On 09:49 Fri 13 Sep , Boris BREZILLON wrote:
> Reset caller's config variable before setting current config flags to avoid
> erronous config return.
>
> DEBOUNCE and DEGLITCH options are mutually exclusive. Return an error if they
> are both defined in the config.
> Do not call set_deglitch if
On 09/13, Steve Grubb wrote:
>
> On Tuesday, September 10, 2013 07:20:33 PM Oleg Nesterov wrote:
> >
> > So, Steve, do you still think that patch was wrong? Attached below
> > just in case.
>
> I think this looks OK. If the task filter NACK's auditing the process, then
> clearing the flag is probab
Hi Guenter,
On Mon, 02 Sep 2013 12:25:35 -0700, Guenter Roeck wrote:
> On 08/31/2013 07:48 PM, Guenter Roeck wrote:
> > This patch series introduces new hwmon API functions
> > hwmon_device_register_with_groups() and
> > devm_hwmon_device_register_with_groups().
> >
> > hwmon_device_register_with
On 9/9/13 9:03 AM, David Ahern wrote:
I have a flight recorder style command that address this problem
(long-running/daemons) by processing task events and then stashing
the sample events on a time-ordered list with chopping to maintain
the time window.
so far I noticed there could be race amon
On Sun, 25 Aug 2013, Sergei Shtylyov wrote:
> From: Max Filippov
>
> Add support for HPB-DMAC found in Renesas R-Car SoCs, using 'shdma-base' DMA
> driver framework.
>
> Based on the original patch by Phil Edworthy .
>
> Signed-off-by: Max Filippov
> [Sergei: removed useless #include, sorted
On Sat, Sep 14, 2013 at 01:28:34PM +0200, Jochen Striepe wrote:
> Hello again,
>
> On Mon, Sep 09, 2013 at 03:27:51PM -0700, Paul E. McKenney wrote:
> > Several people helped track down another source of spurious stall
> > warnings on large systems, please see below for the patch.
> [...]
>
On Sat, Sep 14, 2013 at 05:03:20PM +0400, Kirill Tkhai wrote:
> When a system has a sparse cpumask and CONFIG_RCU_NOCB_CPU_ALL is enabled,
> rcu_spawn_nocb_kthreads() creates nocb threads for nonexistent CPUS.
>
> The problem is in rcu_bootup_announce_oddness(). cpumask_setall() sets all
> bits fr
On Sat, Sep 14, 2013 at 8:39 AM, Vladimir Davydov
wrote:
> Patch a003a2 (sched: Consider runnable load average in move_tasks())
> sets all top-level cfs_rqs' h_load to rq->avg.load_avg_contrib, which is
> always 0. This mistype leads to all tasks having weight 0 when load
> balancing in a cpu-cgro
Hello.
On 09/14/2013 10:33 PM, Guennadi Liakhovetski wrote:
From: Max Filippov
Add support for HPB-DMAC found in Renesas R-Car SoCs, using 'shdma-base' DMA
driver framework.
Based on the original patch by Phil Edworthy .
Signed-off-by: Max Filippov
[Sergei: removed useless #include,
On 09/14/2013 11:31 AM, Jean Delvare wrote:
Hi Guenter,
On Mon, 02 Sep 2013 12:25:35 -0700, Guenter Roeck wrote:
On 08/31/2013 07:48 PM, Guenter Roeck wrote:
This patch series introduces new hwmon API functions
hwmon_device_register_with_groups() and
devm_hwmon_device_register_with_groups().
Hello.
On 09/14/2013 12:03 PM, Dong Zhu wrote:
This patch add a method into testptp.c to measure the time offset
between phc and system clock through the ioctl PTP_SYS_OFFSET.
Signed-off-by: Dong Zhu
---
Documentation/ptp/testptp.c | 40 ++--
1 file ch
Hi,
Here is my timekeeper latch synchronization series update, still as RFC.
It now passes the timetests provided by John Stultz
(https://github.com/johnstultz-work/timetests.git). See the changelog of
"Introduce timekeeper latch synchronization" to get a clear picture of
all the goodness introduc
Unlike the sequence lock, this latch synchronization scheme, proposed by
Peter Zijlstra, always keeps a readable copy of the data. Therefore,
readers will never deadlock if they nest on the writer, whether this
happens because the read-side is explicitly called within the write-side
critical sectio
Signed-off-by: Mathieu Desnoyers
Cc: John Stultz
Cc: Thomas Gleixner
Cc: Peter Zijlstra
---
include/linux/timekeeper_internal.h | 31
kernel/time/ntp.c | 134 +++
2 files changed, 87 insertions(+), 78 deletions(-)
diff --git a/incl
This is in preparation for the latch synchronization scheme.
Signed-off-by: Mathieu Desnoyers
Cc: John Stultz
Cc: Thomas Gleixner
Cc: Peter Zijlstra
---
kernel/time/ntp.c | 472 ++--
kernel/time/ntp_internal.h | 16 +-
kernel/time/timekeepin
This is in preparation for the latch synchronization scheme.
Signed-off-by: Mathieu Desnoyers
Cc: John Stultz
Cc: Thomas Gleixner
Cc: Peter Zijlstra
---
include/linux/timekeeper_internal.h |4 +
kernel/time/ntp.c | 361 +--
kernel/time/ti
Signed-off-by: Mathieu Desnoyers
Cc: John Stultz
Cc: Thomas Gleixner
Cc: Peter Zijlstra
---
include/linux/timekeeper_internal.h | 47 ++
kernel/time/ntp.c | 318 +++
2 files changed, 187 insertions(+), 178 deletions(-)
diff --git a/incl
Add latch for data used by clock read operations. This is in preparation
for the clock latch synchronization scheme. "cycle_last" rely on
timekeeper seqlock synchronization, and will therefore need to be
latched.
Add:
- cycle_last_latch (array of 2 elements),
- read_latch(),
- update_latch().
Sig
Signed-off-by: Mathieu Desnoyers
Cc: John Stultz
Cc: Thomas Gleixner
Cc: Peter Zijlstra
---
arch/x86/kernel/tsc.c | 22 +-
1 file changed, 21 insertions(+), 1 deletion(-)
diff --git a/arch/x86/kernel/tsc.c b/arch/x86/kernel/tsc.c
index 6ff4924..c75e9f9 100644
--- a/arch/
Signed-off-by: Antonio Alecrim Jr
---
drivers/isdn/hardware/mISDN/hfcpci.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/isdn/hardware/mISDN/hfcpci.c
b/drivers/isdn/hardware/mISDN/hfcpci.c
index 7f910c7..3c92780 100644
--- a/drivers/isdn/hardware/mISDN/hfcpci.c
Hello,
this is an attempt to support ES938 3-D Audio Effects Processor found on some
ES18xx (and possibly other) sound cards, doing bass/treble and 3D control.
ES938 is controlled by MIDI SysEx commands sent through card's MPU401 port.
The following patch works but has a problem: the midi port ca
On 9/13/13 5:43 AM, Frederic Weisbecker wrote:
The only way would be perhaps to be able to limit the deepness
of the callchain branches.
I was thinking about such a feature two days ago. Max callchain depth is
set to 255 at compile time which can generate huge event sizes. perf
needs to all
Hi Sergei
On Sat, 14 Sep 2013, Sergei Shtylyov wrote:
> Hello.
>
> On 09/14/2013 10:33 PM, Guennadi Liakhovetski wrote:
>
> > > From: Max Filippov
>
> > > Add support for HPB-DMAC found in Renesas R-Car SoCs, using 'shdma-base'
> > > DMA
> > > driver framework.
>
> > > Based on the original
Hi,
On Tue, 2013-08-06 at 12:31 +0100, Tom Cooksey wrote:
> > >> On Fri, Jul 26, 2013 at 11:58 AM, Tom Cooksey
> > >> wrote:
> > that was part of the reason to punt this problem to userspace ;-)
> >
> > In practice, the kernel drivers doesn't usually know too much about
> > the dimensions/format/
The exclusion of complex operations in sem_lock() is insufficient:
After acquiring the per-semaphore lock, a simple op must first check that
sem_perm.lock is not locked and only after that test check complex_count.
The current code does it the other way around - and that creates a race.
Details are
Operations that need access to the whole array must guarantee that there are
no simple operations ongoing. Right now this is achieved by
spin_unlock_wait(sem->lock) on all semaphores.
If complex_count is nonzero, then this spin_unlock_wait() is not necessary,
because it was already performed in th
On Fri, Sep 13, 2013 at 06:31:22PM +0530, Viresh Kumar wrote:
> Use generic cpufreq_generic_init() routine instead of replicating the same
> code
> here. This driver wasn't setting transition_latency and so is getting set to 0
> by default. Lets mark it explicitly by calling the generic routine wi
Sedat, All,
On 2013-09-14 14:21 +0200, Sedat Dilek spake thusly:
> The ChangeLog from [1] says:
>
> Commit 229455bc02b87f7128f190c4491b4ce38648 accidentally changed
> the separator between sed `s' command and its parameters from ':' to
> '/'.
> Revert this change.
[--SNIP--]
> Is this patch e
Sedat, All,
On 2013-09-14 16:43 +0200, Sedat Dilek spake thusly:
> On Sat, Sep 14, 2013 at 4:21 PM, Clément Chauplannaz
> wrote:
> > 2013/9/14 Sedat Dilek :
[--SNIP--]
> >> So, can you point me/us to the correct commit with subject, please?!
> >
> > My apologies for that mistake. The initial com
Oleg Nesterov wrote:
> I am wondering if this can be simplified...
>
> At least you can move create->done from kthread_create_info to the
> stack, and turn create->owner into the pointer to that completion.
Use of DECLARE_COMPLETION_ONSTACK() looks harmful to me because current thread
needs to be
Changelog:
*v2 -> v3: revert commit 46c001a2 directly
Don't warning twice in __vmalloc_area_node and __vmalloc_node_range if
__vmalloc_area_node allocation failure. This patch revert commit 46c001a2
(mm/vmalloc.c: emit the failure message before return).
Reviewed-by: Zhang Yanfei
Signed-off-by:
Changelog:
*v2 -> v3: revert commit d157a558 directly
The VM_UNINITIALIZED/VM_UNLIST flag introduced by commit f5252e00(mm: avoid
null pointer access in vm_struct via /proc/vmallocinfo) is used to avoid
accessing the pages field with unallocated page when show_numa_info() is
called. This patch mo
Changelog:
*v1 -> v2: rebase against mmotm tree
The caller address has already been set in set_vmalloc_vm(), there's no need
to set it again in __vmalloc_area_node.
Reviewed-by: Zhang Yanfei
Signed-off-by: Wanpeng Li
---
mm/vmalloc.c | 1 -
1 file changed, 1 deletion(-)
diff --git a/mm/vmall
Changelog:
*v4 -> v5: return directly for !VM_VM_AREA case and remove (VM_LAZY_FREE |
VM_LAZY_FREEING) check
There is a race window between vmap_area tear down and show vmap_area
information.
AB
remove_vm_area
spin_lock(&vmap_area_lock)
madvise_hwpoison won't check if the page is small page or huge page and
traverse
in small page granularity against the range unconditional, which result in a
printk
flood "MCE xxx: already hardware poisoned" if the page is huge page. This patch
fix
it by increase compound_order(compound_head(
The lack of one reference count against poisoned page for hwpoison_inject w/o
hwpoison_filter enabled result in hwpoison detect -1 users still referenced
the page, however, the number should be 0 except the poison handler held one
after successfully unmap. This patch fix it by hold one reference
If the page is poisoned by software inject w/ MF_COUNT_INCREASED flag, there
is a false report 2nd try page recovery which is not truth, this patch fix it
by report first try free buddy page recovery if MF_COUNT_INCREASED is set.
Before patch:
[ 346.332041] Injecting memory failure at pfn 200010
Changelog:
*v1 -> v2: reverse PageTransHuge(page) && !PageHuge(page) check
PageTransHuge() can't guarantee the page is transparent huge page since it
return true for both transparent huge and hugetlbfs pages. This patch fix
it by check the page is also !hugetlbfs page.
Before patch:
[ 121.5
Oleg Nesterov wrote:
> > upon core dump because helper_argv[0] == NULL at
> >
> > helper_argv = argv_split(GFP_KERNEL, cn.corename, NULL);
> > call_usermodehelper_setup(helper_argv[0], ...);
>
> Are you sure? See above.
>
Yes, I'm sure. execve(NULL) from user space is safe, but
do_execve(NUL
> Reviewed-by: Naoya Horiguchi
> Signed-off-by: Wanpeng Li
Acked-by: Andi Kleen
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ
> Reviewed-by: Naoya Horiguchi
> Signed-off-by: Wanpeng Li
Acked-by: Andi Kleen
-Andi
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read
> Reviewed-by: Naoya Horiguchi
> Signed-off-by: Wanpeng Li
Acked-by: Andi Kleen
-Andi
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read
> Reviewed-by: Naoya Horiguchi
> Signed-off-by: Wanpeng Li
Acked-by: Andi Kleen
-Andi
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read
Hi experts,
This patchset is the implementation for signature verification of hibernate
snapshot image. The origin idea is from Jiri Kosina: Let EFI bootloader
generate key-pair in UEFI secure boot environment, then pass it to kernel
for sign/verify S4 image.
Due to there have potential threat fr
Per PKCS1 spec, the EMSA-PKCS1-v1_5 encoded message is leading by 0x00 0x01 in
its first 2 bytes. The leading zero byte is suppressed by MPI so we pass a
pointer to the _preceding_ byte to RSA_verify() in original code, but it has
risk for the byte is not zero because it's not in EM buffer's scope,
Implement RSASP1 and fill-in the following data to public key signature
structure: signature length (pkcs->k), signature octet
strings (pks->S) and MPI of signature (pks->rsa.s).
The naming of RSASP1 and the variables used in this function accord PKCS#1
spec but not follow kernel naming convention
Add ASN.1 files and parser to support parsing PKCS #8 noncompressed private
key information. It's better than direct parsing pure private key because
PKCS #8 has a privateKeyAlgorithm to indicate the algorithm of private
key, e.g. RSA from PKCS #1
v2:
- Removed bitfield declare of privkey_algo in
Implement EMSA_PKCS1-v1_5-ENCODE [RFC3447 sec 9.2] in rsa.c. It's the
first step of signature generation operation (RSASSA-PKCS1-v1_5-SIGN).
This patch is temporary set emLen to pks->k, and temporary set EM to
pks->S for debugging. We will replace the above values to real signature
after implement
Introduced a hibernate_key.c file to query the key pair from EFI variables
and maintain key pair for check signature of S4 snapshot image. We
loaded the private key when snapshot image stored success.
This patch introduced 2 EFI variables for store the key to sign S4 image and
verify signature whe
Implement Octet String to Integer conversion [RFC3447 sec 4.2] in rsa.c. It's
the second step of signature generation operation.
This patch is temporary set non-RSASP1 message to pks->S for debugging.
The naming of RSA_OS2IP and the variables used in this function accord PKCS#1
spec but not follo
This patch introduced SNAPSHOT_SIG_HASH config for user to select which
hash algorithm will be used during signature generation of snapshot.
v2:
Add define check of oCONFIG_SNAPSHOT_VERIFICATION in snapshot.c before
declare pkey_hash().
Reviewed-by: Jiri Kosina
Signed-off-by: Lee, Chun-Yi
---
This patch add the code for generate/verify signature of snapshot, it
put the signature to snapshot header. This approach can support both
on userspace hibernate and in-kernel hibernate.
v3:
- Change the naming of SIG_LENG to SIG_LEN
- Extracts the code of signature generation code from copy_data_
Show the verification time for monitor the performance of SHA256 and RSA
verification.
Reviewed-by: Jiri Kosina
Signed-off-by: Lee, Chun-Yi
---
kernel/power/snapshot.c |7 +++
1 files changed, 7 insertions(+), 0 deletions(-)
diff --git a/kernel/power/snapshot.c b/kernel/power/snapshot.
This patch add swsusp_page_is_sign_key() method to hibernate_key.c and
check the page is S4 sign key data when collect saveable page in
snapshot.c to avoid sign key data included in snapshot image.
Reviewed-by: Jiri Kosina
Signed-off-by: Lee, Chun-Yi
---
kernel/power/snapshot.c |6 ++
1
Base on Matthew Garrett's 2 patches in
"[PATCH] Add additional security checks when module loading is restricted"
series
[PATCH 01/10] Add secure_modules() call
[PATCH V3 11/11] Add option to automatically enforce module signatures when
in Secure Boot mode
This patch introduced EFI_SECURE_BO
We will not direct fail the hibernate snapshot restore when the
signature check fail, instead kernel will complain by warning
message and taint kernel.
This patch also introduced a sig_enforce flag to indicate if we want
direct fail the snapshot restore when signature check fail. User can
enable i
This patch introduced SNAPSHOT_REGEN_KEYS kernel config, enable this
option let kernel notify booloader (e.g. shim) to regenerate key-pair of
snapshot verification for each hibernate.
Kernel loaded S4 sign key in efi stub, so the private key forward from
efi bootloader to kernel in UEFI secure env
Add generate_signature interface on signature.c, asymmetric-subtype and
rsa.c for prepare to implement signature generation.
Reviewed-by: Jiri Kosina
Signed-off-by: Lee, Chun-Yi
---
crypto/asymmetric_keys/private_key.h | 29 +
crypto/asymmetric_keys/public_key.c |
Due to RSA_I2OSP is not only used by signature verification path but also used
in signature generation path. So, separate the length checking of octet string
because it's not for generate 0x00 0x01 leading string when used in signature
generation.
The naming of _RSA_I2OSP and the variables used in
Hello Rik
On Sat, Sep 14, 2013 at 11:55 PM, Rik van Riel wrote:
> On 09/14/2013 07:53 AM, Hillf Danton wrote:
>> After page A on source node is migrated to page B on target node, hinting
>> fault is recorded on the target node for B. On the source node there is
>> another record for A, since a tw
On Fri, Sep 13, 2013 at 2:37 PM, Andre Naujoks wrote:
> To be able to use the hex ascii functions in case sensitive environments
> the array hex_asc_upper[] and the needed functions for hex_byte_pack_upper()
> are introduced.
>
> Signed-off-by: Andre Naujoks
> ---
> include/linux/kernel.h | 11 +
On Sun, 15 Sep 2013 01:27:03 -0300 Thiago Farina wrote:
> On Fri, Sep 13, 2013 at 2:37 PM, Andre Naujoks wrote:
> > To be able to use the hex ascii functions in case sensitive environments
> > the array hex_asc_upper[] and the needed functions for hex_byte_pack_upper()
> > are introduced.
> >
>
Commit ea4054a23 (modpost: handle huge numbers of modules) added
support for building a large number of modules.
Unfortunately, the commit changed the semantics of the makefile: Instead of
passing only existing object files to modpost, make now passes all expected
object files. If make was started
On Saturday, September 14, 2013 09:39:31 AM Viresh Kumar wrote:
> On 14 September 2013 04:22, Stephen Warren wrote:
> > I wonder if this series is bisectable? Perhaps I should just go and read
> > the rest of the series, but I presume there's a patch somewhere else
> > that adds those two cpufreq_
Hi Linus,
Please pull from:
git://git.kernel.org/pub/scm/linux/kernel/git/dtor/input.git for-linus
or
master.kernel.org:/pub/scm/linux/kernel/git/dtor/input.git for-linus
to receive updates for the input subsystem. The only change is David
Hermann's new EVIOCREVOKE evdev ioctl th
On Sat, 2013-09-14 at 23:34 +0200, Manfred Spraul wrote:
> The bug is probably also present in 3.10 and 3.11, but for these kernels
> is is probably simpler just to move the test of sma->complex_count after
> the spin_is_locked() test.
IMHO, your 6 patch series should go to stable as well. Scala
Hello Jean-Christophe,
Le 14/09/2013 18:37, Jean-Christophe PLAGNIOL-VILLARD a écrit :
On 09:53 Fri 13 Sep , Boris BREZILLON wrote:
AT91 SoCs do not support per pin debounce time configuration.
Instead you have to configure a debounce time which will be used for all
pins of a given bank (PI
On Fri, Sep 13, 2013 at 02:10:43PM -0700, Kevin Hilman wrote:
> >
> > // This makes sure that the controller itself is powered on
> > // (adapter device follows its parent which is the controller). The
> > // controller is attached to the ACPI power domain so it is
> > // brought to
On Sat, Sep 14, 2013 at 12:10:37AM +, Zheng, Lv wrote:
> Is it possible to install the handler for ACPI_ROOT_OBJECT?
> Can it be achieved by implementing a setup callback?
Yes that can be done. However, that would mean that we always install the
operation region handler even if there is no sui
101 - 169 of 169 matches
Mail list logo