[tip: irq/core] irqchip/gic-v3: Fix missing "__init" for gic_smp_init()

2020-05-30 Thread tip-bot2 for Ingo Rohloff
The following commit has been merged into the irq/core branch of tip: Commit-ID: 8a94c1ab34d53476617f83610521cfb6674db8d4 Gitweb: https://git.kernel.org/tip/8a94c1ab34d53476617f83610521cfb6674db8d4 Author:Ingo Rohloff AuthorDate:Wed, 22 Apr 2020 13:28:57 +02:00 Committer

Re: Loop encryption module locking bug (linux-2.4.5).

2001-06-22 Thread Ingo Rohloff
> > Locking twice? But what happens if some program calls loop_set_status more > > than once? Losetup doesn't, but if such program exists, locking is still > > screwed. > > No, it calls loop_release_xfer always before init_xfer, which will release > the "permanent" use count. Calling lock twice

Re: Loop encryption module locking bug (linux-2.4.5).

2001-06-22 Thread Ingo Rohloff
Locking twice? But what happens if some program calls loop_set_status more than once? Losetup doesn't, but if such program exists, locking is still screwed. No, it calls loop_release_xfer always before init_xfer, which will release the permanent use count. Calling lock twice in

Loop encryption module locking bug (linux-2.4.5).

2001-06-21 Thread Ingo Rohloff
Hi, There is a bug in the locking scheme for the encryption functions, which can be hooked into the loop device. I have a patch which resolves the problem. First what happens: If you do (for example) a losetup -e twofish /dev/loop0 test.lop the following happens: The loop0 device gets opened

Loop encryption module locking bug (linux-2.4.5).

2001-06-21 Thread Ingo Rohloff
Hi, There is a bug in the locking scheme for the encryption functions, which can be hooked into the loop device. I have a patch which resolves the problem. First what happens: If you do (for example) a losetup -e twofish /dev/loop0 test.lop the following happens: The loop0 device gets opened

DMA Speed Select Problem (a bug ?)

2001-03-15 Thread Ingo Rohloff
n probably not ... so long Ingo Rohloff PS: Burning a CD was only one trigger for the problem. In fact accessing my CDBurner in any way (like mounting a CD, or reading from it) will lock up my whole computer, as long as "hdparm -d1 -X34" isn't called. It also doesn't

DMA Speed Select Problem (a bug ?)

2001-03-15 Thread Ingo Rohloff
n probably not ... so long Ingo Rohloff PS: Burning a CD was only one trigger for the problem. In fact accessing my CDBurner in any way (like mounting a CD, or reading from it) will lock up my whole computer, as long as "hdparm -d1 -X34" isn't called. It also doesn't

A way to crash an 2.4-test11 kernel

2000-12-18 Thread Ingo Rohloff
Hi, I found a way to crash an SMP 2.4-test11 kernel: 1. Create a BIG file (lets say about 300-400 MByte) 2. use losetup and the loop device to create an ext2 filesystem within the file 3. mount the file 4. copy huge amounts of data into the file. (for example copy your /usr directory into

A way to crash an 2.4-test11 kernel

2000-12-18 Thread Ingo Rohloff
Hi, I found a way to crash an SMP 2.4-test11 kernel: 1. Create a BIG file (lets say about 300-400 MByte) 2. use losetup and the loop device to create an ext2 filesystem within the file 3. mount the file 4. copy huge amounts of data into the file. (for example copy your /usr directory into

Re: Problems with NFS in 2.4test10

2000-11-11 Thread Ingo Rohloff
> Ingo, do you have a BP6? Make sure you have the latest BIOS for your > motherboard, there have been many BIOS updates for some dual-Celeron > motherboards. I have to admit that I'm not sure what kind of dual board I got (i have to have a closer look). The reason is that this board is

Re: Problems with NFS in 2.4test10

2000-11-11 Thread Ingo Rohloff
Ingo, do you have a BP6? Make sure you have the latest BIOS for your motherboard, there have been many BIOS updates for some dual-Celeron motherboards. I have to admit that I'm not sure what kind of dual board I got (i have to have a closer look). The reason is that this board is orgiginally

Problems with NFS in 2.4test10

2000-11-09 Thread Ingo Rohloff
Hi, First a description of my machine: I use a Dual Celeron System with glibc-2.1.3 and linux-2.4test10 . For information on peripherial devices I give the output of /proc/pci PCI devices found: Bus 0, device 0, function 0: Host bridge: Intel Corporation 440BX/ZX - 82443BX/ZX Host

Problems with NFS in 2.4test10

2000-11-09 Thread Ingo Rohloff
Hi, First a description of my machine: I use a Dual Celeron System with glibc-2.1.3 and linux-2.4test10 . For information on peripherial devices I give the output of /proc/pci PCI devices found: Bus 0, device 0, function 0: Host bridge: Intel Corporation 440BX/ZX - 82443BX/ZX Host

Re: A patch to loop.c for better cryption support

2000-10-16 Thread Ingo Rohloff
> > > > IV generation is what I am worried about. > > > There is a paper about why it is a bad idea to use > > > sequence numbers for CBC IV's. I just have to find the reference to it. > > Does this mean sequence as in 0,1,2,3,4 ... or does this mean > > any pre-calculate-able sequence ? In the

Re: A patch to loop.c for better cryption support

2000-10-14 Thread Ingo Rohloff
Reed Petty wrote: > Caution is advised when depending upon crypto systems that use relative > block numbers as IV. The security may not be a strong as hoped. > There are some who believe that "not unique" IVs (across multiple > filesystems) facilitates some methods of cryptanalysis. ... Ahh

Re: A patch to loop.c for better cryption support

2000-10-14 Thread Ingo Rohloff
> So, the only provision that needs to be made to ensure backwards > compatibility (both with the kerneli patch and other modules that still > use absolute block numbers) is a way to switch between the new approach > and the old, defaulting to the new. The easiest way to do this, IMO, is > to

Re: A patch to loop.c for better cryption support

2000-10-14 Thread Ingo Rohloff
> BTW, kerneli would also not handle the case of switching block sizes anyways, > with relative IVs or not, because it does not restart its CFB chain inside > the device blocks every 512 byte blocks with a new IV. My (inofficial) patch set for twofish and blowfish does though :-). I'm not sure

Re: A patch to loop.c for better cryption support

2000-10-14 Thread Ingo Rohloff
> _I_ can use my approach, but not yours, to bring my already existing > crypted fs into the new state. The losetup option to set the encryption > chunk size is used only once for each fs, but at that one time you can > do: Ok, I understand what you mean. > Q> losetup -e blowfish

Re: A patch to loop.c for better cryption support

2000-10-14 Thread Ingo Rohloff
Ian Sterling wrote: > But, it seems to me that being able to have a different IV for > each filesystem would be a good thing, but having it depend on something > as volatile as sector of the disk, seems bad. It's not the sector of the _disk_. It's the requested sector of the loop device. The

Re: A patch to loop.c for better cryption support

2000-10-14 Thread Ingo Rohloff
_I_ can use my approach, but not yours, to bring my already existing crypted fs into the new state. The losetup option to set the encryption chunk size is used only once for each fs, but at that one time you can do: Ok, I understand what you mean. Q losetup -e blowfish --use-fs-blocksize \

Re: A patch to loop.c for better cryption support

2000-10-14 Thread Ingo Rohloff
BTW, kerneli would also not handle the case of switching block sizes anyways, with relative IVs or not, because it does not restart its CFB chain inside the device blocks every 512 byte blocks with a new IV. My (inofficial) patch set for twofish and blowfish does though :-). I'm not sure if

Re: A patch to loop.c for better cryption support

2000-10-14 Thread Ingo Rohloff
So, the only provision that needs to be made to ensure backwards compatibility (both with the kerneli patch and other modules that still use absolute block numbers) is a way to switch between the new approach and the old, defaulting to the new. The easiest way to do this, IMO, is to allocate

Re: A patch to loop.c for better cryption support

2000-10-14 Thread Ingo Rohloff
Reed Petty wrote: Caution is advised when depending upon crypto systems that use relative block numbers as IV. The security may not be a strong as hoped. There are some who believe that "not unique" IVs (across multiple filesystems) facilitates some methods of cryptanalysis. ... Ahh

Re: A patch to loop.c for better cryption support

2000-10-12 Thread Ingo Rohloff
Hi again, Marc Mutz wrote: > > The loop device supports different IVs; > > the IVs are initilized with the requested block > > number. > > I believe a better way is to use the requested > > sector number from CURRENT->sector. > > Using this value should make the encryption and decryption > >

Re: A patch to loop.c for better cryption support

2000-10-12 Thread Ingo Rohloff
Hi again, Marc Mutz wrote: The loop device supports different IVs; the IVs are initilized with the requested block number. I believe a better way is to use the requested sector number from CURRENT-sector. Using this value should make the encryption and decryption process

A patch to loop.c for better cryption support

2000-10-10 Thread Ingo Rohloff
Hi, First some explanation. Most cryption algorithms initialize the cryption process with some init values, called IV (by me :-). This means that two identical clear messages will give different encrypted messages, if different IVs are used. The loop device supports different IVs; the IVs are

A patch to loop.c for better cryption support

2000-10-10 Thread Ingo Rohloff
Hi, First some explanation. Most cryption algorithms initialize the cryption process with some init values, called IV (by me :-). This means that two identical clear messages will give different encrypted messages, if different IVs are used. The loop device supports different IVs; the IVs are