> -Original Message-
> From: Joe Perches [mailto:j...@perches.com]
> Sent: Wednesday, July 24, 2019 11:59 PM
> To: Gote, Nitin R ; Kees Cook
>
> Cc: cor...@lwn.net; a...@linux-foundation.org; a...@canonical.com;
> linux-doc@vger.kernel.org; kernel-harden...@lists.openwall.com
> Subject:
On 24.07.2019 17:10, Joel Fernandes wrote:> On Wed, Jul 24, 2019 at 01:28:42PM
+0900, Minchan Kim wrote:
>> On Tue, Jul 23, 2019 at 10:20:49AM -0400, Joel Fernandes wrote:
>>> On Tue, Jul 23, 2019 at 03:13:58PM +0900, Minchan Kim wrote:
Hi Joel,
On Mon, Jul 22, 2019 at 05:32:04PM -
On 24/07/2019 18:16, Paul Cercueil wrote:
> This driver handles the interrupt controller built in the Timer/Counter
> Unit (TCU) of the JZ47xx SoCs from Ingenic.
>
> Signed-off-by: Paul Cercueil
> Tested-by: Mathieu Malaterre
> Tested-by: Artur Rojek
> Reviewed-by: Thomas Gleixner
Acked-by: M
On 2019/07/25 2:02, Dmitry Safonov wrote:
> Hung task detector has one timeout and has two associated actions on it:
> - issuing warnings with names and stacks of blocked tasks
> - panic()
>
> We want switches to panic (and reboot) if there's a task
> in uninterruptible sleep for some minutes - at
On Wed, Jul 24, 2019 at 10:57 PM Mark Salyzyn wrote:
>
> Check impure, opaque, origin & meta xattr with no sepolicy audit
> (using __vfs_getxattr) since these operations are internal to
> overlayfs operations and do not disclose any data. This became
> an issue for credential override off since s
From: Nitin Gote
Added check in checkpatch.pl to deprecate strcpy(), strlcpy() and
strncpy() in favor of stracpy().
Updated Documentation/process/deprecated.rst for stracpy().
Signed-off-by: Nitin Gote
---
Change log:
v5->v6
- Used stracpy() instead of strscpy().
v4->v5
- Change the subj
From: Thomas Gleixner
To address the requirements of embargoed hardware issues, like Meltdown,
Spectre, L1TF, etc. it is necessary to define and document a process for
handling embargoed hardware security issues.
Following the discussion at the maintainer summit 2018 in Edinburgh
(https://lwn.ne
On 22-07-19, 08:07, Mauro Carvalho Chehab wrote:
> The genindex logic is meant to be used only for html output, as
> pdf build has its own way to generate indexes.
> Documentation/driver-api/dmaengine/index.rst | 2 +-
> Documentation/driver-api/soundwire/index.rst | 2 +-
For dmaengin
On arm64 the TCR_EL1.TBI0 bit has been always enabled hence
the userspace (EL0) is allowed to set a non-zero value in the
top byte but the resulting pointers are not allowed at the
user-kernel syscall ABI boundary.
With the relaxed ABI proposed through this document, it is now possible
to pass tag
On arm64 the TCR_EL1.TBI0 bit has been always enabled on the arm64 kernel,
hence the userspace (EL0) is allowed to set a non-zero value in the top
byte but the resulting pointers are not allowed at the user-kernel syscall
ABI boundary.
This patchset proposes a relaxation of the ABI with which it i
On arm64 the TCR_EL1.TBI0 bit has been always enabled hence
the userspace (EL0) is allowed to set a non-zero value in the
top byte but the resulting pointers are not allowed at the
user-kernel syscall ABI boundary.
With the relaxed ABI proposed in this set, it is now possible to pass
tagged pointe
On 7/25/19 11:38 AM, Tetsuo Handa wrote:
> On 2019/07/25 2:02, Dmitry Safonov wrote:
>> Hung task detector has one timeout and has two associated actions on it:
>> - issuing warnings with names and stacks of blocked tasks
>> - panic()
>>
>> We want switches to panic (and reboot) if there's a task
>
Thanks for the review.
On 7/25/19 4:00 AM, Amir Goldstein wrote:
On Wed, Jul 24, 2019 at 10:57 PM Mark Salyzyn wrote:
Check impure, opaque, origin & meta xattr with no sepolicy audit
(using __vfs_getxattr) since these operations are internal to
overlayfs operations and do not disclose any data
On 7/24/19 11:14 PM, Amir Goldstein wrote:
+void ovl_revert_creds(const struct cred *old_cred)
+{
+ if (old_cred)
+ revert_creds(old_cred);
+}
+
Mark,
Not sure if you have seen my "shutdown" patches:
https://lore.kernel.org/linux-fsdevel/20190715133839.9878-4-amir7...@gmail.
On 7/24/19 10:48 PM, Amir Goldstein wrote:
On Wed, Jul 24, 2019 at 10:57 PM Mark Salyzyn wrote:
Because of the overlayfs getxattr recursion, the incoming inode fails
to update the selinux sid resulting in avc denials being reported
against a target context of u:object_r:unlabeled:s0.
This desc
On Thu, Jul 25, 2019 at 6:03 PM Mark Salyzyn wrote:
>
> On 7/24/19 10:48 PM, Amir Goldstein wrote:
> > On Wed, Jul 24, 2019 at 10:57 PM Mark Salyzyn wrote:
> >> Because of the overlayfs getxattr recursion, the incoming inode fails
> >> to update the selinux sid resulting in avc denials being repo
On Thu, Jul 25, 2019 at 5:37 PM Mark Salyzyn wrote:
>
> Thanks for the review.
>
> On 7/25/19 4:00 AM, Amir Goldstein wrote:
> > On Wed, Jul 24, 2019 at 10:57 PM Mark Salyzyn wrote:
> >> Check impure, opaque, origin & meta xattr with no sepolicy audit
> >> (using __vfs_getxattr) since these opera
On 7/25/19 8:43 AM, Amir Goldstein wrote:
On Thu, Jul 25, 2019 at 6:03 PM Mark Salyzyn wrote:
On 7/24/19 10:48 PM, Amir Goldstein wrote:
On Wed, Jul 24, 2019 at 10:57 PM Mark Salyzyn wrote:
Because of the overlayfs getxattr recursion, the incoming inode fails
to update the selinux sid result
On Thu, Jul 25, 2019 at 04:52:19PM +0530, NitinGote wrote:
> From: Nitin Gote
>
> Added check in checkpatch.pl to deprecate strcpy(), strlcpy() and
> strncpy() in favor of stracpy().
stracpy() is preferred when the destination is a char array (rather than
a string pointer), so that likely needs
On Thu, 2019-07-25 at 11:50 -0700, Kees Cook wrote:
> On Thu, Jul 25, 2019 at 04:52:19PM +0530, NitinGote wrote:
> > From: Nitin Gote
> >
> > Added check in checkpatch.pl to deprecate strcpy(), strlcpy() and
> > strncpy() in favor of stracpy().
>
> stracpy() is preferred when the destination is
On Mon, Jul 22, 2019 at 08:07:37AM -0300, Mauro Carvalho Chehab wrote:
> Manually convert the two openRisc documents to ReST, adding them
> to the Linux documentation body.
Thanks for doing this, the below looks fine.
Acked-by: Stafford Horne
> Signed-off-by: Mauro Carvalho Chehab
> ---
> Do
On Thu, 25 Jul 2019 15:01:13 +0200
Greg Kroah-Hartman wrote:
> From: Thomas Gleixner
>
> To address the requirements of embargoed hardware issues, like Meltdown,
> Spectre, L1TF, etc. it is necessary to define and document a process for
> handling embargoed hardware security issues.
>
> Follow
Zdravstvujte! Vas interesuyut klientskie bazy dannyh?
On Thu, 2019-07-25 at 16:52 +0530, NitinGote wrote:
> From: Nitin Gote
>
> Added check in checkpatch.pl to deprecate strcpy(), strlcpy() and
> strncpy() in favor of stracpy().
[]
> diff --git a/scripts/checkpatch.pl b/scripts/checkpatch.pl
[]
> +our %deprecated_string_apis = (
> + "strcpy"
On Thu, Jul 25, 2019 at 11:15:53AM +0300, Konstantin Khlebnikov wrote:
[snip]
> >>> Thanks for bringing up the swapping corner case.. Perhaps we can improve
> >>> the heap profiler to detect this by looking at bits 0-4 in pagemap. While
> >>> it
> >>
> >> Yeb, that could work but it could add ove
On Thu, Jul 25, 2019 at 7:22 PM Mark Salyzyn wrote:
>
> On 7/25/19 8:43 AM, Amir Goldstein wrote:
> > On Thu, Jul 25, 2019 at 6:03 PM Mark Salyzyn wrote:
> >> On 7/24/19 10:48 PM, Amir Goldstein wrote:
> >>> On Wed, Jul 24, 2019 at 10:57 PM Mark Salyzyn wrote:
> Because of the overlayfs get
26 matches
Mail list logo