Commit graph

5 commits

Author SHA1 Message Date
Luca Weiss
c3fb621111
device/testing/linux-*: deduplicate timeconst patch (MR 1695)
[ci:skip-build]
[ci:ignore-count]
[ci:skip-vercheck]
2020-11-10 10:25:55 +01:00
Luca Weiss
ce501c83a2
device/*: share Linux 3.4 patch for elogind not starting (MR 1606) 2020-10-30 18:27:02 +01:00
Luca Weiss
813a78a74f
linux-sony-eagle: fix compile with gcc10 (MR 1606) 2020-10-30 18:27:02 +01:00
Oliver Smith
0cfcc52e0d
*/linux-*: enable CONFIG_CRYPTO_XTS (MR 1405)
Enable CONFIG_CRYPTO_XTS for each kernel, so we can switch to using
aes-xts-plain64 as default cipher for cryptsetup (override with
"pmbootstrap --cipher"), instead of aes-cbc-plain64 (pmbootstrap#1940).

I have executed "pmbootstrap kconfig edit" on each kernel, and manually
toggled the option. The diff is not always clean, because for some
kernels it is apparently the first time, that menuconfig was executed on
the configs like that. In a few instances, it turned out that
CONFIG_ANDROID_PARANOID_NETWORK needed to be disabled too (this is
already a requirement, but as the config was incomplete, it was not
visible that this option was enabled). Very few times, I had to enable
CONFIG_EXPERIMENTAL in order to see and enable CONFIG_CRYPTO_XTS.

It would be great if we could automate such mass kconfig edits in the
future, see pmbootstrap#1942.

[skip ci]: I have verified, that every single one of these kernels builds.
           CI will likely run out of time while downloading source tarballs.
2020-07-11 15:26:35 +02:00
Andrea Scarpino
18e5129f3e sony-eagle: new device (Sony Xperia M2) (MR 1338) 2020-07-05 20:18:51 +02:00