Re: [PATCH] Documentation/admin-guide: Embargoed hardware security issues

2019-08-01 Thread Greg Kroah-Hartman
On Fri, Aug 02, 2019 at 06:49:08AM +0200, Willy Tarreau wrote: > Hi Greg, Thomas, > > On Thu, Jul 25, 2019 at 03:01:13PM +0200, Greg Kroah-Hartman wrote: > > +The list is encrypted and email to the list can be sent by either PGP or > > +S/MIME encrypted and must be signed with the reporter's PGP k

[PATCH] Documentation/checkpatch: Prefer str_has_prefix over strncmp

2019-08-01 Thread Chuhong Yuan
Add strncmp() to Documentation/process/deprecated.rst since using strncmp() to check whether a string starts with a prefix is error-prone. The safe replacement is str_has_prefix(). Also add check to the newly introduced deprecated_string_apis in checkpatch.pl. This patch depends on patch: "Docume

Re: [PATCH] Documentation/admin-guide: Embargoed hardware security issues

2019-08-01 Thread Willy Tarreau
Hi Greg, Thomas, On Thu, Jul 25, 2019 at 03:01:13PM +0200, Greg Kroah-Hartman wrote: > +The list is encrypted and email to the list can be sent by either PGP or > +S/MIME encrypted and must be signed with the reporter's PGP key or S/MIME > +certificate. The list's PGP key and S/MIME certificate ar

[PATCH] mailmap: add entry for Jaegeuk Kim

2019-08-01 Thread Chao Yu
Add entry to connect all Jaegeuk's email addresses. Acked-by: Jaegeuk Kim Signed-off-by: Chao Yu --- .mailmap | 3 +++ 1 file changed, 3 insertions(+) diff --git a/.mailmap b/.mailmap index 477debe3d960..70d41c86e644 100644 --- a/.mailmap +++ b/.mailmap @@ -89,6 +89,9 @@ Henrik Kretzschmar H

Re: [PATCH 1/1] psi: do not require setsched permission from the trigger creator

2019-08-01 Thread Suren Baghdasaryan
On Thu, Aug 1, 2019 at 2:59 PM Peter Zijlstra wrote: > > On Thu, Aug 01, 2019 at 11:28:30AM -0700, Suren Baghdasaryan wrote: > > > By marking it FIFO-99 you're in effect saying that your stupid > > > statistics gathering is more important than your life. It will preempt > > > the task that's in co

Re: [PATCH v2 2/2] idr: Document that ida_simple_{get,remove}() are deprecated

2019-08-01 Thread Tri Vo
On Tue, Jul 30, 2019 at 2:20 PM Stephen Boyd wrote: > > These two functions are deprecated. Users should call ida_alloc() or > ida_free() respectively instead. Add documentation to this effect until > the macro can be removed. > > Cc: Greg KH > Cc: Tri Vo > Cc: Jonathan Corbet > Cc: linux-doc@v

Re: [PATCH 1/1] psi: do not require setsched permission from the trigger creator

2019-08-01 Thread Peter Zijlstra
On Thu, Aug 01, 2019 at 11:28:30AM -0700, Suren Baghdasaryan wrote: > > By marking it FIFO-99 you're in effect saying that your stupid > > statistics gathering is more important than your life. It will preempt > > the task that's in control of the band-saw emergency break, it will > > preempt the t

Re: [PATCH 0/6] hwspinlock: allow sharing of hwspinlocks

2019-08-01 Thread Bjorn Andersson
On Wed 13 Mar 08:50 PDT 2019, Fabien Dessenne wrote: > The current implementation does not allow two different devices to use > a common hwspinlock. This patch set proposes to have, as an option, some > hwspinlocks shared between several users. > > Below is an example that explain the need for th

Re: [PATCH 1/1] psi: do not require setsched permission from the trigger creator

2019-08-01 Thread Suren Baghdasaryan
Hi Peter, Thanks for sharing your thoughts. I understand your point and I tend to agree with it. I originally designed this using watchdog as the example of a critical system health signal and in the context of mobile device memory pressure is critical but I agree that there are more important thin

Re: [PATCH v4] tpm: Document UEFI event log quirks

2019-08-01 Thread Jarkko Sakkinen
On Wed, Jul 31, 2019 at 01:39:48PM -0600, Jonathan Corbet wrote: > On Fri, 12 Jul 2019 18:44:32 +0300 > Jarkko Sakkinen wrote: > > > There are some weird quirks when it comes to UEFI event log. Provide a > > brief introduction to TPM event log mechanism and describe the quirks > > and how they ca

Re: [PATCH v8 0/2] fTPM: firmware TPM running in TEE

2019-08-01 Thread Jarkko Sakkinen
On Mon, Jul 15, 2019 at 12:05:25PM +0300, Ilias Apalodimas wrote: > On Fri, Jul 12, 2019 at 06:37:58AM +0300, Jarkko Sakkinen wrote: > > On Thu, Jul 11, 2019 at 11:10:59PM +0300, Ilias Apalodimas wrote: > > > Will report back any issues when we start using it on real hardware > > > rather than QEMU

Re: [PATCH] doc:it_IT: translations for documents in process/

2019-08-01 Thread Jonathan Corbet
On Thu, 1 Aug 2019 11:53:06 +0200 Federico Vaga wrote: > Of course, I checked on the version available on my distribution. I did not > look for translation changes on different version of the same email client > @_@ Hmm...normally we expect you to check all versions back to the 1991 release o

Re: [RFC v2 0/6] Introduce TEE based Trusted Keys support

2019-08-01 Thread Janne Karhunen
On Thu, Aug 1, 2019 at 1:00 PM Sumit Garg wrote: > > > Here TEE isn't similar to a user-space crypto library. In our case TEE > > > is based on ARM TrustZone which only allows TEE communications to be > > > initiated from privileged mode. So why would you like to route > > > communications via us

Re: [Tee-dev] [RFC v2 0/6] Introduce TEE based Trusted Keys support

2019-08-01 Thread Sumit Garg
On Thu, 1 Aug 2019 at 14:00, Janne Karhunen wrote: > > On Thu, Aug 1, 2019 at 10:58 AM Sumit Garg wrote: > > > > Anyway, just my .02c. I guess having any new support in the kernel for > > > new trust sources is good and improvement from the current state. I > > > can certainly make my stuff work

Re: [RFC v2 0/6] Introduce TEE based Trusted Keys support

2019-08-01 Thread Sumit Garg
On Thu, 1 Aug 2019 at 13:30, Janne Karhunen wrote: > > On Thu, Aug 1, 2019 at 10:40 AM Sumit Garg wrote: > > > > I chose the userspace plugin due to this, you can use userspace aids > > > to provide any type of service. Use the crypto library you desire to > > > do the magic you want. > > > > Her

Re: [PATCH] doc:it_IT: translations for documents in process/

2019-08-01 Thread Federico Vaga
On Thursday, August 1, 2019 11:37:58 AM CEST Federico Vaga wrote: > On Wednesday, July 31, 2019 8:51:24 PM CEST Jonathan Corbet wrote: > > On Sun, 28 Jul 2019 11:20:54 +0200 > > > > Federico Vaga wrote: > > > From: Alessia Mantegazza > > > > > > Translations for the following documents in proce

Re: [PATCH 1/1] psi: do not require setsched permission from the trigger creator

2019-08-01 Thread Peter Zijlstra
On Tue, Jul 30, 2019 at 10:44:51AM -0700, Suren Baghdasaryan wrote: > On Tue, Jul 30, 2019 at 1:11 AM Peter Zijlstra wrote: > > > > On Mon, Jul 29, 2019 at 06:33:10PM -0700, Suren Baghdasaryan wrote: > > > When a process creates a new trigger by writing into /proc/pressure/* > > > files, permissio

Re: [PATCH] doc:it_IT: translations for documents in process/

2019-08-01 Thread Federico Vaga
On Wednesday, July 31, 2019 8:51:24 PM CEST Jonathan Corbet wrote: > On Sun, 28 Jul 2019 11:20:54 +0200 > > Federico Vaga wrote: > > From: Alessia Mantegazza > > > > Translations for the following documents in process/: > > - email-clients > > - management-style > > > > Signed-off-by:

Re: [Tee-dev] [RFC v2 0/6] Introduce TEE based Trusted Keys support

2019-08-01 Thread Janne Karhunen
On Thu, Aug 1, 2019 at 10:58 AM Sumit Garg wrote: > > Anyway, just my .02c. I guess having any new support in the kernel for > > new trust sources is good and improvement from the current state. I > > can certainly make my stuff work with your setup as well, what ever > > people think is the best

Re: [RFC v2 0/6] Introduce TEE based Trusted Keys support

2019-08-01 Thread Janne Karhunen
On Thu, Aug 1, 2019 at 10:40 AM Sumit Garg wrote: > > I chose the userspace plugin due to this, you can use userspace aids > > to provide any type of service. Use the crypto library you desire to > > do the magic you want. > > Here TEE isn't similar to a user-space crypto library. In our case TEE

Re: [Tee-dev] [RFC v2 0/6] Introduce TEE based Trusted Keys support

2019-08-01 Thread Sumit Garg
On Thu, 1 Aug 2019 at 13:00, Janne Karhunen wrote: > > On Thu, Aug 1, 2019 at 9:50 AM Rouven Czerwinski > wrote: > > > > I'm aware of it - I have implemented a large part of the GP TEE APIs > > > earlier (primarily the crypto functions). Does the TEE you work with > > > actually support GP proper

Re: [RFC v2 0/6] Introduce TEE based Trusted Keys support

2019-08-01 Thread Sumit Garg
On Thu, 1 Aug 2019 at 11:51, Janne Karhunen wrote: > > On Wed, Jul 31, 2019 at 4:58 PM Sumit Garg wrote: > > > > To clarify a bit further - my thought was to support any type of trust > > > source. > > > > That could be very well accomplished via Trusted Keys abstraction > > framework [1]. A trus

Re: [Tee-dev] [RFC v2 0/6] Introduce TEE based Trusted Keys support

2019-08-01 Thread Janne Karhunen
On Thu, Aug 1, 2019 at 9:50 AM Rouven Czerwinski wrote: > > I'm aware of it - I have implemented a large part of the GP TEE APIs > > earlier (primarily the crypto functions). Does the TEE you work with > > actually support GP properly? Can I take a look at the code? > > AFAIK Sumit is working wit