On Fri, 2014-06-27 at 08:35 -0400, Mikulas Patocka wrote:
>
> On Thu, 26 Jun 2014, Nicholas A. Bellinger wrote:
>
> > Hi Mikulas,
> >
> > On Mon, 2014-06-23 at 13:42 -0400, Mikulas Patocka wrote:
> > > target: fix deadlock on unload
> > >
> > > On uniprocessor preemptible kernel, target core de
On Fri, Jun 27, 2014 at 11:25 PM, Andy Lutomirski wrote:
> On Fri, Jun 27, 2014 at 10:55 PM, Alexei Starovoitov
> wrote:
>> On Fri, Jun 27, 2014 at 5:16 PM, Andy Lutomirski wrote:
>>> On Fri, Jun 27, 2014 at 5:05 PM, Alexei Starovoitov
>>> wrote:
BPF syscall is a demux for different BPF
Greetings
Two years ago I decided to ditch the shim and shams that come with booting in
UEFI on the laptop. This was working fine. The last year someone had a
suggestion to sign the kernel, and enable certificate checking, as describe
here http://kroah.com/log/blog/2013/09/02/booting-a-self-sig
On Sat, Jun 28, 2014 at 05:10:46AM +0200, Guillaume Morin wrote:
> On 27 Jun 22:37, Greg Kroah-Hartman wrote:
> > Put that below the --- line.
>
> Will do.
>
> > > > And what checkpatch error did you fix? And are you sure it needs to be
> > > > fixed?
> > >
> > > That's what I changed:
> > >
>
On Fri, Jun 27, 2014 at 11:12 PM, Alexei Starovoitov wrote:
> On Fri, Jun 27, 2014 at 5:19 PM, Andy Lutomirski wrote:
>> On Fri, Jun 27, 2014 at 5:05 PM, Alexei Starovoitov
>> wrote:
>>> eBPF programs are safe run-to-completion functions with load/unload
>>> methods from userspace similar to ke
On Fri, Jun 27, 2014 at 10:55 PM, Alexei Starovoitov wrote:
> On Fri, Jun 27, 2014 at 5:16 PM, Andy Lutomirski wrote:
>> On Fri, Jun 27, 2014 at 5:05 PM, Alexei Starovoitov
>> wrote:
>>> BPF syscall is a demux for different BPF releated commands.
>>>
>>> 'maps' is a generic storage of different
On Fri, Jun 27, 2014 at 5:21 PM, Andy Lutomirski wrote:
> On Fri, Jun 27, 2014 at 5:06 PM, Alexei Starovoitov wrote:
>> this socket filter example does:
>>
>> - creates a hashtable in kernel with key 4 bytes and value 8 bytes
>>
>> - populates map[6] = 0; map[17] = 0; // 6 - tcp_proto, 17 - udp_
On Fri, Jun 27, 2014 at 8:32 PM, Mike Galbraith
wrote:
> On Fri, 2014-06-27 at 18:18 -0700, Austin Schuh wrote:
>
>> It would be more context switches, but I wonder if we could kick the
>> workqueue logic completely out of the scheduler into a thread. Have
>> the scheduler increment/decrement an
Signed-off-by: Ben Chan
---
drivers/staging/gdm72xx/gdm_qos.c | 38 +++---
drivers/staging/gdm72xx/gdm_qos.h | 2 +-
2 files changed, 20 insertions(+), 20 deletions(-)
diff --git a/drivers/staging/gdm72xx/gdm_qos.c
b/drivers/staging/gdm72xx/gdm_qos.c
index a2efc
This patch addresses the following issues:
- Use int instead of u32 whenever makes sense
- Turn extract_qos_list() in gdm_qos.c, which previously always returned
0, into a void function.
Reported-by: Dan Carpenter
Reported-by: Michalis Pappas
Signed-off-by: Ben Chan
---
drivers/staging/gdm72
This patch changes gdm_usb_send() and gdm_sdio_send() to return -EINVAL instead
of calling BUG_ON if an invalid data length is passed to the functions.
Reported-by: Dan Carpenter
Reported-by: Michalis Pappas
Signed-off-by: Ben Chan
---
drivers/staging/gdm72xx/gdm_sdio.c | 3 ++-
drivers/stagin
Signed-off-by: Ben Chan
---
drivers/staging/gdm72xx/gdm_qos.c | 10 +-
drivers/staging/gdm72xx/gdm_qos.h | 4 +---
2 files changed, 6 insertions(+), 8 deletions(-)
diff --git a/drivers/staging/gdm72xx/gdm_qos.c
b/drivers/staging/gdm72xx/gdm_qos.c
index df6f000..732f009 100644
--- a/dri
On Fri, Jun 27, 2014 at 5:19 PM, Andy Lutomirski wrote:
> On Fri, Jun 27, 2014 at 5:05 PM, Alexei Starovoitov wrote:
>> eBPF programs are safe run-to-completion functions with load/unload
>> methods from userspace similar to kernel modules.
>>
>> User space API:
>>
>> - load eBPF program
>> pro
On Fri, Jun 27, 2014 at 5:18 PM, Joe Perches wrote:
> Add MAINTAINERS entry.
>
> On Fri, 2014-06-27 at 17:05 -0700, Alexei Starovoitov wrote:
>> diff --git a/MAINTAINERS b/MAINTAINERS
> []
>> @@ -1881,6 +1881,15 @@ S: Supported
>> F: drivers/net/bonding/
>> F: include/uapi/linux/if_bondi
On Fri, Jun 27, 2014 at 5:16 PM, Andy Lutomirski wrote:
> On Fri, Jun 27, 2014 at 5:05 PM, Alexei Starovoitov wrote:
>> BPF syscall is a demux for different BPF releated commands.
>>
>> 'maps' is a generic storage of different types for sharing data between
>> kernel
>> and userspace.
>>
>> The
On Fri, 2014-06-27 at 16:24 +0200, Thomas Gleixner wrote:
> Completely untested patch below.
It's no longer completely untested, killer_module is no longer a killer.
I'll let box (lockdep etc is enabled) chew on it a while, no news is
good news as usual.
-Mike
--
To unsubscribe from this list:
The code in apci1564_interrupt() for handling counter interrupts is currently
repeated four times; once for each counter. This code is identical save for the
registers it is using, so just handle all four counters with a for loop.
Also, the interrupt function was doing a useless set-and-check of
apci1564_cos_insn_config() is currently using apci1564_reset() to disable
digital input interrupts when the configuration operation is
COMEDI_DIGITAL_TRIG_DISABLE. However, this is incorrect as the device reset
function also resets the registers for the digital outputs, timer, watchdog, and
counte
This patchset moves a misplaced include to the proper file, swaps out an overly
aggressive placement of apci1564_reset(), and cleans up apci1564_interrupt().
Chase Southwood (3):
staging: comedi: addi_apci_1564: move addi_watchdog.h include to
addi_apci_1564.c
staging: comedi: addi_apci_15
From: Guillaume Morin
Simple code style fixes
Signed-off-by: Guillaume Morin
---
drivers/staging/dgnc/dgnc_driver.c | 11 +--
1 file changed, 5 insertions(+), 6 deletions(-)
diff --git a/drivers/staging/dgnc/dgnc_driver.c
b/drivers/staging/dgnc/dgnc_driver.c
index d52a9e8..68460af
Commit aed3f9d (staging: comedi: addi_apci_1564: absorb apci1564_reset()) moved
the only use of addi_watchdog.h from hwdrv_apci1564.c to addi_apci_1564.c, but
left the include statement itself in the former file. Move this include to the
file which actually uses it.
Signed-off-by: Chase Southwood
This patch fixs the FIXME message in the function *cpumask_of_node
for using this function multiple times and the issue with recaluting
the cpu node mask when reusing this function.
Signed-off-by: Nicholas Krause
---
arch/alpha/include/asm/topology.h | 3 +++
1 file changed, 3 insertions(+)
dif
On Fri, 2014-06-27 at 18:18 -0700, Austin Schuh wrote:
> It would be more context switches, but I wonder if we could kick the
> workqueue logic completely out of the scheduler into a thread. Have
> the scheduler increment/decrement an atomic pool counter, and wake up
> the monitoring thread to sp
On 27 Jun 22:37, Greg Kroah-Hartman wrote:
> Put that below the --- line.
Will do.
> > > And what checkpatch error did you fix? And are you sure it needs to be
> > > fixed?
> >
> > That's what I changed:
> >
> > $ scripts/checkpatch.pl -f drivers/staging/iio/frequency/ad9850.c
> > ERROR: Macro
On 6/18/14, 8:58 AM, Jiri Olsa wrote:
Adding some prints for ordered events queue, to help
debug issues.
went to enable this and it is really odd to have to edit a config file
to enable debugging. How about hooking it into verbose option? Maybe
like multiple levels of -v or -v or -v queue.
Do any of you use the kernel Bugzilla? If you do I was wondering if we
can clean it up.
Otherwise I was wondering were I can get an accurate list of open
bugs in the newest
kernels.
Cheers Nick
On Fri, Jun 27, 2014 at 2:11 PM, Nick Krause wrote:
> Hey fellow developers
> I seem to be finding lo
On Sat, Jun 28, 2014 at 04:30:09AM +0200, Guillaume Morin wrote:
> On 27 Jun 19:09, Greg Kroah-Hartman wrote:
> > > v2: add missing Signed-off-by
> >
> > That doesn't go here.
>
> I guess I am struggling to get git send-email do what I want
Put that below the --- line.
> > And what checkpatch
On 27 Jun 19:09, Greg Kroah-Hartman wrote:
> > v2: add missing Signed-off-by
>
> That doesn't go here.
I guess I am struggling to get git send-email do what I want
> And what checkpatch error did you fix? And are you sure it needs to be
> fixed?
That's what I changed:
$ scripts/checkpatch.pl
On Sat, Jun 28, 2014 at 03:46:56AM +0200, Guillaume Morin wrote:
> v2: add missing Signed-off-by
That doesn't go here.
And what checkpatch error did you fix? And are you sure it needs to be
fixed?
greg k-h
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body o
Joerg,
this email was in my spam-box. No real indication as to why, although
the usual suspect is
Received-SPF: none (google.com: j...@8bytes.org does not designate
permitted sender hosts) client-ip=85.214.48.195;
presumably together with some other trigger that makes gmail unhappy.
Anyway,
From: Jérôme Glisse
Several subsystem require a callback when a mm struct is being destroy
so that they can cleanup there respective per mm struct. Instead of
having each subsystem add its callback to mmput use a notifier chain
to call each of the subsystem.
This will allow new subsystem to regi
From: Jérôme Glisse
New code will need to be able to differentiate between a regular unmap and
an unmap trigger by vmscan in which case we want to be as quick as possible.
Signed-off-by: Jérôme Glisse
---
include/linux/rmap.h | 15 ---
mm/memory-failure.c | 2 +-
mm/vmscan.c
Andrew so here are a set of mm patch that do some ground modification to core
mm code. They apply on top of today's linux-next and they pass checkpatch.pl
with flying color (except patch 4 but i did not wanted to be a nazi about 80
char line).
Patch 1 is the mmput notifier call chain we discussed
From: Jérôme Glisse
New user of the mmu_notifier interface need to lookup vma in order to
perform the invalidation operation. Instead of redoing a vma lookup
inside the callback just pass through the vma from the call site where
it is already available.
This needs small refactoring in memory.c t
From: Jérôme Glisse
The event information will be usefull for new user of mmu_notifier API.
The event argument differentiate between a vma disappearing, a page
being write protected or simply a page being unmaped. This allow new
user to take different path for different event for instance on unma
v2: add missing Signed-off-by
Signed-off-by: Guillaume Morin
diff --git a/drivers/staging/iio/frequency/ad9850.c
b/drivers/staging/iio/frequency/ad9850.c
index af877ff..6183670 100644
--- a/drivers/staging/iio/frequency/ad9850.c
+++ b/drivers/staging/iio/frequency/ad9850.c
@@ -21,7 +21,7 @@
On 6/27/14 8:56 PM, "Ben Skeggs" wrote:
>On Sat, Jun 28, 2014 at 4:51 AM, Ken Adams wrote:
>> quick note re: tegra and gpu bars...
>>
>> to this point we've explicitly avoided providing user-mode mappings due
>>to
>> power management issues, etc.
>> looks to me like this would allow such mappin
From: Randy Dunlap
Note that I don't maintain Documentation/ABI/,
Documentation/devicetree/, or the language translation files.
Signed-off-by: Randy Dunlap
---
MAINTAINERS |3 +++
1 file changed, 3 insertions(+)
Index: lnx-315-rc5/MAINTAINERS
==
From: Dan Carpenter
These days most people use git to send patches so I have added a section
about that.
Signed-off-by: Dan Carpenter
Signed-off-by: Randy Dunlap
---
v2: fix typo in commit message
v3: update git am and log commands. Mention the man pages.
v4: s/list/appropriate mailing list(s
diff --git a/drivers/staging/iio/frequency/ad9850.c
b/drivers/staging/iio/frequency/ad9850.c
index af877ff..6183670 100644
--- a/drivers/staging/iio/frequency/ad9850.c
+++ b/drivers/staging/iio/frequency/ad9850.c
@@ -21,7 +21,7 @@
#define DRV_NAME "ad9850"
-#define value_mask (u16)0xf000
+#d
The following changes since commit 206204a1162b995e2185275167b22468c00d6b36:
lz4: ensure length does not wrap (2014-06-23 14:12:01 -0400)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/driver-core.git/
tags/compress-3.16-rc3
for you to fetch ch
On Fri, Jun 27, 2014 at 04:59:14PM -0700, Andrew Morton wrote:
> On Thu, 26 Jun 2014 16:32:15 -0700 "Luis R. Rodriguez"
> wrote:
>
> > On Thu, Jun 26, 2014 at 4:20 PM, Andrew Morton
> > wrote:
> > > On Fri, 27 Jun 2014 01:16:30 +0200 "Luis R. Rodriguez"
> > > wrote:
> > >
> > >> > > Another n
On Fri, Jun 27, 2014 at 11:19 AM, Steven Rostedt wrote:
> On Fri, 27 Jun 2014 20:07:54 +0200
> Mike Galbraith wrote:
>
>> > Why do we need the wakeup? the owner of the lock should wake it up
>> > shouldn't it?
>>
>> True, but that can take ages.
>
> Can it? If the workqueue is of some higher prio
Make the following two reorganizations to
cgroup_subtree_control_write(). These are to prepare for future
changes and shouldn't cause any functional difference.
* Move availability above css offlining wait.
* Move cgrp->child_subsys_mask update above new css creation.
Signed-off-by: Tejun Heo
Currently, the blkio subsystem attributes all of writeback IOs to the
root. One of the issues is that there's no way to tell who originated
a writeback IO from block layer. Those IOs are usually issued
asynchronously from a task which didn't have anything to do with
actually generating the dirty
cgroup is implementing support for subsystem dependency which would
require a way to enable a subsystem even when it's not directly
configured through "cgroup.subtree_control".
The preceding patch distinguished cgroup->subtree_control and
->child_subsys_mask where the former is the subsystems expl
cgroup is implementing support for subsystem dependency which would
require a way to enable a subsystem even when it's not directly
configured through "cgroup.subtree_control".
Previously, cgroup->child_subsys_mask directly reflected
"cgroup.subtree_control" and the enabled subsystems in the child
cgroup is implementing support for subsystem dependency which would
require a way to enable a subsystem even when it's not directly
configured through "cgroup.subtree_control".
The previous patches added support for explicitly and implicitly
enabled subsystems and showing/hiding their interface fi
Currently, the blkio subsystem attributes all of writeback IOs to the
root. One of the issues is that there's no way to tell who originated
a writeback IO from block layer. Those IOs are usually issued
asynchronously from a task which didn't have anything to do with
actually generating the dirty
Hello, guys.
Currently, the blkio subsystem attributes all of writeback IOs to the
root. One of the issues is that there's no way to tell who originated
a writeback IO from block layer. Those IOs are usually issued
asynchronously from a task which didn't have anything to do with
actually generat
On Sat, Jun 28, 2014 at 4:51 AM, Ken Adams wrote:
> quick note re: tegra and gpu bars...
>
> to this point we've explicitly avoided providing user-mode mappings due to
> power management issues, etc.
> looks to me like this would allow such mappings. is that the case? are
> there any paths which
There's a race condition between the atomic_dec_and_test(&io->count)
in dec_count() and the waking of the sync_io() thread. If the thread
is spuriously woken immediately after the decrement it may exit,
making the on the stack io struct invalid, yet the dec_count could
still be using it.
There ar
On Fri, Jun 27, 2014 at 5:06 PM, Alexei Starovoitov wrote:
> this socket filter example does:
>
> - creates a hashtable in kernel with key 4 bytes and value 8 bytes
>
> - populates map[6] = 0; map[17] = 0; // 6 - tcp_proto, 17 - udp_proto
>
> - loads eBPF program:
> r0 = skb[14 + 9]; // load on
From: Yue Zhang
hv_fcopy_daemon fails to overwrite a file if the target file already
exits.
Add O_TRUNC flag on opening.
Signed-off-by: Yue Zhang
---
tools/hv/hv_fcopy_daemon.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/tools/hv/hv_fcopy_daemon.c b/tools/hv/hv_fcopy
On Fri, Jun 27, 2014 at 5:05 PM, Alexei Starovoitov wrote:
> eBPF programs are safe run-to-completion functions with load/unload
> methods from userspace similar to kernel modules.
>
> User space API:
>
> - load eBPF program
> prog_id = bpf_prog_load(int prog_id, bpf_prog_type, struct nlattr *pr
On Fri, Jun 27, 2014 at 04:09:39PM -0500, Brian W Hart wrote:
> Commit 5eeaf1f18973 (cpufreq: Fix build error on some platforms that
> use cpufreq_for_each_*) moved function cpufreq_next_valid() to a public
> header. Warnings are now generated when objects including that header
> are built with -W
Add MAINTAINERS entry.
On Fri, 2014-06-27 at 17:05 -0700, Alexei Starovoitov wrote:
> diff --git a/MAINTAINERS b/MAINTAINERS
[]
> @@ -1881,6 +1881,15 @@ S: Supported
> F: drivers/net/bonding/
> F: include/uapi/linux/if_bonding.h
>
> +BPF
While a lot of people know what BPF is, I think
On Fri, Jun 27, 2014 at 5:05 PM, Alexei Starovoitov wrote:
> BPF syscall is a demux for different BPF releated commands.
>
> 'maps' is a generic storage of different types for sharing data between kernel
> and userspace.
>
> The maps can be created/deleted from user space via BPF syscall:
> - crea
eBPF can be used from user space.
uapi/linux/bpf.h: eBPF instruction set definition
linux/filter.h: the rest
This patch only moves macro definitions, but practically it freezes existing
eBPF instruction set, though new instructions can still be added in the future.
These eBPF definitions cannot
Signed-off-by: Alexei Starovoitov
---
MAINTAINERS |9 +
1 file changed, 9 insertions(+)
diff --git a/MAINTAINERS b/MAINTAINERS
index 48f4ef44b252..ebd831cd1a25 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -1881,6 +1881,15 @@ S: Supported
F: drivers/net/bonding/
F: in
BPF syscall is a demux for different BPF releated commands.
'maps' is a generic storage of different types for sharing data between kernel
and userspace.
The maps can be created/deleted from user space via BPF syscall:
- create a map with given id, type and attributes
map_id = bpf_map_create(in
'maps' is a generic storage of different types for sharing data between kernel
and userspace.
The maps are accessed from user space via BPF syscall, which has commands:
- create a map with given id, type and attributes
map_id = bpf_map_create(int map_id, map_type, struct nlattr *attr, int len)
Hi All,
this patch set demonstrates the potential of eBPF.
First patch "net: filter: split filter.c into two files" splits eBPF interpreter
out of networking into kernel/bpf/. The goal for BPF subsystem is to be usable
in NET-less configuration. Though the whole set is marked is RFC, the 1st patc
eBPF programs are safe run-to-completion functions with load/unload
methods from userspace similar to kernel modules.
User space API:
- load eBPF program
prog_id = bpf_prog_load(int prog_id, bpf_prog_type, struct nlattr *prog, int
len)
where 'prog' is a sequence of sections (currently TEXT
simple packet drop monitor:
- in-kernel eBPF program attaches to kfree_skb() event and records number
of packet drops at given location
- userspace iterates over the map every second and prints stats
Signed-off-by: Alexei Starovoitov
---
samples/bpf/Makefile |4 +-
samples/bpf/dropmon.c |
expose bpf_map_lookup_elem(), bpf_map_update_elem(), bpf_map_delete_elem()
map accessors to eBPF programs
Signed-off-by: Alexei Starovoitov
---
include/linux/bpf.h |5 +++
include/uapi/linux/bpf.h |3 ++
kernel/bpf/syscall.c | 85 ++
Safety of eBPF programs is statically determined by the verifier, which detects:
- loops
- out of range jumps
- unreachable instructions
- invalid instructions
- uninitialized register access
- uninitialized stack access
- misaligned stack access
- out of range stack access
- invalid calling conven
the library includes a trivial set of BPF syscall wrappers:
int bpf_delete_map(int map_id);
int bpf_create_map(int map_id, int key_size, int value_size, int max_entries);
int bpf_update_elem(int map_id, void *key, void *value);
int bpf_lookup_elem(int map_id, void *key, void *value);
int bpf_d
User interface:
cat bpf_123 > /sys/kernel/debug/tracing/__event__/filter
where 123 is an id of the eBPF program priorly loaded.
__event__ is static tracepoint event.
(kprobe events will be supported in the future patches)
eBPF programs can call in-kernel helper functions to:
- lookup/update/delet
this socket filter example does:
- creates a hashtable in kernel with key 4 bytes and value 8 bytes
- populates map[6] = 0; map[17] = 0; // 6 - tcp_proto, 17 - udp_proto
- loads eBPF program:
r0 = skb[14 + 9]; // load one byte of ip->proto
*(u32*)(fp - 4) = r0;
value = bpf_map_lookup_elem
BPF is used in several kernel components. This split creates logical boundary
between generic eBPF core and the rest
kernel/bpf/core.c: eBPF interpreter
net/core/filter.c: classic->eBPF converter, classic verifiers, socket filters
This patch only moves functions.
Signed-off-by: Alexei Starovoit
introduce new setsockopt() command:
int prog_id;
setsockopt(sock, SOL_SOCKET, SO_ATTACH_FILTER_EBPF, &prog_id, sizeof(prog_id))
prog_id is eBPF program id priorly loaded via:
prog_id = syscall(__NR_bpf, BPF_PROG_LOAD, 0, BPF_PROG_TYPE_SOCKET_FILTER,
&prog, sizeof(prog));
setso
add new map type: BPF_MAP_TYPE_HASH
and its simple (not auto resizeable) hash table implementation
Signed-off-by: Alexei Starovoitov
---
include/uapi/linux/bpf.h |1 +
kernel/bpf/Makefile |2 +-
kernel/bpf/hashtab.c | 371 ++
3 files
In the case of a late abort to suspend/hibernate, irqs marked with
IRQF_EARLY_RESUME will not be enabled. This is due to syscore_resume not getting
called on these paths.
This can happen with a pm test for platform, a late wakeup irq, and other
instances. This change removes the function from sysc
This reverts the fix to IRQF_EARLY_RESUME irqs staying disabled after a suspend
failure. It incorrectly stated that Xen is the only platform that uses this
feature. Some rtc drivers such as rtc-as3722.c use the feature and can have its
irq permanently enabled with the change. The driver does disabl
On Thu, 26 Jun 2014 16:32:15 -0700 "Luis R. Rodriguez" wrote:
> On Thu, Jun 26, 2014 at 4:20 PM, Andrew Morton
> wrote:
> > On Fri, 27 Jun 2014 01:16:30 +0200 "Luis R. Rodriguez"
> > wrote:
> >
> >> > > Another note -- since this option depends on SMP and !BASE_SMALL
> >> > > technically
> >
On 06/10/2014 10:04 PM, Yinghai Lu wrote:
> When using kexec with 64bit kernel, bzImage and ramdisk could be
> loaded above 4G. We need this to get correct ramdisk adress.
>
> Make get_ramdisk_image() global and use it for early microcode updating.
> Also make it to take boot_params pointer for di
> -Original Message-
> From: Greg KH [mailto:g...@kroah.com]
> > From: Yue Zhang
> >
> > hv_fcopy_daemon fails to overwrite a file if the target file already
> > exits.
> >
> > Add O_TRUNC flag on opening.
> >
> > MS-TFS: 341345
>
> It's as if the people on your team don't talk to each
Hi Dudley,
I tried to apply your patchset today, but was not successful: it seems
like tabs have been replaced by spaces, and there's a Cypress
signature and a winmail.dat file added to every email, making it
impossible to apply your patches directly.
I've tried to rule out errors on my end. I ch
On Thursday, June 26, 2014 12:52:23 PM Steven Rostedt wrote:
> From: "Steven Rostedt (Red Hat)"
>
> ftrace_stop() and ftrace_start() were added to the suspend and hibernate
> process because there was some function within the work flow that caused
> the system to reboot if it was traced. This fun
On Thursday, June 26, 2014 12:52:22 PM Steven Rostedt wrote:
> From: "Steven Rostedt (Red Hat)"
>
> ftrace_stop() is used to stop function tracing during suspend and resume
> which removes a lot of possible debugging opportunities with tracing.
> The reason was that some function in the resume pa
On Fri, Jun 27, 2014 at 05:16:48PM -0700, Yue Zhang wrote:
> From: Yue Zhang
>
> hv_fcopy_daemon fails to overwrite a file if the target file already
> exits.
>
> Add O_TRUNC flag on opening.
>
> MS-TFS: 341345
It's as if the people on your team don't talk to each other about what
they should,
On Thu, Jun 26, 2014 at 02:14:33PM +0200, Jiri Olsa wrote:
> this one compiles ok for me
Ok, cool. So guys, can we apply this one so that I can continue with the
next round?
--
Regards/Gruss,
Boris.
Sent from a fat crate under my desk. Formatting is fine.
--
--
To unsubscribe from this list
In preparation for having other callers of the seccomp mode setting
logic, split the prctl entry point away from the core logic that performs
seccomp mode setting.
Signed-off-by: Kees Cook
---
kernel/seccomp.c | 16 ++--
1 file changed, 14 insertions(+), 2 deletions(-)
diff --git
This changes the mode setting helper to allow threads to change the
seccomp mode from another thread. We must maintain barriers to keep
TIF_SECCOMP synchronized with the rest of the seccomp state.
Signed-off-by: Kees Cook
---
kernel/seccomp.c | 27 +++
1 file changed, 1
Wires up the new seccomp syscall.
Signed-off-by: Kees Cook
---
arch/arm/include/uapi/asm/unistd.h |1 +
arch/arm/kernel/calls.S|1 +
2 files changed, 2 insertions(+)
diff --git a/arch/arm/include/uapi/asm/unistd.h
b/arch/arm/include/uapi/asm/unistd.h
index ba94446c72d9..e21
In preparation for adding seccomp locking, move filter creation away
from where it is checked and applied. This will allow for locking where
no memory allocation is happening. The validation, filter attachment,
and seccomp mode setting can all happen under the future locks.
Signed-off-by: Kees Coo
Separates the two mode setting paths to make things more readable with
fewer #ifdefs within function bodies.
Signed-off-by: Kees Cook
---
kernel/seccomp.c | 71 --
1 file changed, 48 insertions(+), 23 deletions(-)
diff --git a/kernel/seccomp
Applying restrictive seccomp filter programs to large or diverse
codebases often requires handling threads which may be started early in
the process lifetime (e.g., by code that is linked in). While it is
possible to apply permissive programs prior to process start up, it is
difficult to further re
Normally, task_struct.seccomp.filter is only ever read or modified by
the task that owns it (current). This property aids in fast access
during system call filtering as read access is lockless.
Updating the pointer from another task, however, opens up race
conditions. To allow cross-thread filter
To support splitting mode 1 from mode 2, extract the mode checking and
assignment logic into common functions.
Signed-off-by: Kees Cook
---
kernel/seccomp.c | 22 ++
1 file changed, 18 insertions(+), 4 deletions(-)
diff --git a/kernel/seccomp.c b/kernel/seccomp.c
index afb
Since seccomp transitions between threads requires updates to the
no_new_privs flag to be atomic, the flag must be part of an atomic flag
set. This moves the nnp flag into a separate task field, and introduces
accessors.
Signed-off-by: Kees Cook
---
fs/exec.c |4 ++--
includ
This adds the ability for threads to request seccomp filter
synchronization across their thread group (at filter attach time).
For example, for Chrome to make sure graphic driver threads are fully
confined after seccomp filters have been attached.
To support this, locking on seccomp changes via th
This adds the new "seccomp" syscall with both an "operation" and "flags"
parameter for future expansion. The third argument is a pointer value,
used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must
be 0. This is functionally equivalent to prctl(PR_SET_SECCOMP, ...).
In addition to
From: Yue Zhang
hv_fcopy_daemon fails to overwrite a file if the target file already
exits.
Add O_TRUNC flag on opening.
Signed-off-by: Yue Zhang
---
tools/hv/hv_fcopy_daemon.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/tools/hv/hv_fcopy_daemon.c b/tools/hv/hv_fcopy
Wires up the new seccomp syscall.
Signed-off-by: Kees Cook
---
arch/mips/include/uapi/asm/unistd.h | 15 +--
arch/mips/kernel/scall32-o32.S |1 +
arch/mips/kernel/scall64-64.S |1 +
arch/mips/kernel/scall64-n32.S |1 +
arch/mips/kernel/scall64-o32.S
> -Original Message-
> From: Yue Zhang [mailto:yue...@microsoft.com]
> Sent: Friday, June 27, 2014 5:17 PM
> To: KY Srinivasan; Haiyang Zhang; driverdev-de...@linuxdriverproject.org;
> linux-kernel@vger.kernel.org; o...@aepfle.de; jasow...@redhat.com;
> a...@canonical.com
> Cc: Dexuan Cui
Should be ready for merge now. Please consider.
[v2: Review feedback addressed and some minor improvements]
[v3: More review feedback addressed and handle test failures better.
Ported to latest tip/core.]
[v4: Addressed Namhyung's feedback]
[v5: Rebase to latest tree. Minor description update.]
[v
From: Andi Kleen
Change pmu.c to allow descriptions of events and add interfaces
to add aliases at runtime from another file. To be used by jevents in the
next patch.
Acked-by: Namhyung Kim
Signed-off-by: Andi Kleen
---
tools/perf/util/pmu.c | 127 ++---
From: Andi Kleen
Add a downloader to automatically download the right
files from a download site.
This is implemented as a script calling wget, similar to
perf archive. The perf driver automatically calls the right
binary. The downloader is extensible, but currently only
implements an Intel even
1 - 100 of 568 matches
Mail list logo