Re: [RFC v5 1/1] ns: add binfmt_misc to the user namespace

2018-10-09 Thread Laurent Vivier
Le 09/10/2018 à 19:01, Kirill Tkhai a écrit : > On 09.10.2018 19:45, Laurent Vivier wrote: >> Le 09/10/2018 à 18:15, Kirill Tkhai a écrit : >>> On 09.10.2018 13:37, Laurent Vivier wrote: This patch allows to have a different binfmt_misc configuration for each new user namespace. By

Re: [RFC v5 1/1] ns: add binfmt_misc to the user namespace

2018-10-09 Thread Laurent Vivier
Le 09/10/2018 à 19:01, Kirill Tkhai a écrit : > On 09.10.2018 19:45, Laurent Vivier wrote: >> Le 09/10/2018 à 18:15, Kirill Tkhai a écrit : >>> On 09.10.2018 13:37, Laurent Vivier wrote: This patch allows to have a different binfmt_misc configuration for each new user namespace. By

Re: [PATCH] remoteproc: qcom: q6v5-pil: add SCM probe dependency

2018-10-09 Thread Sibi Sankar
On 2018-10-09 22:32, Brian Norris wrote: On Mon, Oct 08, 2018 at 11:21:25PM -0700, Bjorn Andersson wrote: On Mon 08 Oct 19:08 PDT 2018, Brian Norris wrote: > Similar to qcom_q6v5_pas and qcom_wcnss drivers, probe will fail if SCM > is not up. > Thanks Brian, this dependency was introduced

Re: [PATCH] remoteproc: qcom: q6v5-pil: add SCM probe dependency

2018-10-09 Thread Sibi Sankar
On 2018-10-09 22:32, Brian Norris wrote: On Mon, Oct 08, 2018 at 11:21:25PM -0700, Bjorn Andersson wrote: On Mon 08 Oct 19:08 PDT 2018, Brian Norris wrote: > Similar to qcom_q6v5_pas and qcom_wcnss drivers, probe will fail if SCM > is not up. > Thanks Brian, this dependency was introduced

Re: [PATCH v2 07/11] arch/x86: Initialize the resource functions that are different

2018-10-09 Thread Reinette Chatre
Hi Babu, On 10/5/2018 1:55 PM, Moger, Babu wrote: > diff --git a/arch/x86/kernel/cpu/rdt_ctrlmondata.c > b/arch/x86/kernel/cpu/rdt_ctrlmondata.c > index 812cc5c5e39e..ee3e8389d8d2 100644 > --- a/arch/x86/kernel/cpu/rdt_ctrlmondata.c > +++ b/arch/x86/kernel/cpu/rdt_ctrlmondata.c > @@ -64,7 +64,7

Re: [PATCH v2 07/11] arch/x86: Initialize the resource functions that are different

2018-10-09 Thread Reinette Chatre
Hi Babu, On 10/5/2018 1:55 PM, Moger, Babu wrote: > diff --git a/arch/x86/kernel/cpu/rdt_ctrlmondata.c > b/arch/x86/kernel/cpu/rdt_ctrlmondata.c > index 812cc5c5e39e..ee3e8389d8d2 100644 > --- a/arch/x86/kernel/cpu/rdt_ctrlmondata.c > +++ b/arch/x86/kernel/cpu/rdt_ctrlmondata.c > @@ -64,7 +64,7

Re: [PATCH v5 3/3] gpiolib: Show correct direction from the beginning

2018-10-09 Thread Jeffrey Hugo
On 10/5/2018 10:54 AM, Timur Tabi wrote: On 10/05/2018 11:17 AM, Jeffrey Hugo wrote:> Looks like the driver is initing just fine to me. Is setting up the jumpers and running gpio-test warranted? Well, that test only makes sure that input/output is actually working on the hardware level, but

Re: [PATCH v5 3/3] gpiolib: Show correct direction from the beginning

2018-10-09 Thread Jeffrey Hugo
On 10/5/2018 10:54 AM, Timur Tabi wrote: On 10/05/2018 11:17 AM, Jeffrey Hugo wrote:> Looks like the driver is initing just fine to me. Is setting up the jumpers and running gpio-test warranted? Well, that test only makes sure that input/output is actually working on the hardware level, but

WARNING: ODEBUG bug in free_task

2018-10-09 Thread syzbot
Hello, syzbot found the following crash on: HEAD commit:ae16eea39a86 Add linux-next specific files for 20181008 git tree: linux-next console output: https://syzkaller.appspot.com/x/log.txt?x=16a493b940 kernel config: https://syzkaller.appspot.com/x/.config?x=42525ce985d1a955

WARNING: ODEBUG bug in free_task

2018-10-09 Thread syzbot
Hello, syzbot found the following crash on: HEAD commit:ae16eea39a86 Add linux-next specific files for 20181008 git tree: linux-next console output: https://syzkaller.appspot.com/x/log.txt?x=16a493b940 kernel config: https://syzkaller.appspot.com/x/.config?x=42525ce985d1a955

Re: [PATCH v3 1/5] drivers: pinctrl: qcom: add wakeup capability to GPIO

2018-10-09 Thread Lina Iyer
On Tue, Oct 02 2018 at 11:06 -0600, Lina Iyer wrote: Marc, I am exploring an option where we don't do this enable/disable every suspend/resume and in that process, I was able to just use the PDC interrupt instead of the TLMM for triggering the GPIO. The PDC interrupt (which takes over for the

Re: [PATCH v3 1/5] drivers: pinctrl: qcom: add wakeup capability to GPIO

2018-10-09 Thread Lina Iyer
On Tue, Oct 02 2018 at 11:06 -0600, Lina Iyer wrote: Marc, I am exploring an option where we don't do this enable/disable every suspend/resume and in that process, I was able to just use the PDC interrupt instead of the TLMM for triggering the GPIO. The PDC interrupt (which takes over for the

Re: [PATCH] remoteproc: qcom: q6v5-pil: add SCM probe dependency

2018-10-09 Thread Brian Norris
On Mon, Oct 08, 2018 at 11:21:25PM -0700, Bjorn Andersson wrote: > On Mon 08 Oct 19:08 PDT 2018, Brian Norris wrote: > > > Similar to qcom_q6v5_pas and qcom_wcnss drivers, probe will fail if SCM > > is not up. > > > > Thanks Brian, this dependency was introduced with the memory ownership >

Re: [PATCH] remoteproc: qcom: q6v5-pil: add SCM probe dependency

2018-10-09 Thread Brian Norris
On Mon, Oct 08, 2018 at 11:21:25PM -0700, Bjorn Andersson wrote: > On Mon 08 Oct 19:08 PDT 2018, Brian Norris wrote: > > > Similar to qcom_q6v5_pas and qcom_wcnss drivers, probe will fail if SCM > > is not up. > > > > Thanks Brian, this dependency was introduced with the memory ownership >

Re: [RFC v5 1/1] ns: add binfmt_misc to the user namespace

2018-10-09 Thread Jann Horn
On Tue, Oct 9, 2018 at 6:57 PM Laurent Vivier wrote: > Le 09/10/2018 à 18:53, Jann Horn a écrit : > > On Tue, Oct 9, 2018 at 6:45 PM Laurent Vivier wrote: > >> Le 09/10/2018 à 18:15, Kirill Tkhai a écrit : > >>> On 09.10.2018 13:37, Laurent Vivier wrote: > This patch allows to have a

Re: [RFC v5 1/1] ns: add binfmt_misc to the user namespace

2018-10-09 Thread Jann Horn
On Tue, Oct 9, 2018 at 6:57 PM Laurent Vivier wrote: > Le 09/10/2018 à 18:53, Jann Horn a écrit : > > On Tue, Oct 9, 2018 at 6:45 PM Laurent Vivier wrote: > >> Le 09/10/2018 à 18:15, Kirill Tkhai a écrit : > >>> On 09.10.2018 13:37, Laurent Vivier wrote: > This patch allows to have a

Re: [RFC v5 1/1] ns: add binfmt_misc to the user namespace

2018-10-09 Thread Kirill Tkhai
On 09.10.2018 19:45, Laurent Vivier wrote: > Le 09/10/2018 à 18:15, Kirill Tkhai a écrit : >> On 09.10.2018 13:37, Laurent Vivier wrote: >>> This patch allows to have a different binfmt_misc configuration >>> for each new user namespace. By default, the binfmt_misc configuration >>> is the one of

Re: [RFC v5 1/1] ns: add binfmt_misc to the user namespace

2018-10-09 Thread Kirill Tkhai
On 09.10.2018 19:45, Laurent Vivier wrote: > Le 09/10/2018 à 18:15, Kirill Tkhai a écrit : >> On 09.10.2018 13:37, Laurent Vivier wrote: >>> This patch allows to have a different binfmt_misc configuration >>> for each new user namespace. By default, the binfmt_misc configuration >>> is the one of

Re: [RFC v5 1/1] ns: add binfmt_misc to the user namespace

2018-10-09 Thread Laurent Vivier
Le 09/10/2018 à 18:53, Jann Horn a écrit : > On Tue, Oct 9, 2018 at 6:45 PM Laurent Vivier wrote: >> Le 09/10/2018 à 18:15, Kirill Tkhai a écrit : >>> On 09.10.2018 13:37, Laurent Vivier wrote: This patch allows to have a different binfmt_misc configuration for each new user namespace.

Re: [PATCH 4.4 093/113] pinctrl: msm: Really mask level interrupts to prevent latching

2018-10-09 Thread Bjorn Andersson
On Tue 09 Oct 02:23 PDT 2018, Greg Kroah-Hartman wrote: > On Mon, Oct 08, 2018 at 11:33:38PM -0700, Nathan Chancellor wrote: > > On Mon, Oct 08, 2018 at 08:31:34PM +0200, Greg Kroah-Hartman wrote: > > > 4.4-stable review patch. If anyone has any objections, please let me > > > know. > > > > >

Re: [RFC v5 1/1] ns: add binfmt_misc to the user namespace

2018-10-09 Thread Laurent Vivier
Le 09/10/2018 à 18:53, Jann Horn a écrit : > On Tue, Oct 9, 2018 at 6:45 PM Laurent Vivier wrote: >> Le 09/10/2018 à 18:15, Kirill Tkhai a écrit : >>> On 09.10.2018 13:37, Laurent Vivier wrote: This patch allows to have a different binfmt_misc configuration for each new user namespace.

Re: [PATCH 4.4 093/113] pinctrl: msm: Really mask level interrupts to prevent latching

2018-10-09 Thread Bjorn Andersson
On Tue 09 Oct 02:23 PDT 2018, Greg Kroah-Hartman wrote: > On Mon, Oct 08, 2018 at 11:33:38PM -0700, Nathan Chancellor wrote: > > On Mon, Oct 08, 2018 at 08:31:34PM +0200, Greg Kroah-Hartman wrote: > > > 4.4-stable review patch. If anyone has any objections, please let me > > > know. > > > > >

Re: [PATCH 04/11] UAPI: bcache: Fix use of embedded flexible array

2018-10-09 Thread Jan Engelhardt
On Tuesday 2018-10-09 17:41, David Howells wrote: >Jan Engelhardt wrote: > >> """it [the array size expression] shall be a converted constant expression of >> type std::size_t and its value shall be greater than zero.""" >> —http://eel.is/c++draft/dcl.array > >Interesting. You're not actually

Re: [PATCH 04/11] UAPI: bcache: Fix use of embedded flexible array

2018-10-09 Thread Jan Engelhardt
On Tuesday 2018-10-09 17:41, David Howells wrote: >Jan Engelhardt wrote: > >> """it [the array size expression] shall be a converted constant expression of >> type std::size_t and its value shall be greater than zero.""" >> —http://eel.is/c++draft/dcl.array > >Interesting. You're not actually

Re: [RFC v5 1/1] ns: add binfmt_misc to the user namespace

2018-10-09 Thread Jann Horn
On Tue, Oct 9, 2018 at 6:45 PM Laurent Vivier wrote: > Le 09/10/2018 à 18:15, Kirill Tkhai a écrit : > > On 09.10.2018 13:37, Laurent Vivier wrote: > >> This patch allows to have a different binfmt_misc configuration > >> for each new user namespace. By default, the binfmt_misc configuration > >>

Re: [RFC v5 1/1] ns: add binfmt_misc to the user namespace

2018-10-09 Thread Jann Horn
On Tue, Oct 9, 2018 at 6:45 PM Laurent Vivier wrote: > Le 09/10/2018 à 18:15, Kirill Tkhai a écrit : > > On 09.10.2018 13:37, Laurent Vivier wrote: > >> This patch allows to have a different binfmt_misc configuration > >> for each new user namespace. By default, the binfmt_misc configuration > >>

Re: [PATCH v2] KVM: LAPIC: Tune lapic_timer_advance_ns automatically

2018-10-09 Thread Paolo Bonzini
On 09/10/2018 03:02, Wanpeng Li wrote: > From: Wanpeng Li > > In cloud environment, lapic_timer_advance_ns is needed to be tuned for every > CPU > generations, and every host kernel versions(the > kvm-unit-tests/tscdeadline_latency.flat > is 5700 cycles for upstream kernel and 9600 cycles

Re: [PATCH v2] KVM: LAPIC: Tune lapic_timer_advance_ns automatically

2018-10-09 Thread Paolo Bonzini
On 09/10/2018 03:02, Wanpeng Li wrote: > From: Wanpeng Li > > In cloud environment, lapic_timer_advance_ns is needed to be tuned for every > CPU > generations, and every host kernel versions(the > kvm-unit-tests/tscdeadline_latency.flat > is 5700 cycles for upstream kernel and 9600 cycles

[PATCH 21/22] KEYS: asym_tpm: Implement tpm_sign [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior Signed-off-by: Denis Kenzior Signed-off-by: David Howells Tested-by: Marcel Holtmann Reviewed-by: Marcel Holtmann --- crypto/asymmetric_keys/asym_tpm.c | 87 + 1 file changed, 87 insertions(+) diff --git

[PATCH 21/22] KEYS: asym_tpm: Implement tpm_sign [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior Signed-off-by: Denis Kenzior Signed-off-by: David Howells Tested-by: Marcel Holtmann Reviewed-by: Marcel Holtmann --- crypto/asymmetric_keys/asym_tpm.c | 87 + 1 file changed, 87 insertions(+) diff --git

[PATCH 22/22] KEYS: asym_tpm: Add support for the sign operation [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior The sign operation can operate in a non-hashed mode by running the RSA sign operation directly on the input. This assumes that the input is less than key_size_in_bytes - 11. Since the TPM performs its own PKCS1 padding, it isn't possible to support 'raw' mode, only 'pkcs1'.

[PATCH 22/22] KEYS: asym_tpm: Add support for the sign operation [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior The sign operation can operate in a non-hashed mode by running the RSA sign operation directly on the input. This assumes that the input is less than key_size_in_bytes - 11. Since the TPM performs its own PKCS1 padding, it isn't possible to support 'raw' mode, only 'pkcs1'.

[PATCH 20/22] KEYS: asym_tpm: Implement signature verification [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior This patch implements the verify_signature operation. The public key portion extracted from the TPM key blob is used. The operation is performed entirely in software using the crypto API. Signed-off-by: Denis Kenzior Signed-off-by: David Howells Tested-by: Marcel

[PATCH 20/22] KEYS: asym_tpm: Implement signature verification [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior This patch implements the verify_signature operation. The public key portion extracted from the TPM key blob is used. The operation is performed entirely in software using the crypto API. Signed-off-by: Denis Kenzior Signed-off-by: David Howells Tested-by: Marcel

[PATCH 19/22] KEYS: asym_tpm: Implement the decrypt operation [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior This patch implements the pkey_decrypt operation using the private key blob. The blob is first loaded into the TPM via tpm_loadkey2. Once the handle is obtained, tpm_unbind operation is used to decrypt the data on the TPM and the result is returned. The key loaded by

[PATCH 19/22] KEYS: asym_tpm: Implement the decrypt operation [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior This patch implements the pkey_decrypt operation using the private key blob. The blob is first loaded into the TPM via tpm_loadkey2. Once the handle is obtained, tpm_unbind operation is used to decrypt the data on the TPM and the result is returned. The key loaded by

[PATCH 17/22] KEYS: asym_tpm: Add loadkey2 and flushspecific [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior This commit adds TPM_LoadKey2 and TPM_FlushSpecific operations. Signed-off-by: Denis Kenzior Signed-off-by: David Howells Reviewed-by: James Morris Tested-by: Marcel Holtmann Reviewed-by: Marcel Holtmann --- crypto/asymmetric_keys/asym_tpm.c | 94

[PATCH 17/22] KEYS: asym_tpm: Add loadkey2 and flushspecific [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior This commit adds TPM_LoadKey2 and TPM_FlushSpecific operations. Signed-off-by: Denis Kenzior Signed-off-by: David Howells Reviewed-by: James Morris Tested-by: Marcel Holtmann Reviewed-by: Marcel Holtmann --- crypto/asymmetric_keys/asym_tpm.c | 94

[PATCH 18/22] KEYS: asym_tpm: Implement tpm_unbind [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior Signed-off-by: Denis Kenzior Reviewed-by: James Morris Signed-off-by: David Howells Tested-by: Marcel Holtmann Reviewed-by: Marcel Holtmann --- crypto/asymmetric_keys/asym_tpm.c | 82 + 1 file changed, 82 insertions(+) diff --git

[PATCH 18/22] KEYS: asym_tpm: Implement tpm_unbind [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior Signed-off-by: Denis Kenzior Reviewed-by: James Morris Signed-off-by: David Howells Tested-by: Marcel Holtmann Reviewed-by: Marcel Holtmann --- crypto/asymmetric_keys/asym_tpm.c | 82 + 1 file changed, 82 insertions(+) diff --git

[PATCH 13/22] KEYS: asym_tpm: Implement pkey_query [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior This commit implements the pkey_query operation. This is accomplished by utilizing the public key portion to obtain max encryption size information for the operations that utilize the public key (encrypt, verify). The private key size extracted from the TPM_Key data

[PATCH 16/22] KEYS: Move trusted.h to include/keys [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior Signed-off-by: Denis Kenzior Signed-off-by: David Howells Tested-by: Marcel Holtmann Reviewed-by: Marcel Holtmann --- include/keys/trusted.h | 136 +++ security/keys/trusted.c |2 - security/keys/trusted.h | 136

[PATCH 13/22] KEYS: asym_tpm: Implement pkey_query [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior This commit implements the pkey_query operation. This is accomplished by utilizing the public key portion to obtain max encryption size information for the operations that utilize the public key (encrypt, verify). The private key size extracted from the TPM_Key data

[PATCH 16/22] KEYS: Move trusted.h to include/keys [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior Signed-off-by: Denis Kenzior Signed-off-by: David Howells Tested-by: Marcel Holtmann Reviewed-by: Marcel Holtmann --- include/keys/trusted.h | 136 +++ security/keys/trusted.c |2 - security/keys/trusted.h | 136

[PATCH 15/22] KEYS: trusted: Expose common functionality [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior This patch exposes some common functionality needed to send TPM commands. Several functions from keys/trusted.c are exposed for use by the new tpm key subtype and a module dependency is introduced. In the future, common functionality between the trusted key type and the

[PATCH 15/22] KEYS: trusted: Expose common functionality [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior This patch exposes some common functionality needed to send TPM commands. Several functions from keys/trusted.c are exposed for use by the new tpm key subtype and a module dependency is introduced. In the future, common functionality between the trusted key type and the

[PATCH 14/22] KEYS: asym_tpm: Implement encryption operation [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior This patch impelements the pkey_encrypt operation. The public key portion extracted from the TPM key blob is used. The operation is performed entirely in software using the crypto API. Signed-off-by: Denis Kenzior Signed-off-by: David Howells Tested-by: Marcel Holtmann

[PATCH 10/22] KEYS: asym_tpm: add skeleton for asym_tpm [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior This patch adds the basic skeleton for the asym_tpm asymmetric key subtype. Signed-off-by: Denis Kenzior Signed-off-by: David Howells Tested-by: Marcel Holtmann Reviewed-by: Marcel Holtmann --- crypto/asymmetric_keys/Kconfig| 11 +

[PATCH 09/22] crypto: rsa-pkcs1pad: Allow hash to be optional [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior The original pkcs1pad implementation allowed to pad/unpad raw RSA output. However, this has been taken out in commit: commit c0d20d22e0ad ("crypto: rsa-pkcs1pad - Require hash to be present") This patch restored this ability as it is needed by the asymmetric key

[PATCH 14/22] KEYS: asym_tpm: Implement encryption operation [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior This patch impelements the pkey_encrypt operation. The public key portion extracted from the TPM key blob is used. The operation is performed entirely in software using the crypto API. Signed-off-by: Denis Kenzior Signed-off-by: David Howells Tested-by: Marcel Holtmann

[PATCH 10/22] KEYS: asym_tpm: add skeleton for asym_tpm [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior This patch adds the basic skeleton for the asym_tpm asymmetric key subtype. Signed-off-by: Denis Kenzior Signed-off-by: David Howells Tested-by: Marcel Holtmann Reviewed-by: Marcel Holtmann --- crypto/asymmetric_keys/Kconfig| 11 +

[PATCH 09/22] crypto: rsa-pkcs1pad: Allow hash to be optional [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior The original pkcs1pad implementation allowed to pad/unpad raw RSA output. However, this has been taken out in commit: commit c0d20d22e0ad ("crypto: rsa-pkcs1pad - Require hash to be present") This patch restored this ability as it is needed by the asymmetric key

[PATCH 12/22] KEYS: Add parser for TPM-based keys [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior For TPM based keys, the only standard seems to be described here: http://david.woodhou.se/draft-woodhouse-cert-best-practice.html#rfc.section.4.4 Quote from the relevant section: "Rather, a common form of storage for "wrapped" keys is to encode the binary TCPA_KEY structure

[PATCH 12/22] KEYS: Add parser for TPM-based keys [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior For TPM based keys, the only standard seems to be described here: http://david.woodhou.se/draft-woodhouse-cert-best-practice.html#rfc.section.4.4 Quote from the relevant section: "Rather, a common form of storage for "wrapped" keys is to encode the binary TCPA_KEY structure

[PATCH 11/22] KEYS: asym_tpm: extract key size & public key [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior The parsed BER/DER blob obtained from user space contains a TPM_Key structure. This structure has some information about the key as well as the public key portion. This patch extracts this information for future use. Signed-off-by: Denis Kenzior Signed-off-by: David

[PATCH 11/22] KEYS: asym_tpm: extract key size & public key [ver #2]

2018-10-09 Thread David Howells
From: Denis Kenzior The parsed BER/DER blob obtained from user space contains a TPM_Key structure. This structure has some information about the key as well as the public key portion. This patch extracts this information for future use. Signed-off-by: Denis Kenzior Signed-off-by: David

Re: perf report segfault

2018-10-09 Thread Jiri Olsa
On Tue, Oct 09, 2018 at 11:27:04AM -0500, Anthony LaTorre wrote: > Hi, > > I'm currently running Linux kernel 4.18.10-100.fc27.x86_64 and have a > problem profiling a program that used to work. Currently when I > profile the program with the following command: > > $ perf record -F 99 -p PID

Re: perf report segfault

2018-10-09 Thread Jiri Olsa
On Tue, Oct 09, 2018 at 11:27:04AM -0500, Anthony LaTorre wrote: > Hi, > > I'm currently running Linux kernel 4.18.10-100.fc27.x86_64 and have a > problem profiling a program that used to work. Currently when I > profile the program with the following command: > > $ perf record -F 99 -p PID

[PATCH 07/22] KEYS: Implement encrypt, decrypt and sign for software asymmetric key [ver #2]

2018-10-09 Thread David Howells
Implement the encrypt, decrypt and sign operations for the software asymmetric key subtype. This mostly involves offloading the call to the crypto layer. Note that the decrypt and sign operations require a private key to be supplied. Encrypt (and also verify) will work with either a public or a

[PATCH 08/22] KEYS: Implement PKCS#8 RSA Private Key parser [ver #2]

2018-10-09 Thread David Howells
Implement PKCS#8 RSA Private Key format [RFC 5208] parser for the asymmetric key type. For the moment, this will only support unencrypted DER blobs. PEM and decryption can be added later. PKCS#8 keys can be loaded like this: openssl pkcs8 -in private_key.pem -topk8 -nocrypt -outform

[PATCH 07/22] KEYS: Implement encrypt, decrypt and sign for software asymmetric key [ver #2]

2018-10-09 Thread David Howells
Implement the encrypt, decrypt and sign operations for the software asymmetric key subtype. This mostly involves offloading the call to the crypto layer. Note that the decrypt and sign operations require a private key to be supplied. Encrypt (and also verify) will work with either a public or a

[PATCH 08/22] KEYS: Implement PKCS#8 RSA Private Key parser [ver #2]

2018-10-09 Thread David Howells
Implement PKCS#8 RSA Private Key format [RFC 5208] parser for the asymmetric key type. For the moment, this will only support unencrypted DER blobs. PEM and decryption can be added later. PKCS#8 keys can be loaded like this: openssl pkcs8 -in private_key.pem -topk8 -nocrypt -outform

[PATCH 06/22] KEYS: Allow the public_key struct to hold a private key [ver #2]

2018-10-09 Thread David Howells
Put a flag in the public_key struct to indicate if the structure is holding a private key. The private key must be held ASN.1 encoded in the format specified in RFC 3447 A.1.2. This is the form required by crypto/rsa.c. The software encryption subtype's verification and query functions then

[PATCH 06/22] KEYS: Allow the public_key struct to hold a private key [ver #2]

2018-10-09 Thread David Howells
Put a flag in the public_key struct to indicate if the structure is holding a private key. The private key must be held ASN.1 encoded in the format specified in RFC 3447 A.1.2. This is the form required by crypto/rsa.c. The software encryption subtype's verification and query functions then

[PATCH 05/22] KEYS: Provide software public key query function [ver #2]

2018-10-09 Thread David Howells
Provide a query function for the software public key implementation. This permits information about such a key to be obtained using query_asymmetric_key() or KEYCTL_PKEY_QUERY. Signed-off-by: David Howells Tested-by: Marcel Holtmann Reviewed-by: Marcel Holtmann Reviewed-by: Denis Kenzior

[PATCH 05/22] KEYS: Provide software public key query function [ver #2]

2018-10-09 Thread David Howells
Provide a query function for the software public key implementation. This permits information about such a key to be obtained using query_asymmetric_key() or KEYCTL_PKEY_QUERY. Signed-off-by: David Howells Tested-by: Marcel Holtmann Reviewed-by: Marcel Holtmann Reviewed-by: Denis Kenzior

[PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops [ver #2]

2018-10-09 Thread David Howells
https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git/tag/?h=keys-asym-keyctl-20181009 and also on a branch here: http://git.kernel.org/cgit/linux/kernel/git/dhowells/linux-fs.git/log/?h=keys-asym-keyctl The keyutils changes needed can be found here: http://gi

[PATCH 03/22] KEYS: Provide missing asymmetric key subops for new key type ops [ver #2]

2018-10-09 Thread David Howells
Provide the missing asymmetric key subops for new key type ops. This include query, encrypt, decrypt and create signature. Verify signature already exists. Also provided are accessor functions for this: int query_asymmetric_key(const struct key *key,

[PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops [ver #2]

2018-10-09 Thread David Howells
https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git/tag/?h=keys-asym-keyctl-20181009 and also on a branch here: http://git.kernel.org/cgit/linux/kernel/git/dhowells/linux-fs.git/log/?h=keys-asym-keyctl The keyutils changes needed can be found here: http://gi

[PATCH 03/22] KEYS: Provide missing asymmetric key subops for new key type ops [ver #2]

2018-10-09 Thread David Howells
Provide the missing asymmetric key subops for new key type ops. This include query, encrypt, decrypt and create signature. Verify signature already exists. Also provided are accessor functions for this: int query_asymmetric_key(const struct key *key,

[PATCH 01/22] KEYS: Provide key type operations for asymmetric key ops [ver #2]

2018-10-09 Thread David Howells
Provide five new operations in the key_type struct that can be used to provide access to asymmetric key operations. These will be implemented for the asymmetric key type in a later patch and may refer to a key retained in RAM by the kernel or a key retained in crypto hardware. int

[PATCH 04/22] KEYS: Make the X.509 and PKCS7 parsers supply the sig encoding type [ver #2]

2018-10-09 Thread David Howells
Make the X.509 and PKCS7 parsers fill in the signature encoding type field recently added to the public_key_signature struct. Signed-off-by: David Howells Tested-by: Marcel Holtmann Reviewed-by: Marcel Holtmann Reviewed-by: Denis Kenzior Tested-by: Denis Kenzior ---

[PATCH 01/22] KEYS: Provide key type operations for asymmetric key ops [ver #2]

2018-10-09 Thread David Howells
Provide five new operations in the key_type struct that can be used to provide access to asymmetric key operations. These will be implemented for the asymmetric key type in a later patch and may refer to a key retained in RAM by the kernel or a key retained in crypto hardware. int

[PATCH 04/22] KEYS: Make the X.509 and PKCS7 parsers supply the sig encoding type [ver #2]

2018-10-09 Thread David Howells
Make the X.509 and PKCS7 parsers fill in the signature encoding type field recently added to the public_key_signature struct. Signed-off-by: David Howells Tested-by: Marcel Holtmann Reviewed-by: Marcel Holtmann Reviewed-by: Denis Kenzior Tested-by: Denis Kenzior ---

Re: [PATCH v3 3/3] namei: aggressively check for nd->root escape on ".." resolution

2018-10-09 Thread Jann Horn
On Tue, Oct 9, 2018 at 5:36 PM Aleksa Sarai wrote: > On 2018-10-09, 'Jann Horn' via dev wrote: > > On Tue, Oct 9, 2018 at 9:03 AM Aleksa Sarai wrote: > > > This patch allows for AT_BENEATH and AT_THIS_ROOT to safely permit ".." > > > resolution (in the case of AT_BENEATH the resolution will

[PATCH 02/22] KEYS: Provide keyctls to drive the new key type ops for asymmetric keys [ver #2]

2018-10-09 Thread David Howells
Provide five keyctl functions that permit userspace to make use of the new key type ops for accessing and driving asymmetric keys. (*) Query an asymmetric key. long keyctl(KEYCTL_PKEY_QUERY, key_serial_t key, unsigned long reserved, struct

Re: [PATCH v3 3/3] namei: aggressively check for nd->root escape on ".." resolution

2018-10-09 Thread Jann Horn
On Tue, Oct 9, 2018 at 5:36 PM Aleksa Sarai wrote: > On 2018-10-09, 'Jann Horn' via dev wrote: > > On Tue, Oct 9, 2018 at 9:03 AM Aleksa Sarai wrote: > > > This patch allows for AT_BENEATH and AT_THIS_ROOT to safely permit ".." > > > resolution (in the case of AT_BENEATH the resolution will

[PATCH 02/22] KEYS: Provide keyctls to drive the new key type ops for asymmetric keys [ver #2]

2018-10-09 Thread David Howells
Provide five keyctl functions that permit userspace to make use of the new key type ops for accessing and driving asymmetric keys. (*) Query an asymmetric key. long keyctl(KEYCTL_PKEY_QUERY, key_serial_t key, unsigned long reserved, struct

Re: [RFC v5 1/1] ns: add binfmt_misc to the user namespace

2018-10-09 Thread Laurent Vivier
Le 09/10/2018 à 18:15, Kirill Tkhai a écrit : > On 09.10.2018 13:37, Laurent Vivier wrote: >> This patch allows to have a different binfmt_misc configuration >> for each new user namespace. By default, the binfmt_misc configuration >> is the one of the previous level, but if the binfmt_misc

Re: [RFC v5 1/1] ns: add binfmt_misc to the user namespace

2018-10-09 Thread Laurent Vivier
Le 09/10/2018 à 18:15, Kirill Tkhai a écrit : > On 09.10.2018 13:37, Laurent Vivier wrote: >> This patch allows to have a different binfmt_misc configuration >> for each new user namespace. By default, the binfmt_misc configuration >> is the one of the previous level, but if the binfmt_misc

Re: [PATCH 3/5] spi: pxa2xx: use an enum for type

2018-10-09 Thread Lubomir Rintel
On Fri, 2018-09-21 at 22:34 +0200, Robert Jarzmik wrote: > Lubomir Rintel writes: > > > That seems to be the correct type. > Okay, but what happens here when adev_id->driver_data is a value out > of enum > range ? Does the following assignment make sense ? > > + type = (enum

Re: [PATCH 3/5] spi: pxa2xx: use an enum for type

2018-10-09 Thread Lubomir Rintel
On Fri, 2018-09-21 at 22:34 +0200, Robert Jarzmik wrote: > Lubomir Rintel writes: > > > That seems to be the correct type. > Okay, but what happens here when adev_id->driver_data is a value out > of enum > range ? Does the following assignment make sense ? > > + type = (enum

Re: [PATCH v2 02/11] arch/x86: Rename the RDT functions and definitions

2018-10-09 Thread Reinette Chatre
Hi Babu, On 10/5/2018 1:55 PM, Moger, Babu wrote: > As AMD is starting to support RDT(or QOS) features, rename > the RDT functions and definitions to more generic names. I have the same comment here. If the goal is to start with the renaming to generic names then could you please use the

Re: [PATCH v2 02/11] arch/x86: Rename the RDT functions and definitions

2018-10-09 Thread Reinette Chatre
Hi Babu, On 10/5/2018 1:55 PM, Moger, Babu wrote: > As AMD is starting to support RDT(or QOS) features, rename > the RDT functions and definitions to more generic names. I have the same comment here. If the goal is to start with the renaming to generic names then could you please use the

[PATCH] KVM: x86: support CONFIG_KVM_AMD=y with CONFIG_CRYPTO_DEV_CCP_DD=m

2018-10-09 Thread Paolo Bonzini
SEV requires access to the AMD cryptographic device APIs, and this does not work when KVM is builtin and the crypto driver is a module. Actually the Kconfig conditions for CONFIG_KVM_AMD_SEV try to disable SEV in that case, but it does not work because the actual crypto calls are not culled, only

[PATCH] KVM: x86: support CONFIG_KVM_AMD=y with CONFIG_CRYPTO_DEV_CCP_DD=m

2018-10-09 Thread Paolo Bonzini
SEV requires access to the AMD cryptographic device APIs, and this does not work when KVM is builtin and the crypto driver is a module. Actually the Kconfig conditions for CONFIG_KVM_AMD_SEV try to disable SEV in that case, but it does not work because the actual crypto calls are not culled, only

Re: [PATCH v2 01/11] arch/x86: Start renaming the rdt files to more generic names

2018-10-09 Thread Reinette Chatre
Hi Babu, On 10/5/2018 1:55 PM, Moger, Babu wrote: > New generation of AMD processors start support RDT(or QOS) features. > With more than one vendors supporting these features, it seems more > appropriate to rename these files. > > Signed-off-by: Babu Moger > --- >

Re: [PATCH v2 01/11] arch/x86: Start renaming the rdt files to more generic names

2018-10-09 Thread Reinette Chatre
Hi Babu, On 10/5/2018 1:55 PM, Moger, Babu wrote: > New generation of AMD processors start support RDT(or QOS) features. > With more than one vendors supporting these features, it seems more > appropriate to rename these files. > > Signed-off-by: Babu Moger > --- >

Re: [PATCH v2] arm64: dts: qcom: sdm845: Add qspi (quad SPI) node

2018-10-09 Thread kbuild test robot
-Anderson/arm64-dts-qcom-sdm845-Add-qspi-quad-SPI-node/20181009-095328 base: https://git.kernel.org/pub/scm/linux/kernel/git/agross/linux.git for-next config: arm64-defconfig (attached as .config) compiler: aarch64-linux-gnu-gcc (Debian 7.2.0-11) 7.2.0 reproduce: wget https

Re: [PATCH v2] arm64: dts: qcom: sdm845: Add qspi (quad SPI) node

2018-10-09 Thread kbuild test robot
-Anderson/arm64-dts-qcom-sdm845-Add-qspi-quad-SPI-node/20181009-095328 base: https://git.kernel.org/pub/scm/linux/kernel/git/agross/linux.git for-next config: arm64-defconfig (attached as .config) compiler: aarch64-linux-gnu-gcc (Debian 7.2.0-11) 7.2.0 reproduce: wget https

Inquiry 09-10-2018

2018-10-09 Thread Daniel Murray
Hi,friend, This is Daniel Murray and i am from Sinara Group Co.Ltd Group Co.,LTD in Russia. We are glad to know about your company from the web and we are interested in your products. Could you kindly send us your Latest catalog and price list for our trial order. Best Regards, Daniel Murray

Inquiry 09-10-2018

2018-10-09 Thread Daniel Murray
Hi,friend, This is Daniel Murray and i am from Sinara Group Co.Ltd Group Co.,LTD in Russia. We are glad to know about your company from the web and we are interested in your products. Could you kindly send us your Latest catalog and price list for our trial order. Best Regards, Daniel Murray

[PATCH rdma-next 03/18] RDMA/cxgb3: Initialize ib_device_ops struct

2018-10-09 Thread Kamal Heib
Initialize ib_device_ops with the supported operations. Signed-off-by: Kamal Heib --- drivers/infiniband/hw/cxgb3/iwch_provider.c | 34 + 1 file changed, 34 insertions(+) diff --git a/drivers/infiniband/hw/cxgb3/iwch_provider.c

[PATCH rdma-next 03/18] RDMA/cxgb3: Initialize ib_device_ops struct

2018-10-09 Thread Kamal Heib
Initialize ib_device_ops with the supported operations. Signed-off-by: Kamal Heib --- drivers/infiniband/hw/cxgb3/iwch_provider.c | 34 + 1 file changed, 34 insertions(+) diff --git a/drivers/infiniband/hw/cxgb3/iwch_provider.c

[PATCH rdma-next 02/18] RDMA/bnxt_re: Initialize ib_device_ops struct

2018-10-09 Thread Kamal Heib
Initialize ib_device_ops with the supported operations. Signed-off-by: Kamal Heib --- drivers/infiniband/hw/bnxt_re/main.c | 45 1 file changed, 45 insertions(+) diff --git a/drivers/infiniband/hw/bnxt_re/main.c b/drivers/infiniband/hw/bnxt_re/main.c index

[PATCH rdma-next 02/18] RDMA/bnxt_re: Initialize ib_device_ops struct

2018-10-09 Thread Kamal Heib
Initialize ib_device_ops with the supported operations. Signed-off-by: Kamal Heib --- drivers/infiniband/hw/bnxt_re/main.c | 45 1 file changed, 45 insertions(+) diff --git a/drivers/infiniband/hw/bnxt_re/main.c b/drivers/infiniband/hw/bnxt_re/main.c index

[PATCH rdma-next 04/18] RDMA/cxgb4: Initialize ib_device_ops struct

2018-10-09 Thread Kamal Heib
Initialize ib_device_ops with the supported operations. Signed-off-by: Kamal Heib --- drivers/infiniband/hw/cxgb4/provider.c | 39 ++ 1 file changed, 39 insertions(+) diff --git a/drivers/infiniband/hw/cxgb4/provider.c b/drivers/infiniband/hw/cxgb4/provider.c

[PATCH rdma-next 06/18] RDMA/hns: Initialize ib_device_ops struct

2018-10-09 Thread Kamal Heib
Initialize ib_device_ops with the supported operations. Signed-off-by: Kamal Heib --- drivers/infiniband/hw/hns/hns_roce_device.h | 1 + drivers/infiniband/hw/hns/hns_roce_hw_v1.c | 11 drivers/infiniband/hw/hns/hns_roce_hw_v2.c | 11

[PATCH rdma-next 04/18] RDMA/cxgb4: Initialize ib_device_ops struct

2018-10-09 Thread Kamal Heib
Initialize ib_device_ops with the supported operations. Signed-off-by: Kamal Heib --- drivers/infiniband/hw/cxgb4/provider.c | 39 ++ 1 file changed, 39 insertions(+) diff --git a/drivers/infiniband/hw/cxgb4/provider.c b/drivers/infiniband/hw/cxgb4/provider.c

[PATCH rdma-next 06/18] RDMA/hns: Initialize ib_device_ops struct

2018-10-09 Thread Kamal Heib
Initialize ib_device_ops with the supported operations. Signed-off-by: Kamal Heib --- drivers/infiniband/hw/hns/hns_roce_device.h | 1 + drivers/infiniband/hw/hns/hns_roce_hw_v1.c | 11 drivers/infiniband/hw/hns/hns_roce_hw_v2.c | 11

<    1   2   3   4   5   6   7   8   9   10   >