Revert crypto changes from android-4.19.79-95
This is a preparation change for merging android-4.19.95 into msm-4.19 branch. The following changes are reverted. They will be introduced to msm-4.19 at later stage:114c59d6d9ANDROID: f2fs: fix possible merge of unencrypted with encrypted I/O3a468438a9ANDROID: scsi: ufs-qcom: Enable BROKEN_CRYPTO quirk flag6f915cf27dANDROID: scsi: ufs-hisi: Enable BROKEN_CRYPTO quirk flag86739e75acANDROID: scsi: ufs: Add quirk bit for controllers that don't play well with inline cryptod2e05e75f6ANDROID: scsi: ufs: UFS init should not require inline crypto484f187320ANDROID: scsi: ufs: UFS crypto variant operations APIf269cf51a1ANDROID: gki_defconfig: enable inline encryptionf2ca2620ddBACKPORT: FROMLIST: ext4: add inline encryption supporte274bd387aBACKPORT: FROMLIST: f2fs: add inline encryption support0797369594BACKPORT: FROMLIST: fscrypt: add inline encryption supporta502a18f9dBACKPORT: FROMLIST: scsi: ufs: Add inline encryption support to UFSeedb625131BACKPORT: FROMLIST: scsi: ufs: UFS crypto APIe00aafeeaaBACKPORT: FROMLIST: scsi: ufs: UFS driver v2.1 spec crypto additions392ad89e96BACKPORT: FROMLIST: block: blk-crypto for Inline Encryption8fda305325ANDROID: block: Fix bio_crypt_should_process WARN_ON20efc30a3eBACKPORT: FROMLIST: block: Add encryption context to struct biob0a4fb22e5BACKPORT: FROMLIST: block: Keyslot Manager for Inline Encryption2fedb52dd7FROMLIST: f2fs: add support for IV_INO_LBLK_64 encryption policies11fd37527fFROMLIST: ext4: add support for IV_INO_LBLK_64 encryption policies94231712cfBACKPORT: FROMLIST: fscrypt: add support for IV_INO_LBLK_64 policies6806fd6ad5FROMLIST: fscrypt: zeroize fscrypt_info before freeing97c9fb779bFROMLIST: fscrypt: remove struct fscrypt_ctx659011272bBACKPORT: FROMLIST: fscrypt: invoke crypto API for ESSIV handling651f77d338ANDROID: sdcardfs: evict dentries on fscrypt key removal4932f53723ANDROID: fscrypt: add key removal notifier chain45b1509e24ext4 crypto: fix to check feature status before get policyc0751a1be4fscrypt: document the new ioctls and policy version435089d69fubifs: wire up new fscrypt ioctlsc80449defcf2fs: wire up new fscrypt ioctls8178d688b5ext4: wire up new fscrypt ioctls30d0df156bfscrypt: require that key be added when setting a v2 encryption policy080389cb51fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS ioctl8e1c887424fscrypt: allow unprivileged users to add/remove keys for v2 policies73ce50dc2dfscrypt: v2 encryption policy support6ad6af5912fscrypt: add an HKDF-SHA512 implementationdbfc6584b3fscrypt: add FS_IOC_GET_ENCRYPTION_KEY_STATUS ioctlcacc84e003fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl9846255919fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctlc677e5771bfscrypt: rename keyinfo.c to keysetup.c43d5219366fscrypt: move v1 policy key setup to keysetup_v1.cc55916aa36fscrypt: refactor key setup code in preparation for v2 policiesd4b1cd7abefscrypt: rename fscrypt_master_key to fscrypt_direct_key3246be1337fscrypt: add ->ci_inode to fscrypt_infofc987b387afscrypt: use FSCRYPT_* definitions, not FS_*678ee27619fscrypt: use FSCRYPT_ prefix for uapi constantsa48b7adcd9fs, fscrypt: move uapi definitions to new header <linux/fscrypt.h>932301a530fscrypt: use ENOPKG when crypto API support missing60f50d1347fscrypt: improve warnings for missing crypto API support830d573a4afscrypt: improve warning messages for unsupported encryption contexts9aa799b7e7fscrypt: make fscrypt_msg() take inode instead of super_block10c0af12c7fscrypt: clean up base64 encoding/decoding9842574ae4fscrypt: remove loadable module related code Change-Id: I12036285cc65adcf79ff96ccf980408c8267c957 Signed-off-by: Ivaylo Georgiev <irgeorgiev@codeaurora.org> Signed-off-by: Blagovest Kolenichev <bkolenichev@codeaurora.org>
This commit is contained in:
@@ -5999,7 +5999,6 @@ T: git git://git.kernel.org/pub/scm/linux/kernel/git/tytso/fscrypt.git
|
||||
S: Supported
|
||||
F: fs/crypto/
|
||||
F: include/linux/fscrypt*.h
|
||||
F: include/uapi/linux/fscrypt.h
|
||||
F: Documentation/filesystems/fscrypt.rst
|
||||
|
||||
FSI-ATTACHED I2C DRIVER
|
||||
|
||||
Reference in New Issue
Block a user