Friday, February 14, 2014

[Kernel][ION+PMEM][CM11] HurtSky's Kernel RebornV2 + BFS + 368Mb Bigmem 5/2/2014 ( hurtsky )

CM11 Section

ONLY USE THIS KERNEL WITH ROM BASED ON
[ROM][KK][4.4.2][KOT49H] CyanogenMod 11.0 (UNOFFICIAL)


I'm not a developer, im taking effort to put more choices of kernel for our community

Please RATE this thread 5 STAR if you like it.. it absolutely encourage me more :D

Disclaimer

Code:
/*
 * Your warranty is now void.
 *
 * I am not responsible for bricked devices, dead SD cards,
 * thermonuclear war, or you getting fired because the alarm app failed. Please
 * do some research if you have any concerns about features included in this ROM
 * before flashing it! YOU are choosing to make these modifications, and if
 * you point the finger at me for messing up your device, I will laugh at you.
 */
Features

List of Governors Available :-
- Lulzactive
- Powersave
- SmartAssV2
- interactive
- interactiveX
- conservative
- ondemand
- performance

IO Scheduler
- noop
- deadline
- row
- cfq
- bfq
- sio
- vr
- fiops

Additional Features
- Compiled with Linaro GCC 4.7.3-2013.11 toolchain optimized for Cortex-A8 cpu with Neon technology support
- Change to BFS kernel scheduler
- CPU voltage control VDD sys interface (voltage adjustable)
- Overclock support
- Added NEON compilation flag to VFP module
- SnapDragon Optimization
- dynamic read-ahead
- frandom
- Lowered display panel voltage
- Lowered wifi voltage
- Increase audio loudness
- Dynamic management of dirty page writebacks credit to Christopher83
- Dynamic Fsync
- Fixed 100% battery notification after charger unplug credits to Christopher83
- LowMemoryKiller management of not killable processes - credits to christopher
- Asynchronous I/O latency to a solid-state disk greatly increased
- CK3 tweaks (Credits to Con Kolivas) - adapted by Christopher
- Snappy Google Zram
- Random Tweaks
- Reduce WIFI wakelocks - credits to DerTeufel
- Implement Suspend Freeze (more battery friendly)
- Allowed IPv6 over WIFI in general, we control it in ROM, + no wakelock! (reduce battery consumption)
- exfat support
- Implement frontswap into kernel
- Implement VNSWAP
- Implement ZSWAP - testing
- 368 mb size RAM big mem
- haveged support - (please remove or uninstall any seeder application or script to avoid your system become unstable)



Explanation of Android Governors




Installation Guide:
1. Reboot To Recovery Mode
2. Wipe Cache & Dalvik Cache
3. Flash the kernel
4. Reboot
5. wait until the phone boot up
6. Reboot back for second time


Code:
Credit to :-

- Our Master Arco for his kernel source ( go press thanks for any posted by arco :D without he, this kernel wont existed )
- AriesVE-DevCon-TEAM that make ION and PMEM can co-existed together.. big thanks for them :)
- educk for his tutorial and governors
- biagio7xD for extra governors and SnapDragon Optimization
- Christopher83 that helping me teach how to correct the error and advising me and thanks for his new linaro :)
- Xistance for his teaching
- CastagnaIT for his useful sources
- CyanogenMod developers that developing our CM
- Linaro GCC developers let me using this powerful compiler
- hadidjapri hadiconfig (more RAM)
- keff for governors code fixes
- credit to idcrisis for Crossbreeder MOD
- FelixMG for youtube video
- arsradu for kernel.zip
- others developer on GitHub
- xda-developers.com for all the teaching and members
XDA:DevDB Information
[Kernel][ION+PMEM][CM11] HurtSky's Kernel RebornV2 + BFS + 368Mb Bigmem 5/2/2014, a Kernel for the Samsung Galaxy W I8150



DOWNLOAD LINK > HERE

Changelogs of Revision Version


Do not expect me to explain all the commits/changes. i wont entertain your question unless for some reason.. GOOGLE IT than you will know ;)


Code:
RebornV2 - 5/2/2014
- squash kernel updates 3.4.78
- sync with arco's kernel changes
- zSWAP now activate on boot with zRAM default size
- ARM: add support for bit sliced AES using NEON instructions : Ard Biesheuvel
- crypto: create generic version of ablk_helper : Herbert Xu 
- crypto: ablk_helper - Replace memcpy with struct assignment : Herbert Xu 
- ARM: move AES typedefs and function prototypes to separate header : Ard Biesheuvel 
- arm: vfpmodule: Fix warning procfs vfp_bounce reporting failed : myfluxi
- ARM: 7493/1: use generic unaligned.h : faux123
- Enable pipe flag : testing
- printk: Add sys kernel interface to configure linux printk logging : andip71 
- logger: Add sys fs kernel interface to configure Android logger : andip71


RebornV1 - 26/1/2014
- revoke all the work and start from the scratch
- fix audio lag
- remove unnecessary commits
- implement frontswap, vnswap, zswap with proper commits : thanks to Paul Reioux
- zRam deactivate completely (no more zRAM module inside this kernel unless i want activate it back later in future)

REV4 - bigmem 23/1/2014
- revise more memory allocation - increase RAM size 368Mb - for bigmem version
- add  haveged support - full entropy seeding 4069 : credit to Crossbreeder MOD
(please remove or uninstall any seeder application or script to avoid your system become unstable)
- sync with arco latest build (20140122)
- sync with arco's kernel latest changes
- ARM: vfp: initialize vfp driver before cpufreq : thanks to Bongkyu Kim
- ARM: vfpmodule: Move bounce stats file to seq_file and friends : thanks to Stephen Boyd 
- ARM: move VFP init to an earlier boot stage : thanks to Paul Reioux
- ARM: be strict about FP exceptions in kernel mode : thanks to Paul Reioux
- ARM: add support for kernel mode NEON : thanks to Paul Reioux 
- ARM: crypto: add NEON accelerated XOR implementation : thanks to Ard Biesheuvel
- ARM: 7835/2: fix modular build of xor_blocks() with NEON enabled : thanks to Russell King
- ARM: only allow kernel mode neon with AEABI : thanks to Russell King
- msm: Remove all references to pmem from audio files : thanks to Laura Abbott
- qdsp5: memset stack buffer allocation : thanks to Asish Bhattacharya 

REV3 bigmem 11/1/2014
- add 366Mb ( i hope there is no FC anymore, already test it and feel free to test it ) 

REV3 10/1/2014
- bigmem : revise memory allocation - 360Mb
- update Ramdisk to acro 9/1 build
- sync with arco latest kernel changes
- Increased cpu frequency on boot : thanks to christopher83
- cache_pressure despite the dynamic suspend/resume values : thanks to Boy Petersen 
- fs/dcache.c: adaptive vfs_cache_pressure on suspend / resume: thanks to Boy Petersen 
- [PATCH 1/3] Rename ARM assembler push/pull macros : thanks to Boy Petersen 
- [PATCH 2/3] Optimize copy_page for modern ARM platforms : thanks to Boy Petersen 
- [PATCH 3/3] Optimize ARM memset and memzero functions : thanks to Boy Petersen 
- epoll: optimize EPOLL_CTL_DEL using rcu: thanks to Paul Reioux
- sched/rt: Remove redundant nr_cpus_allowed test
- futex: Misc cleanups : thanks Davidlohr Bueso
- futex: Larger hash table : thanks Davidlohr Bueso
- futex: Document ordering guarantees : thanks Davidlohr Bueso
- futex: Avoid taking hb lock if nothing to wakeup : thanks Davidlohr Bueso
- kernel/futex.c: Linux 3.4 compatibility fix up : thanks to Paul Reioux

REV2 fix and REV2 fix 359mb ram 9/1/2014
- fixes on Crypto support for zRam
- disable zRam on default - it seem zRam for android paging took it ability to compress.. so no need to enable zRam
- add big mem version 359mb 
(everything works have a test and report any FC activity if you had one.. define and clearly state how you get the FC 
 but remember, this big MEM version only testing mode, move to normal version if you're annoyed with the FC things ;) )

REV2 8/1/2014
- Change to BFS kernel scheduler
- update RAMDISK to arco latest ROM changes
- sync with arco latest kernel changes
- delete improve touch sensitiveness from project lard - useless tweaks for our monster
- Update zcache sources
- Implement frontswap into kernel
- Implement ZBUD : thanks Seth Jennings - testing
- Implement ZSWAP : thanks Seth Jennings - testing
- Add zRam for Android paging and LMK.
- mm: Improve Logic Swap - make it use with zbud + zswap (testing)
- Add the Snappy-c compressor : thanks to Andi Kleen
- Update Snappy to V3
- lib: add support for LZ4-compressed kernels : thanks to Kyungsik Lee
- arm: add support for LZ4-compressed kernels : thanks to Kyungsik Lee
- lib: Add lz4 compressor module : thanks to Chanho Min
- crypto: Add lz4 Cryptographic API : thanks to Chanho Min
- Asynchronous Fsync: initial extraction of Async Fsync from HTC : thanks to Paul Reioux
- ARM: mm: implement LoUIS API for cache maintenance ops : thanks to Lorenzo Pieralisi 
- ARM: mm: rename jump labels in v7_flush_dcache_all function : thanks to Lorenzo Pieralisi 
- ARM: kernel: update cpu_suspend code to use cache LoUIS operations : thanks to Lorenzo Pieralisi 
- ARM: kernel: update __cpu_disable to use cache LoUIS maintenance API : thanks to Lorenzo Pieralisi 
- ARM: mm: update __v7_setup() to the new LoUIS cache maintenance API : thanks to Lorenzo Pieralisi 
- input: add generic touchboost driver based on CAF's cpu-boost driver code : thanks to Francisco Franco (still in testing)
- sched: Implement smarter wake-affine logic : thanks to Francisco Franco
- sched: Micro-optimize the smart wake-affine logic : thanks to Peter Zijlstra
- staging: zram: add Crypto API support : thanks to Paul Reioux
- audit: kiss goodbye you stupid piece of crap logging messages : thanks to Francisco Franco
- some minors updates.


REV 1 1/1/2014
- inject VM tweaks, frandom hack, and improve touch sensitiveness from project Lard into ramdisk
- initial release - look at GitHub (too much commit had been done)
- based on new kernel from sir arco
- based on KITKAT from sir arco
The Following 24 Users Say Thank You to hurtsky For This Useful Post: [ Click to Expand ]
hurtsky
Old


Default Reserved

All start on boot default for - Dynamic management of timer slack , LowMemoryKiller management of not killable processes and UKSM Already been removed !
- USE PERFORMANCE CONTROL to enable it > http://forum.xda-developers.com/show....php?t=2401988


Quote:
Settings of The Available Features
partly been taken from Christopher explanation thread - http://forum.xda-developers.com/show....php?t=2172148 all credit go to Christopher83 please thank he for prepare this detail of function

LowMemoryKiller management of not killable processes
This feature allows to define processes and system processes white-lists filled with the preferred process names and to not be killed by lowmemorykiller, unless it is absolutely necessary.

This feature exposes four new lowmemorykiller parameters:
- donotkill_proc, is the flag to enable / disable this feature for the processes chosen by the user
- donotkill_sysproc, is the flag to enable / disable this feature for the system processes chosen by the user
- donotkill_proc_names, is the list of process names (comma separated) chosen by the user to be preserved from killing
- donotkill_sysproc_names, is the list of user system process names (comma separated) chosen by the user to be preserved from killing

When the lowmemorykiller needs to free ram, it will first kill the processes not included inside the two process name lists chosen by the user.
If there are no more standard killable processes, then it will be necessary to kill one of the processes included inside one of the two white-lists, to prevent system hangs, slowdowns, etc.

How to customize the white lists of processes to preserve from killing:
 


Logcat and Dmesg now can be on and off

Default is OFF

Turn on logcat by running "logger_switch.sh.pdf" at attachment
1. please rename logger_switch.sh.pdf > logger_switch.sh
2. by using Smanager, tick SU and run the script.
3. now your logcat and dmesg should running back



ZSWAP features

zSwap already been turn on boot with zRAM default size, for those who did not like let zswap active/on, you can switch it off by

1. open script at this location /etc/init.d/disable_zswap.sh
2. edit the script by removing "#" symbol under the description
3. your script should now look like this
Code:
#!/system/bin/sh

# Remove "#" to disable zswap = regain higher benchmarking

if [ -e /dev/block/vnswap0 ]; then
 swapoff /dev/block/vnswap0 >/dev/null
 echo "1" > /sys/block/vnswap0/reset
fi
4. save the script and reboot
 

Thursday, February 13, 2014

Lightweight Directory Access Protocol

The Lightweight Directory Access Protocol (LDAP; /ˈɛldæp/) is an application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network.[1]
Directory services may provide any organized set of records, often with a hierarchical structure, such as a corporate email directory. Similarly, a telephone directory is a list of subscribers with an address and a phone number.
LDAP is specified in a series of Internet Engineering Task Force (IETF) Standard Track Request for Comments (RFCs), using the description language ASN.1. The latest specification is Version 3, published as RFC 4511. For example, here is an LDAP search translated into plain English: "Search in the company email directory for all people located in Boston whose name contains 'Jesse' that have an email address. Please return their full name, email, title, and description."[2]
A common usage of LDAP is to provide a "single sign-on" where one password for a user is shared between many services, such as applying a company login code to web pages (so that staff log in only once to company computers, and then are automatically logged into the company intranet).[2]



History

Telecommunication companies' understanding of directory requirements was well developed after some 70 years of producing and managing telephone directories. These companies introduced the concept of directory services to information technology and computer networking, their input culminating in the comprehensive X.500 specification,[3] a suite of protocols produced by the International Telecommunication Union (ITU) in the 1980s.
X.500 directory services were traditionally accessed via the X.500 Directory Access Protocol (DAP), which required the Open Systems Interconnection (OSI) protocol stack. LDAP was originally intended to be a lightweight alternative protocol for accessing X.500 directory services through the simpler (and now widespread) TCP/IP protocol stack. This model of directory access was borrowed from the DIXIE and Directory Assistance Service protocols.
Standalone LDAP directory servers soon followed, as did directory servers supporting both DAP and LDAP. The latter has become popular in enterprises, as LDAP removed any need to deploy an OSI network. Today, X.500 directory protocols including DAP can also be used directly over TCP/IP.
The protocol was originally created[4] by Tim Howes of the University of Michigan, Steve Kille of Isode Limited, Colin Robbins of Nexor and Wengyik Yeong of Performance Systems International, circa 1993. Mark Wahl of Critical Angle Inc., Tim Howes, and Steve Kille started work in 1996 on a new version of LDAP, LDAPv3, under the aegis of the Internet Engineering Task Force (IETF). LDAPv3, first published in 1997, superseded LDAPv2 and added support for extensibility, integrated the Simple Authentication and Security Layer, and better aligned the protocol to the 1993 edition of X.500. Further development of the LDAPv3 specifications themselves and of numerous extensions adding features to LDAPv3 has come through the IETF.
In the early engineering stages of LDAP, it was known as Lightweight Directory Browsing Protocol, or LDBP. It was renamed with the expansion of the scope of the protocol beyond directory browsing and searching, to include directory update functions. It was given its Lightweight name because it was not as network intensive as its DAP predecessor and thus was more easily implemented over the internet due to its relatively modest bandwidth usage.
LDAP has influenced subsequent Internet protocols, including later versions of X.500, XML Enabled Directory (XED), Directory Service Markup Language (DSML), Service Provisioning Markup Language (SPML), and the Service Location Protocol (SLP).

Protocol overview

A client starts an LDAP session by connecting to an LDAP server, called a Directory System Agent (DSA), by default on TCP port and UDP [5] port 389. The client then sends an operation request to the server, and the server sends responses in return. With some exceptions, the client does not need to wait for a response before sending the next request, and the server may send the responses in any order. All information is transmitted using Basic Encoding Rules (BER).
The client may request the following operations:
  • StartTLS — use the LDAPv3 Transport Layer Security (TLS) extension for a secure connection
  • Bind — authenticate and specify LDAP protocol version
  • Search — search for and/or retrieve directory entries
  • Compare — test if a named entry contains a given attribute value
  • Add a new entry
  • Delete an entry
  • Modify an entry
  • Modify Distinguished Name (DN) — move or rename an entry
  • Abandon — abort a previous request
  • Extended Operation — generic operation used to define other operations
  • Unbind — close the connection (not the inverse of Bind)
In addition the server may send "Unsolicited Notifications" that are not responses to any request, e.g. before the connection is timed out.
A common alternative method of securing LDAP communication is using an SSL tunnel. This is denoted in LDAP URLs by using the URL scheme "ldaps". The default port for LDAP over SSL is 636. The use of LDAP over SSL was common in LDAP Version 2 (LDAPv2) but it was never standardized in any formal specification. This usage has been deprecated along with LDAPv2, which was officially retired in 2003.[6]

Directory structure

The protocol provides an interface with directories that follow the 1993 edition of the X.500 model:
  • An entry consists of a set of attributes.
  • An attribute has a name (an attribute type or attribute description) and one or more values. The attributes are defined in a schema (see below).
  • Each entry has a unique identifier: its Distinguished Name (DN). This consists of its Relative Distinguished Name (RDN), constructed from some attribute(s) in the entry, followed by the parent entry's DN. Think of the DN as the full file path and the RDN as its relative filename in its parent folder (e.g. if /foo/bar/myfile.txt were the DN, then myfile.txt would be the RDN).
A DN may change over the lifetime of the entry, for instance, when entries are moved within a tree. To reliably and unambiguously identify entries, a UUID might be provided in the set of the entry's operational attributes.
An entry can look like this when represented in LDAP Data Interchange Format (LDIF) (LDAP itself is a binary protocol):
dn: cn=John Doe,dc=example,dc=com
cn: John Doe
givenName: John
sn: Doe
telephoneNumber: +1 888 555 6789
telephoneNumber: +1 888 555 1232
mail: john@example.com
manager: cn=Barbara Doe,dc=example,dc=com
objectClass: inetOrgPerson
objectClass: organizationalPerson
objectClass: person
objectClass: top
"dn" is the distinguished name of the entry; it is neither an attribute nor a part of the entry. "cn=John Doe" is the entry's RDN (Relative Distinguished Name), and "dc=example,dc=com" is the DN of the parent entry, where "dc" denotes 'Domain Component'. The other lines show the attributes in the entry. Attribute names are typically mnemonic strings, like "cn" for common name, "dc" for domain component, "mail" for e-mail address, and "sn" for surname.
A server holds a subtree starting from a specific entry, e.g. "dc=example,dc=com" and its children. Servers may also hold references to other servers, so an attempt to access "ou=department,dc=example,dc=com" could return a referral or continuation reference to a server that holds that part of the directory tree. The client can then contact the other server. Some servers also support chaining, which means the server contacts the other server and returns the results to the client.
LDAP rarely defines any ordering: The server may return the values of an attribute, the attributes in an entry, and the entries found by a search operation in any order. This follows from the formal definitions - an entry is defined as a set of attributes, and an attribute is a set of values, and sets need not be ordered.

Operations

Add

The ADD operation inserts a new entry into the directory-server database.[7] If the distinguished name in the add request already exists in the directory, then the server will not add a duplicate entry but will set the result code in the add result to decimal 68, "entryAlreadyExists".[8]
  • LDAP-compliant servers will never dereference the distinguished name transmitted in the add request when attempting to locate the entry, that is, distinguished names are never de-aliased.
  • LDAP-compliant servers will ensure that the distinguished name and all attributes conform to naming standards
  • The entry to be added must not exist, and the immediate superior must exist.
dn: uid=user,ou=people,dc=example,dc=com
changetype: add
objectClass: top
objectClass: person
uid: user
sn: last-name
cn: common-name
userPassword: password
In the above example, uid=user,ou=people,dc=example,dc=com must not exist, and ou=people,dc=example,dc=com must exist.

Bind (authenticate)

When an LDAP session is created, that is, when an LDAP client connects to the server, the authentication state of the session is set to anonymous. The BIND operation establishes the authentication state for a session.
Simple BIND and SASL PLAIN can send the user's DN and password in plaintext, so the connections utilizing either Simple or SASL PLAIN should be encrypted using Transport Layer Security (TLS). The server typically checks the password against the userPassword attribute in the named entry. Anonymous BIND (with empty DN and password) resets the connection to anonymous state.
SASL (Simple Authentication and Security Layer) BIND provides authentication services through a wide range of mechanisms, e.g. Kerberos or the client certificate sent with TLS.[9]
BIND also sets the LDAP protocol version. The version is an integer and at present<when?> must be either 2 (two) or 3 (three), although the standard supports integers between 1 and 127 (inclusive) in the protocol. If the client requests a version that the server does not support, the server must set the result code in the BIND response to the code for a protocol error. Normally clients should use LDAPv3, which is the default in the protocol but not always in LDAP libraries.
BIND had to be the first operation in a session in LDAPv2, but is not required in LDAPv3 (the current LDAP version). In LDAPv3, each successful BIND request changes the authentication state of the session and each unsuccessful BIND request resets the authentication state of the session.

Delete

To delete an entry, an LDAP client transmits a properly formed delete request to the server.[10]
  • A delete request must contain the distinguished name of the entry to be deleted
  • Request controls may also be attached to the delete request
  • Servers do not dereference aliases when processing a delete request
  • Only leaf nodes (entries with no subordinates) may be deleted by a delete request. Some servers support an operational attribute hasSubordinates whose value indicates whether an entry has any subordinate entries, and some servers support an operational attribute numSubordinates[11] indicating the number of entries subordinate to the entry containing the numSubordinates attribute.
  • Some servers support the subtree delete request control permitting deletion of the DN and all objects subordinate to the DN, subject to access controls. Delete requests are subject to access controls, that is, whether a connection with a given authentication state will be permitted to delete a given entry is governed by server-specific access control mechanisms.

Search and Compare

The Search operation is used to both search for and read entries. Its parameters are:
baseObject 
The name of the base object entry (or possibly the root) relative to which the search is to be performed.
scope 
What elements below the baseObject to search. This can be BaseObject (search just the named entry, typically used to read one entry), singleLevel (entries immediately below the base DN), or wholeSubtree (the entire subtree starting at the base DN).
filter 
Criteria to use in selecting elements within scope. For example, the filter (&(objectClass=person)(|(givenName=John)(mail=john*))) will select "persons" (elements of objectClass person) where the matching rules for givenName and mail determine whether the values for those attributes match the filter assertion. Note that a common misconception is that LDAP data is case-insensitive, whereas in fact matching rules and ordering rules determine matching, comparisons, and relative value relationships. If the example filters were required to match the case of the attribute value, an extensible match filter must be used, for example, (&(objectClass=person)(|(givenName:caseExactMatch:=John)(mail:caseExactSubstringsMatch:=john*)))
derefAliases 
Whether and how to follow alias entries (entries that refer to other entries),
attributes 
Which attributes to return in result entries.
sizeLimit, timeLimit 
Maximum number of entries to return, and maximum time to allow search to run. These values, however, cannot override any restrictions the server places on size limit and time limit.
typesOnly 
Return attribute types only, not attribute values.
The server returns the matching entries and potentially continuation references. These may be returned in any order. The final result will include the result code.
The Compare operation takes a DN, an attribute name and an attribute value, and checks if the named entry contains that attribute with that value.

Modify

The MODIFY operation is used by LDAP clients to request that the LDAP server make changes to existing entries.[12] Attempts to modify entries that do not exist will fail. MODIFY requests are subject to access controls as implemented by the server.
The MODIFY operation requires that the distinguished name (DN) of the entry be specified, and a sequence of changes. Each change in the sequence must be one of:
  • add (add a new value, which must not already exist in the entry)
  • delete (delete an existing value)
  • replace (replace an existing value with a new value)
LDIF example of adding a value to an attribute:
dn: dc=example,dc=com
changetype: modify
add: cn
cn: the-new-cn-value-to-be-added
To replace the value of an existing attribute, Use the replace keyword. If the attribute is multi-valued, the client must specify the value of the attribute to delete.
To delete an attribute from an entry, use the keyword delete and the changetype designator modify. If the attribute is multi-valued, the client must specify the value of the attribute to delete.
There is also a modify-increment extension which allows an incrementable attribute value to be incremented by a specified amount. The modify-increment extension uses object identifier 1.3.6.1.1.14. The following example using LDIF increments employeeNumber by 5:
dn: uid=user.0,ou=people,dc=example,dc=com
changetype: modify
increment: employeeNumber
employeeNumber: 5
When LDAP servers are in a replicated topology, LDAP clients should consider using the post-read control to verify updates instead of a search after an update.[13] The post-read control is designed so that applications need not issue a search request after an update – it is bad form to retrieve an entry for the sole purpose of checking that an update worked because of the replication eventual consistency model. An LDAP client should not assume that it connects to the same directory server for each request because architects may have placed load-balancers or LDAP proxies or both between LDAP clients and servers.

Modify DN

Modify DN (move/rename entry) takes the new RDN (Relative Distinguished Name), optionally the new parent's DN, and a flag that says whether to delete the value(s) in the entry that match the old RDN. The server may support renaming of entire directory subtrees.
An update operation is atomic: Other operations will see either the new entry or the old one. On the other hand, LDAP does not define transactions of multiple operations: If you read an entry and then modify it, another client may have updated the entry in the meantime. Servers may implement extensions[14] that support this, though.

Extended operations

The Extended Operation is a generic LDAP operation that can define new operations that were not part of the original protocol specification. StartTLS is one of the most significant extensions. Other examples include Cancel and Password Modify.

StartTLS

The StartTLS operation establishes Transport Layer Security (the descendant of SSL) on the connection. It can provide data confidentiality (to protect data from being observed by third parties) and/or data integrity protection (which protects the data from tampering). During TLS negotiation the server sends its X.509 certificate to prove its identity. The client may also send a certificate to prove its identity. After doing so, the client may then use SASL/EXTERNAL. By using the SASL/EXTERNAL, the client requests the server derive its identity from credentials provided at a lower level (such as TLS). Though technically the server may use any identity information established at any lower level, typically the server will use the identity information established by TLS.
Servers also often support the non-standard "LDAPS" ("Secure LDAP", commonly known as "LDAP over SSL") protocol on a separate port, by default 636. LDAPS differs from LDAP in two ways: 1) upon connect, the client and server establish TLS before any LDAP messages are transferred (without a StartTLS operation) and 2) the LDAPS connection must be closed upon TLS closure.
It should be noted that some "LDAPS" client libraries only encrypt communication, they do not check the host name against the name in the supplied certificate.[15]

Abandon

The Abandon operation requests that the server abort an operation named by a message ID. The server need not honor the request. Neither Abandon nor a successfully abandoned operation send a response. A similar Cancel extended operation does send responses, but not all implementations support this.

Unbind

The Unbind operation abandons any outstanding operations and closes the connection. It has no response. The name is of historical origin, and is not the opposite of the Bind operation.[16]
Clients can abort a session by simply closing the connection, but they should use Unbind.[17] Unbind allows the server to gracefully close the connection and free resources that it would otherwise keep for some time until discovering the client had abandoned the connection. It also instructs the server to cancel operations that can be canceled, and to not send responses for operations that cannot be canceled.[18]

LDAP URLs

An LDAP URL format exists, which clients support in varying degrees, and servers return in referrals and continuation references (see RFC 4516):
ldap://host:port/DN?attributes?scope?filter?extensions
Most of the components described below are optional.
  • host is the FQDN or IP address of the LDAP server to search.
  • port is the network port (default port 389) of the LDAP server.
  • DN is the distinguished name to use as the search base.
  • attributes is a comma-separated list of attributes to retrieve.
  • scope specifies the search scope and can be "base" (the default), "one" or "sub".
  • filter is a search filter. For example (objectClass=*) as defined in RFC 4515.
  • extensions are extensions to the LDAP URL format.
For example, "ldap://ldap.example.com/cn=John%20Doe,dc=example,dc=com" refers to all user attributes in John Doe's entry in ldap.example.com, while "ldap:///dc=example,dc=com??sub?(givenName=John)" searches for the entry in the default server (note the triple slash, omitting the host, and the double question mark, omitting the attributes). As in other URLs, special characters must be percent-encoded.
There is a similar non-standard ldaps: URL scheme for LDAP over SSL. This should not be confused with LDAP with TLS, which is achieved using the StartTLS operation using the standard ldap: scheme.

Schema

The contents of the entries in a subtree are governed by a directory schema, a set of definitions and constraints concerning the structure of the directory information tree (DIT).
The schema of a Directory Server defines a set of rules that govern the kinds of information that the server can hold. It has a number of elements, including:
  • Attribute Syntaxes—Provide information about the kind of information that can be stored in an attribute.
  • Matching Rules—Provide information about how to make comparisons against attribute values.
  • Matching Rule Uses—Indicate which attribute types may be used in conjunction with a particular matching rule.
  • Attribute Types—Define an object identifier (OID) and a set of names that may be used to refer to a given attribute, and associates that attribute with a syntax and set of matching rules.
  • Object Classes—Define named collections of attributes and classify them into sets of required and optional attributes.
  • Name Forms—Define rules for the set of attributes that should be included in the RDN for an entry.
  • Content Rules—Define additional constraints about the object classes and attributes that may be used in conjunction with an entry.
  • Structure Rule—Define rules that govern the kinds of subordinate entries that a given entry may have.
Attributes are the elements responsible for storing information in a directory, and the schema defines the rules for which attributes may be used in an entry, the kinds of values that those attributes may have, and how clients may interact with those values.
Clients may learn about the schema elements that the server supports by retrieving an appropriate subschema subentry.
The schema defines object classes. Each entry must have an objectClass attribute, containing named classes defined in the schema. The schema definition of the classes of an entry defines what kind of object the entry may represent - e.g. a person, organization or domain. The object class definitions also define the list of attributes that must contain values and the list of attributes which may contain values.
For example, an entry representing a person might belong to the classes "top" and "person". Membership in the "person" class would require the entry to contain the "sn" and "cn" attributes, and allow the entry also to contain "userPassword", "telephoneNumber", and other attributes. Since entries may have multiple ObjectClasses values, each entry has a complex of optional and mandatory attribute sets formed from the union of the object classes it represents. ObjectClasses can be inherited, and a single entry can have multiple ObjectClasses values that define the available and required attributes of the entry itself. A parallel to the schema of an objectClass is a class definition and an instance in Object-oriented programming, representing LDAP objectClass and LDAP entry, respectively.
Directory servers may publish the directory schema controlling an entry at a base DN given by the entry's subschemaSubentry operational attribute. (An operational attribute describes operation of the directory rather than user information and is only returned from a search when it is explicitly requested.)
Server administrators can add additional schema entries in addition to the provided schema elements. A schema for representing individual people within organizations is termed a white pages schema.

Variations

A lot of the server operation is left to the implementor or administrator to decide. Accordingly, servers may be set up to support a wide variety of scenarios.
For example, data storage in the server is not specified - the server may use flat files, databases, or just be a gateway to some other server. Access control is not standardized, though there has been work on it and there are commonly used models. Users' passwords may be stored in their entries or elsewhere. The server may refuse to perform operations when it wishes, and impose various limits.
Most parts of LDAP are extensible. Examples: One can define new operations. Controls may modify requests and responses, e.g. to request sorted search results. New search scopes and Bind methods can be defined. Attributes can have options that may modify their semantics.

Other data models

As LDAP has gained momentum, vendors have provided it as an access protocol to other services. The implementation then recasts the data to mimic the LDAP/X.500 model, but how closely this model is followed varies. For example, there is software to access SQL databases through LDAP, even though LDAP does not readily lend itself to this.[19] X.500 servers may support LDAP as well.
Similarly, data previously held in other types of data stores are sometimes moved to LDAP directories. For example, Unix user and group information can be stored in LDAP and accessed via PAM and NSS modules. LDAP is often used by other services for authentication.
An example of such data model is the GLUE Schema,[20] which is used in a distributed information system based on LDAP that enable users, applications and services to discover which services exist in a Grid infrastructure and further information about their structure and state.

Usage

An LDAP server may return referrals to other servers for requests that it cannot fulfill itself. This requires a naming structure for LDAP entries so one can find a server holding a given DN or distinguished name, a concept defined in the X.500 Directory and also used in LDAP. Another way of locating LDAP servers for an organization is a DNS server resource record (SRV).
An organization with the domain example.org may use the top level LDAP DN dc=example,dc=org (where dc means domain component). If the LDAP server is also named ldap.example.org, the organization's top level LDAP URL becomes ldap://ldap.example.org/dc=example,dc=org.
Primarily two common styles of naming are used in both X.500 [2008] and LDAPv3. These are documented in the ITU specifications and IETF RFCs. The original form takes the top level object as the country object, such as c=US, c=FR. The domain component model uses the model described above. An example of country based naming could be L=Locality, ou=Some Organizational Unit, o=Some Organization, c=FR, or in the US: CN=Common Name, L=Locality, ou=Some Organizational Unit, o=Some Organization, st=CA, c=US.

See also

References

Notes

Further reading

External links

RFCs

LDAP is specified in a series of Request for Comments documents:
The following RFCs detail LDAP-specific Best Current Practices:
  • RFC 4520 (also BCP 64) - Internet Assigned Numbers Authority (IANA) Considerations for the Lightweight Directory Access Protocol (LDAP) (replaced RFC 3383)
  • RFC 4521 (also BCP 118) - Considerations for Lightweight Directory Access Protocol (LDAP) Extensions
The following is a partial list of RFCs specifying LDAPv3 extensions:
LDAPv2 was specified in the following RFCs:
LDAPv2 was moved to historic status by the following RFC:
  • RFC 3494 - Lightweight Directory Access Protocol version 2 (LDAPv2) to Historic Status
[show]

Sumber : http://en.wikipedia.org/wiki/Lightweight_Directory_Access_Protocol

[ROM][JB][4.3.1][JLS36I] CyanogenMod 10.2 Alpha (Build 9) ( arsradu )

[ROM][JB][4.3.1][JLS36I] CyanogenMod 10.2 Alpha (Build 9)


C y a n o g e n M o d 1 0.2
Samsung GT-I8150 Galaxy Wonder


For general discussions, bug reports and FAQ, go here.
If you're on your PC, you can also do this by accessing the Q&A section up top.


Issues regarding custom kernels are to be reported into their corresponding threads. Please, don't post them here.


What's working
  • Audio
  • Receiving and making calls
  • GPS
  • Compass
  • Proximity sensor
  • Wifi
  • Bluetooth
  • USB mass storage
  • HW accelerated gui
  • HW accelerated video
  • Camera
  • Torch
  • Wifi/USB tethering
  • USB OTG
  • Vsync

Annoyances
  • none so far

Screenshots




Downloads

CyanogenMod 10.2 - Alpha 9 - 20140916 md5sum: fde73d938ac4ccff8f76541331217ebf

Changelog:
  • attempt on fixing system freezes (trying out CM11 kernel for a while to see how it performs.)
  • updated kernel to version 3.4.103

CyanogenMod 10.2 - Alpha 8 - 20140730 md5sum: 4f7a03b8f3885a7c4521a20e24022990

Changelog:
  • updated kernel to version 3.4.100
  • switched to CMA (contiguous memory allocation), now the user has 392MB of RAM - big thanks to arco68
  • fixed Gallery freezing for specific videos (thanks to arco68)
  • repo synced

CyanogenMod 10.2 - Alpha 7 - 20140511 md5sum: 2e45f6c6f5b19e1baf314e40549deea8

Changelog:
  • lockscreen freeze fix (thanks to arco68 for the tip)
  • updated kernel to version 3.4.89
  • other fixes

CyanogenMod 10.2 - Alpha 6 - 20140508 md5sum: 22314db4de6f65d31f8fbbf65addcd0c

Changelog:
  • BT fix
  • updated kernel to version 3.4.86

CyanogenMod 10.2 - Alpha 5 - 20140125 md5sum: 2004f9c984f95dd8bf0ae1817f6be457

Changelog:
  • switched to ION & PMEM hybrid environment
  • updated kernel to version 3.4.77

CyanogenMod 10.2 - Alpha 4 - 20131123 md5sum: 3bd693bf767547db56805c0dbd5c1b40

Changelog:
  • updated kernel to version 3.4.70
  • fixed Sharpness causing FC of the Gallery app
  • fixed long press 2G/3G quicksettings toggle causing FC of the Phone process.
  • fixed FC when uninstalling a theme

CyanogenMod 10.2 - Alpha 3 - 20131027 md5sum: 3125ea5069d84c8a3e5f248f064b0c64

Changelog:
  • updated kernel to version 3.4.67
  • fixed Torch app turning off when the screen does
  • workaround for "reboot into Download Mode" from the OS

CyanogenMod 10.2 - Alpha 2 - 20131020 md5sum: 8e61732d65ed3205c94646d7243409c8

Changelog:
  • fixed Torch tile not switching on when the app does (credits to arco)
  • fixed Gallery/File Explorer making the phone freeze when having HD mp4 vides encoded with AVC on the phone. (credits to arco)
  • added tun and exfat support to the kernel
  • upgraded the kernel to v3.4.66
  • switched to inline kernel
  • repo synced with the latest CM sources.

CyanogenMod 10.2 - Alpha 1 - 20131013 md5sum: e7b6590d754bf3f4cf629549f3c12798



Gapps 20130813 md5sum: 1f51b5cc6370c1f45dc951109b6ce6ed


Gapps 20140726 (unofficial)
  • Google Drive: here
md5sum: a4764538bc4b3737fa7cc78788fd69e9


Changelog Gapps 20140726
  • * Google Search v3.5.16.1262550.arm
  • * Google Maps v8.2.0
  • * Google Play Services v5.0.84(1259630-034)
  • * Google Play Store v4.8.20
  • * Google Text-to-Speech Engine v3.1.3.1162895
  • * Hangouts v2.1.311(1231142-30)
  • * Gmail 4.9(1271612)

 

* means that the app has been upgraded to the newest version
+ means that the app has been newly added
- means that the app has been removed

Installation instructions

For new installations & upgrades, first, make sure you got CM10.2 ROM and the correct Gapps on your External SD Card.

After that, enter CWM and:
  • select "wipe data / factory reset"
  • go to "mounts & storage" and format /system. This is extremely important!
  • under the same menu, format /sdcard0 (be careful NOT to format /sdcard1 by mistake)
  • install CM10.2 (from the external sd)
  • install Gapps for JB+ (from the external sd)
  • reboot your phone
Please, note that every step of this tutorial is mandatory!

Non-touch CWM Recovery 6.0.3.8 (or later) is needed for this ROM to work properly.
If you don't have it already, CWM Recovery 6 can be downloaded from here.

Do NOT restore backup data of system apps!
If you need to restore applications, make sure you only restore 3rd party apps and preferably apks only. No app data. SMS, contacts, calendar entries, pictures, videos should be safe to restore.
If you're installing this ROM after stock ROM (Android 2.3.6), CM9 (Android 4.0.4) or CM10 (Android 4.1.2), I would recommend redownloading the apps rather than restoring them from a backup. They might not be fully compatible and might cause troubles. As a general suggestion, try to keep your ROM as clean as possible.

Credits
arco68
CyanogenMod Team

Special thanks
LeroViten
SGWUser
camcory
honeyx


Note: CM for Galaxy W is provided with no warranty. You are installing this software at your own risk. You may be violating your warranty.


XDA:DevDB Information
[ROM][JB][4.3.1][JLS36I] CyanogenMod 10.2 Alpha (Build 9), ROM for the Samsung Galaxy W I8150

Contributors
arsradu, arco68
ROM OS Version: 4.3.x Jellybean
ROM Kernel: Linux 3.4.x
Based On: CyanogenMod

Version Information
Status: Alpha

Created 2013-10-13
Last Updated 2014-09-17


http://forum.xda-developers.com/showthread.php?t=2482038