Drivers
|
|
|
|
#
|
|
|
|
# CONFIG_FIRMWARE_MEMMAP is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_TZ_LOG=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# Firmware Drivers
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# File systems
|
|
|
|
#
|
|
|
|
CONFIG_DCACHE_WORD_ACCESS=y
|
|
|
|
# CONFIG_EXT2_FS is not set
|
|
|
|
# CONFIG_EXT3_FS is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_EXT4_FS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_EXT4_USE_FOR_EXT23=y
|
|
|
|
# CONFIG_EXT4_FS_POSIX_ACL is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_EXT4_FS_SECURITY=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_EXT4_DEBUG is not set
|
|
|
|
CONFIG_JBD2=y
|
|
|
|
# CONFIG_JBD2_DEBUG is not set
|
|
|
|
CONFIG_FS_MBCACHE=y
|
|
|
|
# CONFIG_REISERFS_FS is not set
|
|
|
|
# CONFIG_JFS_FS is not set
|
|
|
|
# CONFIG_XFS_FS is not set
|
|
|
|
# CONFIG_GFS2_FS is not set
|
|
|
|
# CONFIG_OCFS2_FS is not set
|
|
|
|
# CONFIG_BTRFS_FS is not set
|
|
|
|
# CONFIG_NILFS2_FS is not set
|
|
|
|
CONFIG_FS_POSIX_ACL=y
|
|
|
|
CONFIG_FILE_LOCKING=y
|
|
|
|
CONFIG_FSNOTIFY=y
|
|
|
|
CONFIG_DNOTIFY=y
|
|
|
|
CONFIG_INOTIFY_USER=y
|
|
|
|
# CONFIG_FANOTIFY is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_QUOTA=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_QUOTA_NETLINK_INTERFACE is not set
|
|
|
|
CONFIG_PRINT_QUOTA_WARNING=y
|
|
|
|
# CONFIG_QUOTA_DEBUG is not set
|
|
|
|
# CONFIG_QFMT_V1 is not set
|
|
|
|
# CONFIG_QFMT_V2 is not set
|
|
|
|
CONFIG_QUOTACTL=y
|
|
|
|
# CONFIG_AUTOFS4_FS is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_FUSE_FS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_CUSE is not set
|
|
|
|
CONFIG_GENERIC_ACL=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# Caches
|
|
|
|
#
|
|
|
|
# CONFIG_FSCACHE is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# CD-ROM/DVD Filesystems
|
|
|
|
#
|
|
|
|
# CONFIG_ISO9660_FS is not set
|
|
|
|
# CONFIG_UDF_FS is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# DOS/FAT/NT Filesystems
|
|
|
|
#
|
|
|
|
CONFIG_FAT_FS=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSDOS_FS=y
|
|
|
|
CONFIG_VFAT_FS=y
|
|
|
|
CONFIG_VFAT_FS_NO_DUALNAMES=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_FAT_DEFAULT_CODEPAGE=437
|
|
|
|
CONFIG_FAT_DEFAULT_IOCHARSET="iso8859-1"
|
|
|
|
# CONFIG_NTFS_FS is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Pseudo filesystems
|
|
|
|
#
|
|
|
|
CONFIG_PROC_FS=y
|
|
|
|
# CONFIG_PROC_KCORE is not set
|
|
|
|
CONFIG_PROC_SYSCTL=y
|
|
|
|
CONFIG_PROC_PAGE_MONITOR=y
|
|
|
|
CONFIG_SYSFS=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_TMPFS=y
|
|
|
|
CONFIG_TMPFS_POSIX_ACL=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_TMPFS_XATTR=y
|
|
|
|
# CONFIG_HUGETLBFS is not set
|
|
|
|
# CONFIG_HUGETLB_PAGE is not set
|
|
|
|
CONFIG_CONFIGFS_FS=y
|
|
|
|
CONFIG_MISC_FILESYSTEMS=y
|
|
|
|
# CONFIG_ADFS_FS is not set
|
|
|
|
# CONFIG_AFFS_FS is not set
|
|
|
|
# CONFIG_ECRYPT_FS is not set
|
|
|
|
# CONFIG_HFS_FS is not set
|
|
|
|
# CONFIG_HFSPLUS_FS is not set
|
|
|
|
# CONFIG_BEFS_FS is not set
|
|
|
|
# CONFIG_BFS_FS is not set
|
|
|
|
# CONFIG_EFS_FS is not set
|
|
|
|
# CONFIG_LOGFS is not set
|
|
|
|
# CONFIG_CRAMFS is not set
|
|
|
|
# CONFIG_SQUASHFS is not set
|
|
|
|
# CONFIG_VXFS_FS is not set
|
|
|
|
# CONFIG_MINIX_FS is not set
|
|
|
|
# CONFIG_OMFS_FS is not set
|
|
|
|
# CONFIG_HPFS_FS is not set
|
|
|
|
# CONFIG_QNX4FS_FS is not set
|
|
|
|
# CONFIG_QNX6FS_FS is not set
|
|
|
|
# CONFIG_ROMFS_FS is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_PSTORE=y
|
|
|
|
CONFIG_PSTORE_CONSOLE=y
|
|
|
|
CONFIG_PSTORE_PMSG=y
|
|
|
|
CONFIG_PSTORE_RAM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SYSV_FS is not set
|
|
|
|
# CONFIG_UFS_FS is not set
|
|
|
|
# CONFIG_F2FS_FS is not set
|
|
|
|
CONFIG_NETWORK_FILESYSTEMS=y
|
|
|
|
CONFIG_NFS_FS=y
|
|
|
|
CONFIG_NFS_V2=y
|
|
|
|
CONFIG_NFS_V3=y
|
|
|
|
CONFIG_NFS_V3_ACL=y
|
|
|
|
CONFIG_NFS_V4=y
|
|
|
|
CONFIG_NFS_SWAP=y
|
|
|
|
CONFIG_NFS_V4_1=y
|
|
|
|
CONFIG_PNFS_FILE_LAYOUT=y
|
|
|
|
CONFIG_PNFS_BLOCK=y
|
|
|
|
CONFIG_NFS_V4_1_IMPLEMENTATION_ID_DOMAIN="kernel.org"
|
|
|
|
# CONFIG_ROOT_NFS is not set
|
|
|
|
# CONFIG_NFS_USE_LEGACY_DNS is not set
|
|
|
|
CONFIG_NFS_USE_KERNEL_DNS=y
|
|
|
|
# CONFIG_NFSD is not set
|
|
|
|
CONFIG_LOCKD=y
|
|
|
|
CONFIG_LOCKD_V4=y
|
|
|
|
CONFIG_NFS_ACL_SUPPORT=y
|
|
|
|
CONFIG_NFS_COMMON=y
|
|
|
|
CONFIG_SUNRPC=y
|
|
|
|
CONFIG_SUNRPC_GSS=y
|
|
|
|
CONFIG_SUNRPC_BACKCHANNEL=y
|
|
|
|
CONFIG_SUNRPC_SWAP=y
|
|
|
|
# CONFIG_SUNRPC_DEBUG is not set
|
|
|
|
# CONFIG_CEPH_FS is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_CIFS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_CIFS_STATS is not set
|
|
|
|
# CONFIG_CIFS_WEAK_PW_HASH is not set
|
|
|
|
# CONFIG_CIFS_UPCALL is not set
|
|
|
|
# CONFIG_CIFS_XATTR is not set
|
|
|
|
CONFIG_CIFS_DEBUG=y
|
|
|
|
# CONFIG_CIFS_DEBUG2 is not set
|
|
|
|
# CONFIG_CIFS_DFS_UPCALL is not set
|
|
|
|
# CONFIG_CIFS_SMB2 is not set
|
|
|
|
# CONFIG_NCP_FS is not set
|
|
|
|
# CONFIG_CODA_FS is not set
|
|
|
|
# CONFIG_AFS_FS is not set
|
|
|
|
CONFIG_NLS=y
|
|
|
|
CONFIG_NLS_DEFAULT="iso8859-1"
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NLS_CODEPAGE_437=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NLS_CODEPAGE_737 is not set
|
|
|
|
# CONFIG_NLS_CODEPAGE_775 is not set
|
|
|
|
# CONFIG_NLS_CODEPAGE_850 is not set
|
|
|
|
# CONFIG_NLS_CODEPAGE_852 is not set
|
|
|
|
# CONFIG_NLS_CODEPAGE_855 is not set
|
|
|
|
# CONFIG_NLS_CODEPAGE_857 is not set
|
|
|
|
# CONFIG_NLS_CODEPAGE_860 is not set
|
|
|
|
# CONFIG_NLS_CODEPAGE_861 is not set
|
|
|
|
# CONFIG_NLS_CODEPAGE_862 is not set
|
|
|
|
# CONFIG_NLS_CODEPAGE_863 is not set
|
|
|
|
# CONFIG_NLS_CODEPAGE_864 is not set
|
|
|
|
# CONFIG_NLS_CODEPAGE_865 is not set
|
|
|
|
# CONFIG_NLS_CODEPAGE_866 is not set
|
|
|
|
# CONFIG_NLS_CODEPAGE_869 is not set
|
|
|
|
# CONFIG_NLS_CODEPAGE_936 is not set
|
|
|
|
# CONFIG_NLS_CODEPAGE_950 is not set
|
|
|
|
# CONFIG_NLS_CODEPAGE_932 is not set
|
|
|
|
# CONFIG_NLS_CODEPAGE_949 is not set
|
|
|
|
# CONFIG_NLS_CODEPAGE_874 is not set
|
|
|
|
# CONFIG_NLS_ISO8859_8 is not set
|
|
|
|
# CONFIG_NLS_CODEPAGE_1250 is not set
|
|
|
|
# CONFIG_NLS_CODEPAGE_1251 is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NLS_ASCII=y
|
|
|
|
CONFIG_NLS_ISO8859_1=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_NLS_ISO8859_2 is not set
|
|
|
|
# CONFIG_NLS_ISO8859_3 is not set
|
|
|
|
# CONFIG_NLS_ISO8859_4 is not set
|
|
|
|
# CONFIG_NLS_ISO8859_5 is not set
|
|
|
|
# CONFIG_NLS_ISO8859_6 is not set
|
|
|
|
# CONFIG_NLS_ISO8859_7 is not set
|
|
|
|
# CONFIG_NLS_ISO8859_9 is not set
|
|
|
|
# CONFIG_NLS_ISO8859_13 is not set
|
|
|
|
# CONFIG_NLS_ISO8859_14 is not set
|
|
|
|
# CONFIG_NLS_ISO8859_15 is not set
|
|
|
|
# CONFIG_NLS_KOI8_R is not set
|
|
|
|
# CONFIG_NLS_KOI8_U is not set
|
|
|
|
# CONFIG_NLS_MAC_ROMAN is not set
|
|
|
|
# CONFIG_NLS_MAC_CELTIC is not set
|
|
|
|
# CONFIG_NLS_MAC_CENTEURO is not set
|
|
|
|
# CONFIG_NLS_MAC_CROATIAN is not set
|
|
|
|
# CONFIG_NLS_MAC_CYRILLIC is not set
|
|
|
|
# CONFIG_NLS_MAC_GAELIC is not set
|
|
|
|
# CONFIG_NLS_MAC_GREEK is not set
|
|
|
|
# CONFIG_NLS_MAC_ICELAND is not set
|
|
|
|
# CONFIG_NLS_MAC_INUIT is not set
|
|
|
|
# CONFIG_NLS_MAC_ROMANIAN is not set
|
|
|
|
# CONFIG_NLS_MAC_TURKISH is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_NLS_UTF8=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_DLM is not set
|
|
|
|
# CONFIG_VIRTUALIZATION is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Kernel hacking
|
|
|
|
#
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_PRINTK_TIME=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_DEFAULT_MESSAGE_LOGLEVEL=4
|
|
|
|
CONFIG_ENABLE_WARN_DEPRECATED=y
|
|
|
|
CONFIG_ENABLE_MUST_CHECK=y
|
|
|
|
CONFIG_FRAME_WARN=2048
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MAGIC_SYSRQ=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_STRIP_ASM_SYMS is not set
|
|
|
|
# CONFIG_READABLE_ASM is not set
|
|
|
|
# CONFIG_UNUSED_SYMBOLS is not set
|
|
|
|
# CONFIG_PAGE_OWNER is not set
|
|
|
|
CONFIG_DEBUG_FS=y
|
|
|
|
# CONFIG_HEADERS_CHECK is not set
|
|
|
|
# CONFIG_DEBUG_SECTION_MISMATCH is not set
|
|
|
|
CONFIG_DEBUG_KERNEL=y
|
|
|
|
# CONFIG_DEBUG_SHIRQ is not set
|
|
|
|
# CONFIG_LOCKUP_DETECTOR is not set
|
|
|
|
# CONFIG_PANIC_ON_OOPS is not set
|
|
|
|
CONFIG_PANIC_ON_OOPS_VALUE=0
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_PANIC_ON_RECURSIVE_FAULT=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_DETECT_HUNG_TASK is not set
|
|
|
|
CONFIG_SCHED_DEBUG=y
|
2020-05-31 10:32:05 +00:00
|
|
|
# CONFIG_SYSRQ_SCHED_DEBUG is not set
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_PANIC_ON_RT_THROTTLING is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SCHEDSTATS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_DEBUG_OBJECTS is not set
|
|
|
|
# CONFIG_SLUB_STATS is not set
|
|
|
|
CONFIG_HAVE_DEBUG_KMEMLEAK=y
|
|
|
|
# CONFIG_DEBUG_KMEMLEAK is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
# CONFIG_DEBUG_PREEMPT is not set
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_DEBUG_RT_MUTEXES is not set
|
|
|
|
# CONFIG_RT_MUTEX_TESTER is not set
|
|
|
|
# CONFIG_DEBUG_SPINLOCK is not set
|
|
|
|
# CONFIG_DEBUG_MUTEXES is not set
|
|
|
|
# CONFIG_DEBUG_LOCK_ALLOC is not set
|
|
|
|
# CONFIG_PROVE_LOCKING is not set
|
|
|
|
# CONFIG_LOCK_STAT is not set
|
|
|
|
# CONFIG_DEBUG_ATOMIC_SLEEP is not set
|
|
|
|
# CONFIG_DEBUG_LOCKING_API_SELFTESTS is not set
|
|
|
|
CONFIG_STACKTRACE=y
|
|
|
|
# CONFIG_DEBUG_STACK_USAGE is not set
|
|
|
|
# CONFIG_DEBUG_KOBJECT is not set
|
|
|
|
CONFIG_HAVE_DEBUG_BUGVERBOSE=y
|
|
|
|
CONFIG_DEBUG_BUGVERBOSE=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_DEBUG_INFO=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_DEBUG_INFO_REDUCED is not set
|
|
|
|
# CONFIG_DEBUG_VM is not set
|
|
|
|
# CONFIG_DEBUG_WRITECOUNT is not set
|
|
|
|
# CONFIG_DEBUG_MEMORY_INIT is not set
|
|
|
|
# CONFIG_DEBUG_LIST is not set
|
|
|
|
# CONFIG_TEST_LIST_SORT is not set
|
|
|
|
# CONFIG_DEBUG_SG is not set
|
|
|
|
# CONFIG_DEBUG_NOTIFIERS is not set
|
|
|
|
# CONFIG_DEBUG_CREDENTIALS is not set
|
|
|
|
CONFIG_ARCH_WANT_FRAME_POINTERS=y
|
|
|
|
CONFIG_FRAME_POINTER=y
|
|
|
|
# CONFIG_BOOT_PRINTK_DELAY is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# RCU Debugging
|
|
|
|
#
|
|
|
|
# CONFIG_PROVE_RCU_DELAY is not set
|
|
|
|
# CONFIG_SPARSE_RCU_POINTER is not set
|
|
|
|
# CONFIG_RCU_TORTURE_TEST is not set
|
|
|
|
CONFIG_RCU_CPU_STALL_TIMEOUT=21
|
|
|
|
CONFIG_RCU_CPU_STALL_VERBOSE=y
|
|
|
|
# CONFIG_RCU_CPU_STALL_INFO is not set
|
|
|
|
# CONFIG_RCU_TRACE is not set
|
|
|
|
# CONFIG_BACKTRACE_SELF_TEST is not set
|
|
|
|
# CONFIG_DEBUG_BLOCK_EXT_DEVT is not set
|
|
|
|
# CONFIG_DEBUG_FORCE_WEAK_PER_CPU is not set
|
|
|
|
# CONFIG_DEBUG_PER_CPU_MAPS is not set
|
|
|
|
# CONFIG_LKDTM is not set
|
|
|
|
# CONFIG_NOTIFIER_ERROR_INJECTION is not set
|
|
|
|
# CONFIG_FAULT_INJECTION is not set
|
|
|
|
# CONFIG_DEBUG_PAGEALLOC is not set
|
|
|
|
CONFIG_NOP_TRACER=y
|
|
|
|
CONFIG_HAVE_FUNCTION_TRACER=y
|
|
|
|
CONFIG_HAVE_FUNCTION_GRAPH_TRACER=y
|
|
|
|
CONFIG_HAVE_DYNAMIC_FTRACE=y
|
|
|
|
CONFIG_HAVE_FTRACE_MCOUNT_RECORD=y
|
|
|
|
CONFIG_HAVE_SYSCALL_TRACEPOINTS=y
|
|
|
|
CONFIG_HAVE_C_RECORDMCOUNT=y
|
|
|
|
CONFIG_TRACE_CLOCK=y
|
|
|
|
CONFIG_RING_BUFFER=y
|
|
|
|
CONFIG_EVENT_TRACING=y
|
|
|
|
CONFIG_CONTEXT_SWITCH_TRACER=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_MSM_RTB=y
|
|
|
|
CONFIG_MSM_RTB_SEPARATE_CPUS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_IPC_LOGGING is not set
|
|
|
|
CONFIG_TRACING=y
|
|
|
|
CONFIG_GENERIC_TRACER=y
|
|
|
|
CONFIG_TRACING_SUPPORT=y
|
|
|
|
CONFIG_FTRACE=y
|
|
|
|
# CONFIG_FUNCTION_TRACER is not set
|
|
|
|
# CONFIG_IRQSOFF_TRACER is not set
|
|
|
|
# CONFIG_PREEMPT_TRACER is not set
|
|
|
|
# CONFIG_SCHED_TRACER is not set
|
|
|
|
# CONFIG_FTRACE_SYSCALLS is not set
|
|
|
|
# CONFIG_TRACER_SNAPSHOT is not set
|
|
|
|
CONFIG_BRANCH_PROFILE_NONE=y
|
|
|
|
# CONFIG_PROFILE_ANNOTATED_BRANCHES is not set
|
|
|
|
# CONFIG_PROFILE_ALL_BRANCHES is not set
|
|
|
|
# CONFIG_STACK_TRACER is not set
|
|
|
|
# CONFIG_BLK_DEV_IO_TRACE is not set
|
|
|
|
# CONFIG_PROBE_EVENTS is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_CPU_FREQ_SWITCH_PROFILER=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_FTRACE_STARTUP_TEST is not set
|
|
|
|
# CONFIG_RING_BUFFER_BENCHMARK is not set
|
|
|
|
# CONFIG_RING_BUFFER_STARTUP_TEST is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_DYNAMIC_DEBUG=y
|
|
|
|
CONFIG_OOPS_LOG_BUFFER=y
|
|
|
|
CONFIG_LOG_BUF_MAGIC=y
|
|
|
|
CONFIG_OOPS_LOG_BUF_SHIFT=14
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_DMA_API_DEBUG is not set
|
|
|
|
# CONFIG_ATOMIC64_SELFTEST is not set
|
|
|
|
# CONFIG_PANIC_ON_DATA_CORRUPTION is not set
|
|
|
|
# CONFIG_SAMPLES is not set
|
|
|
|
CONFIG_HAVE_ARCH_KGDB=y
|
|
|
|
# CONFIG_KGDB is not set
|
|
|
|
# CONFIG_TEST_STRING_HELPERS is not set
|
|
|
|
# CONFIG_TEST_KSTRTOX is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_STRICT_DEVMEM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_ARM64_PTDUMP is not set
|
|
|
|
CONFIG_EARLY_PRINTK=y
|
|
|
|
# CONFIG_PID_IN_CONTEXTIDR is not set
|
|
|
|
# CONFIG_FORCE_PAGES is not set
|
|
|
|
# CONFIG_FREE_PAGES_RDONLY is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Security options
|
|
|
|
#
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_KEYS=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_ENCRYPTED_KEYS is not set
|
|
|
|
# CONFIG_KEYS_DEBUG_PROC_KEYS is not set
|
|
|
|
# CONFIG_SECURITY_DMESG_RESTRICT is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SECURITY_PERF_EVENTS_RESTRICT=y
|
|
|
|
CONFIG_SECURITY=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SECURITYFS is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_SECURITY_NETWORK=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_SECURITY_NETWORK_XFRM is not set
|
|
|
|
# CONFIG_SECURITY_PATH is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_LSM_MMAP_MIN_ADDR=4096
|
|
|
|
CONFIG_SECURITY_SELINUX=y
|
|
|
|
CONFIG_SECURITY_SELINUX_BOOTPARAM=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_SECURITY_SELINUX_BOOTPARAM_VALUE=1
|
|
|
|
# CONFIG_SECURITY_SELINUX_DISABLE is not set
|
|
|
|
CONFIG_SECURITY_SELINUX_DEVELOP=y
|
|
|
|
CONFIG_SECURITY_SELINUX_AVC_STATS=y
|
|
|
|
CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE=1
|
|
|
|
# CONFIG_SECURITY_SELINUX_POLICYDB_VERSION_MAX is not set
|
|
|
|
# CONFIG_SECURITY_SMACK is not set
|
|
|
|
# CONFIG_SECURITY_TOMOYO is not set
|
|
|
|
# CONFIG_SECURITY_APPARMOR is not set
|
|
|
|
# CONFIG_SECURITY_YAMA is not set
|
|
|
|
# CONFIG_IMA is not set
|
|
|
|
# CONFIG_EVM is not set
|
|
|
|
CONFIG_DEFAULT_SECURITY_SELINUX=y
|
|
|
|
# CONFIG_DEFAULT_SECURITY_DAC is not set
|
|
|
|
CONFIG_DEFAULT_SECURITY="selinux"
|
|
|
|
CONFIG_CRYPTO=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# Crypto core or helper
|
|
|
|
#
|
|
|
|
CONFIG_CRYPTO_ALGAPI=y
|
|
|
|
CONFIG_CRYPTO_ALGAPI2=y
|
|
|
|
CONFIG_CRYPTO_AEAD=y
|
|
|
|
CONFIG_CRYPTO_AEAD2=y
|
|
|
|
CONFIG_CRYPTO_BLKCIPHER=y
|
|
|
|
CONFIG_CRYPTO_BLKCIPHER2=y
|
|
|
|
CONFIG_CRYPTO_HASH=y
|
|
|
|
CONFIG_CRYPTO_HASH2=y
|
|
|
|
CONFIG_CRYPTO_RNG=y
|
|
|
|
CONFIG_CRYPTO_RNG2=y
|
|
|
|
CONFIG_CRYPTO_PCOMP2=y
|
|
|
|
CONFIG_CRYPTO_MANAGER=y
|
|
|
|
CONFIG_CRYPTO_MANAGER2=y
|
|
|
|
# CONFIG_CRYPTO_USER is not set
|
|
|
|
CONFIG_CRYPTO_MANAGER_DISABLE_TESTS=y
|
|
|
|
CONFIG_CRYPTO_GF128MUL=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_CRYPTO_NULL=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_CRYPTO_PCRYPT is not set
|
|
|
|
CONFIG_CRYPTO_WORKQUEUE=y
|
|
|
|
CONFIG_CRYPTO_CRYPTD=y
|
|
|
|
CONFIG_CRYPTO_AUTHENC=y
|
|
|
|
CONFIG_CRYPTO_ABLK_HELPER=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# Authenticated Encryption with Associated Data
|
|
|
|
#
|
|
|
|
# CONFIG_CRYPTO_CCM is not set
|
|
|
|
# CONFIG_CRYPTO_GCM is not set
|
|
|
|
CONFIG_CRYPTO_SEQIV=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# Block modes
|
|
|
|
#
|
|
|
|
CONFIG_CRYPTO_CBC=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_CRYPTO_CTR=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_CRYPTO_CTS is not set
|
|
|
|
CONFIG_CRYPTO_ECB=y
|
|
|
|
# CONFIG_CRYPTO_LRW is not set
|
|
|
|
# CONFIG_CRYPTO_PCBC is not set
|
|
|
|
CONFIG_CRYPTO_XTS=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# Hash modes
|
|
|
|
#
|
|
|
|
# CONFIG_CRYPTO_CMAC is not set
|
|
|
|
CONFIG_CRYPTO_HMAC=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_CRYPTO_XCBC=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_CRYPTO_VMAC is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Digest
|
|
|
|
#
|
|
|
|
CONFIG_CRYPTO_CRC32C=y
|
|
|
|
# CONFIG_CRYPTO_CRC32 is not set
|
|
|
|
# CONFIG_CRYPTO_GHASH is not set
|
|
|
|
CONFIG_CRYPTO_MD4=y
|
|
|
|
CONFIG_CRYPTO_MD5=y
|
|
|
|
# CONFIG_CRYPTO_MICHAEL_MIC is not set
|
|
|
|
# CONFIG_CRYPTO_RMD128 is not set
|
|
|
|
# CONFIG_CRYPTO_RMD160 is not set
|
|
|
|
# CONFIG_CRYPTO_RMD256 is not set
|
|
|
|
# CONFIG_CRYPTO_RMD320 is not set
|
|
|
|
CONFIG_CRYPTO_SHA1=y
|
|
|
|
CONFIG_CRYPTO_SHA256=y
|
|
|
|
# CONFIG_CRYPTO_SHA512 is not set
|
|
|
|
# CONFIG_CRYPTO_TGR192 is not set
|
|
|
|
# CONFIG_CRYPTO_WP512 is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Ciphers
|
|
|
|
#
|
|
|
|
CONFIG_CRYPTO_AES=y
|
|
|
|
# CONFIG_CRYPTO_ANUBIS is not set
|
|
|
|
CONFIG_CRYPTO_ARC4=y
|
|
|
|
# CONFIG_CRYPTO_BLOWFISH is not set
|
|
|
|
# CONFIG_CRYPTO_CAMELLIA is not set
|
|
|
|
# CONFIG_CRYPTO_CAST5 is not set
|
|
|
|
# CONFIG_CRYPTO_CAST6 is not set
|
|
|
|
CONFIG_CRYPTO_DES=y
|
|
|
|
# CONFIG_CRYPTO_FCRYPT is not set
|
|
|
|
# CONFIG_CRYPTO_KHAZAD is not set
|
|
|
|
# CONFIG_CRYPTO_SALSA20 is not set
|
|
|
|
# CONFIG_CRYPTO_SEED is not set
|
|
|
|
# CONFIG_CRYPTO_SERPENT is not set
|
|
|
|
# CONFIG_CRYPTO_TEA is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_CRYPTO_TWOFISH=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_CRYPTO_TWOFISH_COMMON=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# Compression
|
|
|
|
#
|
|
|
|
CONFIG_CRYPTO_DEFLATE=y
|
|
|
|
# CONFIG_CRYPTO_ZLIB is not set
|
|
|
|
# CONFIG_CRYPTO_LZO is not set
|
|
|
|
|
|
|
|
#
|
|
|
|
# Random Number Generation
|
|
|
|
#
|
|
|
|
CONFIG_CRYPTO_ANSI_CPRNG=y
|
|
|
|
# CONFIG_CRYPTO_USER_API_HASH is not set
|
|
|
|
# CONFIG_CRYPTO_USER_API_SKCIPHER is not set
|
|
|
|
CONFIG_CRYPTO_HW=y
|
|
|
|
CONFIG_CRYPTO_DEV_QCE50=y
|
|
|
|
# CONFIG_FIPS_ENABLE is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_CRYPTO_DEV_QCRYPTO=y
|
|
|
|
CONFIG_CRYPTO_DEV_QCE=y
|
|
|
|
CONFIG_CRYPTO_DEV_QCEDEV=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_CRYPTO_DEV_OTA_CRYPTO is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_CRYPTO_DEV_QCOM_ICE=y
|
|
|
|
CONFIG_ASYMMETRIC_KEY_TYPE=y
|
|
|
|
CONFIG_ASYMMETRIC_PUBLIC_KEY_SUBTYPE=y
|
|
|
|
CONFIG_PUBLIC_KEY_ALGO_RSA=y
|
|
|
|
CONFIG_X509_CERTIFICATE_PARSER=y
|
|
|
|
CONFIG_ARM64_CRYPTO=y
|
|
|
|
CONFIG_CRYPTO_SHA1_ARM64_CE=y
|
|
|
|
CONFIG_CRYPTO_SHA2_ARM64_CE=y
|
|
|
|
CONFIG_CRYPTO_GHASH_ARM64_CE=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_CRYPTO_AES_ARM64_CE=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_CRYPTO_AES_ARM64_CE_CCM=y
|
|
|
|
CONFIG_CRYPTO_AES_ARM64_CE_BLK=y
|
|
|
|
CONFIG_CRYPTO_AES_ARM64_NEON_BLK=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
CONFIG_BINARY_PRINTF=y
|
|
|
|
|
|
|
|
#
|
|
|
|
# Library routines
|
|
|
|
#
|
|
|
|
CONFIG_BITREVERSE=y
|
|
|
|
CONFIG_GENERIC_STRNCPY_FROM_USER=y
|
|
|
|
CONFIG_GENERIC_STRNLEN_USER=y
|
|
|
|
CONFIG_GENERIC_PCI_IOMAP=y
|
|
|
|
CONFIG_GENERIC_IOMAP=y
|
|
|
|
CONFIG_GENERIC_IO=y
|
|
|
|
CONFIG_CRC_CCITT=y
|
|
|
|
CONFIG_CRC16=y
|
|
|
|
# CONFIG_CRC_T10DIF is not set
|
|
|
|
# CONFIG_CRC_ITU_T is not set
|
|
|
|
CONFIG_CRC32=y
|
|
|
|
# CONFIG_CRC32_SELFTEST is not set
|
|
|
|
CONFIG_CRC32_SLICEBY8=y
|
|
|
|
# CONFIG_CRC32_SLICEBY4 is not set
|
|
|
|
# CONFIG_CRC32_SARWATE is not set
|
|
|
|
# CONFIG_CRC32_BIT is not set
|
|
|
|
# CONFIG_CRC7 is not set
|
|
|
|
CONFIG_LIBCRC32C=y
|
|
|
|
# CONFIG_CRC8 is not set
|
|
|
|
CONFIG_AUDIT_GENERIC=y
|
|
|
|
CONFIG_ZLIB_INFLATE=y
|
|
|
|
CONFIG_ZLIB_DEFLATE=y
|
|
|
|
CONFIG_LZO_COMPRESS=y
|
|
|
|
CONFIG_LZO_DECOMPRESS=y
|
|
|
|
CONFIG_LZ4_COMPRESS=y
|
|
|
|
CONFIG_LZ4_DECOMPRESS=y
|
|
|
|
# CONFIG_XZ_DEC is not set
|
|
|
|
# CONFIG_XZ_DEC_BCJ is not set
|
|
|
|
CONFIG_DECOMPRESS_GZIP=y
|
|
|
|
CONFIG_DECOMPRESS_BZIP2=y
|
|
|
|
CONFIG_DECOMPRESS_LZMA=y
|
|
|
|
CONFIG_GENERIC_ALLOCATOR=y
|
|
|
|
CONFIG_REED_SOLOMON=y
|
|
|
|
CONFIG_REED_SOLOMON_ENC8=y
|
|
|
|
CONFIG_REED_SOLOMON_DEC8=y
|
|
|
|
CONFIG_TEXTSEARCH=y
|
|
|
|
CONFIG_TEXTSEARCH_KMP=y
|
|
|
|
CONFIG_TEXTSEARCH_BM=y
|
|
|
|
CONFIG_TEXTSEARCH_FSM=y
|
|
|
|
CONFIG_HAS_IOMEM=y
|
|
|
|
CONFIG_HAS_DMA=y
|
|
|
|
CONFIG_CPU_RMAP=y
|
|
|
|
CONFIG_DQL=y
|
|
|
|
CONFIG_NLATTR=y
|
|
|
|
CONFIG_ARCH_HAS_ATOMIC64_DEC_IF_POSITIVE=y
|
|
|
|
# CONFIG_AVERAGE is not set
|
|
|
|
CONFIG_CLZ_TAB=y
|
|
|
|
# CONFIG_CORDIC is not set
|
|
|
|
# CONFIG_DDR is not set
|
|
|
|
CONFIG_MPILIB=y
|
|
|
|
CONFIG_LIBFDT=y
|
|
|
|
CONFIG_OID_REGISTRY=y
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_QMI_ENCDEC=y
|
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).
I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.
It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.
[skip ci]: I have verified, that every single one of these kernels builds.
CI will likely run out of time while downloading source tarballs.
2020-07-11 13:24:19 +00:00
|
|
|
# CONFIG_QMI_ENCDEC_DEBUG is not set
|
2020-05-31 10:32:05 +00:00
|
|
|
CONFIG_STRICT_MEMORY_RWX=y
|