Re: [PATCH] staging/panel: Mark local functions as static (fix smatch warnings)

2013-02-15 Thread David Howells
Peter Huewe wrote: > +static char old_keypad_profile[][4][9] = { > {"S0", "Left\n", "Left\n", ""}, > {"S1", "Down\n", "Down\n", ""}, > {"S2", "Up\n", "Up\n", ""}, Things like this should likely be const also. There are several here. > -void panel_lcd_print(char *s) > +static

[GIT PULL] Disintegrate UAPI for wimax

2012-10-11 Thread David Howells
Hi Dave, Can you pull wimax as well? Sorry about this, but it seems like the majority of the non-arch trees need to go through the networking tree. Perez-Gonzalez, Inaky wrote: > > From: David Howells [mailto:dhowe...@redhat.com] > > > > Can you merge the following bra

Re: linux-next: manual merge of the kvm-ppc tree with the powerpc-merge tree

2012-10-11 Thread David Howells
Stephen Rothwell wrote: > I just removed epapr_hcalls.h from the Kbuild file as I am not sure how > it should be broken up. David, can you have a look at this, please? Files should be broken up along around __KERNEL__ conditionals. If there are no __KERNEL__ conditionals, it is assumed that th

Re: linux-next: manual merge of the kvm-ppc tree with the powerpc-merge tree

2012-10-11 Thread David Howells
Tabi Timur-B04825 wrote: > What is include/uapi? Take a look at http://lwn.net/Articles/507794/ David -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.ht

Re: [GIT PULL] Disintegrate UAPI for media

2012-10-11 Thread David Howells
Mauro Carvalho Chehab wrote: > My understanding here is that, as the file location will change > with this series, your original concern is now void, as userspace > will require patches to use the new location. So, if we're willing > to do it, let's put this one-driver-only obsolete API on a sepa

Re: linux-next: manual merge of the kvm-ppc tree with the powerpc-merge tree

2012-10-11 Thread David Howells
Alexander Graf wrote: > Do I have to move them to their own header file or can I just #ifdef > __KERNEL__ around the place where __ASSEMBLY__ starts to the end of the > file? That depends on whether it happens before or after my disintegration script is run on the header. Ben has pulled my powe

Re: [PATCH 0/4] uapi: Allow automatic generation of trivial headers

2012-10-11 Thread David Howells
Catalin Marinas wrote: > The asm/Kbuild allows automatic generation of header files by specifying > "generic-y += ...". The first patch in the series allows the same thing > to be specified in uapi/asm/Kbuild. > > The subsequent patches remove some of the trivial header files in arm64, > s390 an

Re: [GIT PULL] Disintegrate UAPI for m68k [ver #2]

2012-10-12 Thread David Howells
Geert Uytterhoeven wrote: > This leaves the following empty construct: > > #ifdef CONFIG_COLDFIRE > #else > #endif Odd. It emitted it in both headers, which it shouldn't have. > I'll remove it in a subsequent patch. Thanks. David -- To unsubscribe from this list: send the line "

Re: [GIT PULL] Disintegrate UAPI for spi

2012-10-12 Thread David Howells
Grant Likely wrote: > > Can you merge the following branch into the spi tree please. > > Do you want this merged into 3.7? If so, go ahead and push it directly > to Linus. I've not been able to do any maintainership stuff for the > last merge window or this one. Mark Brown has covered for me on

[PATCH 1/2] UAPI: Unexport part of linux/ppp-comp.h

2012-10-13 Thread David Howells
Unexport part of linux/ppp-comp.h as userspace can't make use of that bit. Signed-off-by: David Howells cc: Paul Mackerras cc: David Miller --- include/linux/ppp-comp.h |4 1 file changed, 4 insertions(+) diff --git a/include/linux/ppp-comp.h b/include/linux/ppp-comp.h

[PATCH 2/2] UAPI: Unexport linux/blk_types.h

2012-10-13 Thread David Howells
It seems that was linux/blk_types.h incorrectly exported to fix up some missing bits required by the exported parts of linux/fs.h (READ, WRITE, READA, etc.). So unexport linux/blk_types.h and unexport the relevant bits of linux/fs.h. Signed-off-by: David Howells cc: Jens Axboe cc: Tejun Heo

[PATCH] UAPI: Unexport linux/blk_types.h [ver #2]

2012-10-13 Thread David Howells
It seems that was linux/blk_types.h incorrectly exported to fix up some missing bits required by the exported parts of linux/fs.h (READ, WRITE, READA, etc.). So unexport linux/blk_types.h and unexport the relevant bits of linux/fs.h. Signed-off-by: David Howells cc: Jens Axboe cc: Tejun Heo

[GIT PULL] Disintegrate UAPI for spi

2012-10-13 Thread David Howells
userspace interface stuff, and: include/linux/.../foo.h for the strictly kernel internal stuff. Signed-off-by: David Howells Acked-by: Grant Likely --- The following changes since commit 9e2d8656f5e8aa214e66b462680cf86b210b74a8: Merge branch 'akpm' (Andrew's patch-bo

[GIT PULL] UAPI disintegration for include/linux/{,byteorder/}*.h

2012-10-13 Thread David Howells
tegrate include/linux/byteorder/*.h as a unit. Signed-off-by: David Howells --- The following changes since commit 4d7127dace8cf4b05eb7c8c8531fc204fbb195f4: Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security (2012-10-13 11:29:00 +0900)

FIPS-mode panic? (was Re: [PULL] modules)

2012-10-15 Thread David Howells
Linus Torvalds wrote: > Hmm. So this thing makes me wonder: > > /* Not having a signature is only an error if we're strict. */ > if (err < 0 && fips_enabled) > panic("Module verification failed with error %d in FIPS > mode\n", > err); > > d

Re: [GIT PULL] UAPI disintegration for include/linux/{,byteorder/}*.h

2012-10-15 Thread David Howells
Linus Torvalds wrote: > In the meantime, please fix the fact that "tools/perf" broke. Hmmm... I assumed that would've been built by allyesconfig... Apparently not. David -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kerne

Re: [PATCH] perf: Fix UAPI fallout

2012-10-15 Thread David Howells
Ingo Molnar wrote: > Arnaldo: the way we include some of the include files directly > into tools/perf/ .c files [such as hw_breakpoint.h] and > represent others transparently via utils/include/ [such as > rbtree.h] is a bit messy and ought to be cleaned up I suspect. I tried to make the USERI

Re: [PATCH 03/31] sections: Fix section conflicts in arch/frv

2012-10-15 Thread David Howells
Andi Kleen wrote: > Does this fix it? -Andi Works for me. I've added it to my FRV fixup patches. David -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.

[PATCH 1/4] FRV: Fix VLIW packing constraint violation in entry.S

2012-10-15 Thread David Howells
doesn't matter which way round they're packed from that point of view. Signed-off-by: David Howells cc: Al Viro --- arch/frv/kernel/entry.S |4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/frv/kernel/entry.S b/arch/frv/kernel/entry.S index 0027329..ee0b

[PATCH 2/4] FRV: Fix incorrect symbol in copy_thread()

2012-10-15 Thread David Howells
er is reported only once arch/frv/kernel/process.c:197: error: for each function it appears in.) m Signed-off-by: David Howells cc: Al Viro --- arch/frv/kernel/process.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/frv/kernel/process.c b/arch/frv/kernel/pro

[PATCH 3/4] FRV: Fix const sections change

2012-10-15 Thread David Howells
ult/7344691/ Reported-by: Geert Uytterhoeven Signed-off-by: Andi Kleen Signed-off-by: David Howells cc: Geert Uytterhoeven --- arch/frv/kernel/setup.c |2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/frv/kernel/setup.c b/arch/frv/kernel/setup.c index 1f1e5ef..b8993c8 100644 --- a

[PATCH 4/4] FRV: Fix linux/elf-fdpic.h

2012-10-15 Thread David Howells
incorrectly guarded bits back to the kernelspace header. Whilst we're at it, the __KERNEL__ guards can be deleted as they're no longer necessary. Reported-by: Fengguang Wu Reported-by: Lars-Peter Clausen Signed-off-by: David Howells cc: Fengguang Wu cc: Lars-Peter Clausen c

Re: CONFIG_MODULE_SIG breaks out-of-tree modules in modpost.

2012-10-15 Thread David Howells
Valdis Kletnieks wrote: > /bin/sh: -c: line 0: syntax error near unexpected token `;' > /bin/sh: -c: line 0: `set -e; ; echo > 'cmd_/usr/src/valdis/NVIDIA-Linux-x86_64-304.51/kernel/nvidia.ko := ' > > /usr/src/valdis/NVIDIA-Linux-x86_64-304.51/kernel/.nvidia.ko.cmd' I would guess that this is

Re: [PATCH 4/4] FRV: Fix linux/elf-fdpic.h

2012-10-15 Thread David Howells
Lars-Peter Clausen wrote: > The second part of the patch adding it back to include/linux/elf-fdpic.h > seems to be missing. Oops. Yes. I forgot to 'stg add' it. David -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.o

[PATCH 1/4] FRV: Fix VLIW packing constraint violation in entry.S [ver #2]

2012-10-15 Thread David Howells
doesn't matter which way round they're packed from that point of view. Signed-off-by: David Howells cc: Al Viro --- arch/frv/kernel/entry.S |4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/frv/kernel/entry.S b/arch/frv/kernel/entry.S index 0027329..ee0b

[PATCH 2/4] FRV: Fix incorrect symbol in copy_thread() [ver #2]

2012-10-15 Thread David Howells
er is reported only once arch/frv/kernel/process.c:197: error: for each function it appears in.) m Signed-off-by: David Howells cc: Al Viro --- arch/frv/kernel/process.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/frv/kernel/process.c b/arch/frv/kernel/pro

[PATCH 3/4] FRV: Fix const sections change [ver #2]

2012-10-15 Thread David Howells
ult/7344691/ Reported-by: Geert Uytterhoeven Signed-off-by: Andi Kleen Signed-off-by: David Howells cc: Geert Uytterhoeven --- arch/frv/kernel/setup.c |2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/frv/kernel/setup.c b/arch/frv/kernel/setup.c index 1f1e5ef..b8993c8 100644 --- a

[PATCH 4/4] FRV: Fix linux/elf-fdpic.h [ver #2]

2012-10-15 Thread David Howells
incorrectly guarded bits back to the kernelspace header. Whilst we're at it, the __KERNEL__ guards can be deleted as they're no longer necessary. Reported-by: Fengguang Wu Reported-by: Lars-Peter Clausen Signed-off-by: David Howells cc: Fengguang Wu cc: Lars-Peter Clausen c

Re: Linux 3.7-rc1 (uml uapi errors)

2012-10-15 Thread David Howells
Randy Dunlap wrote: > Building um (uml) for x86_64 (defconfig) has lots of errors like: > > In file included from include/linux/irq.h:22:0, > from include/asm-generic/hardirq.h:12, > from arch/um/include/generated/asm/hardirq.h:1, > from include

[PATCH] UM: linux/coredump.h needs siginfo_t

2012-10-15 Thread David Howells
linux/coredump.h should #include asm/siginfo.h for the siginfo_t type. Without this the following error occurs when compiling UM defconfig: include/linux/coredump.h:15:25: error: unknown type name 'siginfo_t' Signed-off-by: David Howells --- include/linux/coredump.h |1

Re: Linux 3.7-rc1 (uml uapi errors)

2012-10-15 Thread David Howells
Hi Randy, Randy Dunlap wrote: > Building um (uml) for x86_64 (defconfig) has lots of errors like: > > In file included from include/linux/irq.h:22:0, > from include/asm-generic/hardirq.h:12, > from arch/um/include/generated/asm/hardirq.h:1, >

[PATCH] Make uapi/linux/irqnr.h non-empty

2012-10-15 Thread David Howells
error when building x86_64 or usermode Linux (and probably others): include/linux/irqnr.h:4:30: fatal error: uapi/linux/irqnr.h: No such file or directory Signed-off-by: David Howells cc: Randy Dunlap cc: Alessandro Suardi --- include/uapi/linux/irqnr.h |4 1 file changed, 4 inserti

Re: [PATCH v6 10/10] test: IPC message queue copy feture test

2012-10-15 Thread David Howells
Stanislav Kinsbursky wrote: > +CFLAGS += -I../../../../arch/x86/include/generated/ > +CFLAGS += -I../../../../include/ > +CFLAGS += -I../../../../usr/include/ > +CFLAGS += -I../../../../arch/x86/include/ Do you need to add uapi/ into some of these? David -- To unsubscribe from this list: send t

[PATCH 1/4] FRV: Fix VLIW packing constraint violation in entry.S

2012-10-15 Thread David Howells
doesn't matter which way round they're packed from that point of view. Signed-off-by: David Howells Acked-by: Al Viro --- arch/frv/kernel/entry.S |4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/frv/kernel/entry.S b/arch/frv/kernel/entry.S index 002732

[PATCH 3/4] FRV: Fix const sections change

2012-10-15 Thread David Howells
ult/7344691/ Reported-by: Geert Uytterhoeven Signed-off-by: Andi Kleen Signed-off-by: David Howells cc: Geert Uytterhoeven --- arch/frv/kernel/setup.c |2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/frv/kernel/setup.c b/arch/frv/kernel/setup.c index 1f1e5ef..b8993c8 100644 --- a

[PATCH 4/4] FRV: Fix linux/elf-fdpic.h

2012-10-15 Thread David Howells
incorrectly guarded bits back to the kernelspace header. Whilst we're at it, the __KERNEL__ guards can be deleted as they're no longer necessary. Reported-by: Fengguang Wu Reported-by: Lars-Peter Clausen Signed-off-by: David Howells cc: Fengguang Wu cc: Lars-Peter Clausen c

[PATCH 2/4] FRV: Fix incorrect symbol in copy_thread()

2012-10-15 Thread David Howells
er is reported only once arch/frv/kernel/process.c:197: error: for each function it appears in.) m Reported-by: Geert Uytterhoeven Signed-off-by: David Howells Acked-by: Al Viro cc: Geert Uytterhoeven --- arch/frv/kernel/process.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-)

Re: [PATCH v6 1/6] tracing,x86: Add a TSC trace_clock

2012-10-16 Thread David Howells
David Sharp wrote: > > Please use the Kbuild infrastructure ("generic-y += ..." in > > arch/*/include/asm/Kbuild) > > instead of adding wrappers around the asm-generic version. > > mips apparently recencly got rid of arch/mips/include/asm/Kbuild. It didn't. However, if you use patch to create

Re: [GIT PULL] Disintegrate UAPI for parisc [ver #2]

2012-10-16 Thread David Howells
James Bottomley wrote: > I'm getting a fairly massive merge failure over our misc tree: > > git://git.kernel.org/pub/scm/linux/kernel/git/jejb/parisc-2.0 misc > > It looks like a conflict with the motion to using wrappered Kbuild for > our asm-generic clones. I can try merging your branch in a

[GIT PULL] Disintegrate UAPI for parisc [ver #3]

2012-10-16 Thread David Howells
UAPI Disintegration 2012-10-16 -------- David Howells (2): Merge branch 'misc' of git://git.kernel.org/.../jejb/parisc-2.6.git/ UAPI: (Scripted) Disintegrate arch/parisc/include/asm James Bottomley (1): [PARI

Re: [PATCH 1/2] uapi: update includes for drm content when no kernel API exists

2012-10-16 Thread David Howells
Luis R. Rodriguez wrote: > >> The include_next trick can work as well but that'd mean synching the UAPI > >> files regularly into compat. I'd much prefer to have code intact when > >> possible when backporting so the option I stuck with then was to patch > >> the code directly and then as part of

[PATCH] sign-file: fix the perl warning message when extracting ASN.1

2012-11-21 Thread David Howells
161. Found = in conditional, should be == at scripts/sign-file line 159. This patch change replace '=' by '==' in elsif conditions for avoid the above warning messages. Signed-off-by: Chun-Yi Lee Signed-off-by: David Howells --- scripts/sign-file |6 +++--- 1 file c

Re: [PATCH] sign-file: fix the perl warning message when extracting ASN.1

2012-11-21 Thread David Howells
David Howells wrote: > There have the following warning message when running modules install for > sign ko files: > > # make modules_install > ... > INSTALL drivers/input/touchscreen/pcap_ts.ko > Found = in conditional, should be == at scripts/sign-file line 164. >

[PATCH] UAPI: (Scripted) Disintegrate include/scsi

2012-11-21 Thread David Howells
Signed-off-by: David Howells Acked-by: Arnd Bergmann Acked-by: Thomas Gleixner Acked-by: Michael Kerrisk Acked-by: Paul E. McKenney Acked-by: Dave Jones --- include/scsi/Kbuild |3 --- include/uapi/scsi/Kbuild|3 +++ include/uapi/scsi/scsi_bsg_fc.h

[PATCH] UAPI: (Scripted) Disintegrate include/scsi/fc

2012-11-21 Thread David Howells
Signed-off-by: David Howells Acked-by: Arnd Bergmann Acked-by: Thomas Gleixner Acked-by: Michael Kerrisk Acked-by: Paul E. McKenney Acked-by: Dave Jones --- include/scsi/fc/Kbuild|4 include/uapi/scsi/fc/Kbuild |4 include/uapi/scsi/fc/fc_els.h |0 include

[PATCH] UAPI: (Scripted) Disintegrate include/rdma

2012-11-21 Thread David Howells
Signed-off-by: David Howells Acked-by: Arnd Bergmann Acked-by: Thomas Gleixner Acked-by: Michael Kerrisk Acked-by: Paul E. McKenney Acked-by: Dave Jones --- include/rdma/Kbuild |6 -- include/rdma/rdma_netlink.h | 36

Re: Pull "Load keys from signed PE binaries" branch into linux-next

2013-01-10 Thread David Howells
Kees Cook wrote: > This is a quick review of the devel-pekeys tree... Thanks! > +static int public_key_verify_signature_2(const struct key *key, > > Maybe name this "key_verify_signature" instead of using the trailing _2? I would prefer that it begin with "public_key_" as that reflects the wh

Re: Pull "Load keys from signed PE binaries" branch into linux-next

2013-01-10 Thread David Howells
> > More of my paranoia for array access here. :) > > I've added this at the top of pkc7_digest(): > > if (pkcs7->sig.pkey_hash_algo > PKEY_HASH__LAST || > pkey_hash_algo_name[pkcs7->sig.pkey_hash_algo]) There should be a '!' here. > return -ENOPKG; David -- To un

Re: [PATCH] gpu: drm/nouveau/nouveau_fence.c: remove unnecessary null pointer check

2013-01-15 Thread David Howells
Cong Ding wrote: > the variable sender is dereferenced in line 190, so it is no reason to check > null again in line 198. Did you mean "The variable 'chan'"? David -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org Mo

Re: [PATCH] gpu: drm/nouveau/nouveau_fence.c: remove unnecessary null pointer check

2013-01-15 Thread David Howells
Cong Ding wrote: > > > the variable sender is dereferenced in line 190, so it is no reason to > > > check > > > null again in line 198. > > > > Did you mean "The variable 'chan'"? > sorry, my fault. so should I send a new version to correct the typo? Yep. David -- To unsubscribe from this lis

Re: [GIT PULL] x86/uapi for 3.8

2012-12-12 Thread David Howells
e arch/x86/include/asm (2012-12-12 22:58:24 +) UAPI disintegration 2012-12-12 -------- David Howells (1): UAPI: (Scripted) Disintegrate arch/x86/include/asm arch/x

Re: [GIT PULL] x86/uapi for 3.8

2012-12-14 Thread David Howells
egration 2012-12-14 -------- David Howells (1): UAPI: (Scripted) Disintegrate arch/x86/include/asm arch/x86/include/asm/Kbuild | 26 --- arch/x86/include/asm/boot.h | 9 +- arch/x86/include/asm/debugreg.h | 79 +--- arch/x

Re: [GIT] Security subsystem updates for 3.8

2012-12-17 Thread David Howells
Linus Torvalds wrote: > > A quiet cycle for the security subsystem with just a few maintenance > > updates. > > Ok, pulled. There were a few trivial conflicts (mostly due to some of > the key allocation patches having already been merged, and some of the > kuid/kgid changes due to the userns cha

[PATCH 2/2] KEYS: Use keyring_alloc() to create module signing keyring

2012-12-17 Thread David Howells
Use keyring_alloc() to create special keyrings now that it has a permissions parameter rather than using key_alloc() + key_instantiate_and_link(). Signed-off-by: David Howells cc: Rusty Russell --- kernel/modsign_pubkey.c | 15 ++- 1 file changed, 6 insertions(+), 9 deletions

[PATCH 1/2] keys: Fix unreachable code

2012-12-17 Thread David Howells
From: Alan Cox We set ret to NULL then test it. Remove the bogus test Signed-off-by: Alan Cox Signed-off-by: David Howells --- security/keys/process_keys.c |2 -- 1 file changed, 2 deletions(-) diff --git a/security/keys/process_keys.c b/security/keys/process_keys.c index 58dfe08

[GIT PULL] UAPI disintegration for Alpha

2012-12-17 Thread David Howells
nges up to 96433f6ee49032d7a8bda76de2b05cfde2914354: UAPI: (Scripted) Disintegrate arch/alpha/include/asm (2012-12-17 14:12:19 +) UAPI disintegration 2012-12-17 -------- David Howells (1):

[PATCH 1/2] x86: Provide guards in uapi/asm/hw_breakpoint.h to prevent deletion by patch

2012-12-17 Thread David Howells
xport to userspace, it had nothing outside of __KERNEL__. Signed-off-by: David Howells cc: Jean Delvare --- arch/x86/include/uapi/asm/hw_breakpoint.h |4 1 file changed, 4 insertions(+) diff --git a/arch/x86/include/uapi/asm/hw_breakpoint.h b/arch/x86/include/uapi/asm/hw_breakpo

[PATCH 2/2] x86: Provide guards in uapi/asm/setup.h to prevent deletion by patch

2012-12-17 Thread David Howells
space, it had nothing outside of __KERNEL__. Signed-off-by: David Howells cc: Jean Delvare --- arch/x86/include/uapi/asm/setup.h |4 1 file changed, 4 insertions(+) diff --git a/arch/x86/include/uapi/asm/setup.h b/arch/x86/include/uapi/asm/setup.h index e69de29..96a4d53 100644 --- a

Re: [GIT PULL] Asymmetric keys and module signing

2012-09-27 Thread David Howells
1:06 +0100) (from the branch description for modsign-post-KS local branch) post Kernel-Summit module signing -------- David Howells (24): KEYS: Add payload preparsing opportunity prior to key instantiate or update MPILI

Re: [GIT PULL] Asymmetric keys and module signing

2012-09-28 Thread David Howells
Geert Uytterhoeven wrote: > Just wondering, what's the advantage of doing panic over just > rejecting the module? > Panic is a DoS? FIPS mode is strange like that. David -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.

Re: [GIT PULL] Asymmetric keys and module signing

2012-09-28 Thread David Howells
Rusty Russell wrote: > And after those three fixes, I still get all fail: > > [3.361036] Request for unknown module key 'Magrathea: Glacier signing > key: 6 > e03943da0f3b015ba6ed7f5e0cac4fe48680994' err -11 Can you look back further in your kernel output, see if you can spot the bit wher

Re: [PATCH 2/2] modules: don't call eu-strip if it doesn't exist.

2012-09-28 Thread David Howells
Rusty Russell wrote: > Signed-off-by: Rusty Russell Acked-by: David Howells -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please

Re: [PATCH 1/2] modsign: don't use bashism in sh scripts.

2012-09-28 Thread David Howells
Rusty Russell wrote: > -source ./.config > +. ./.config Does that make a difference? -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please

Re: [GIT PULL] Asymmetric keys and module signing

2012-09-28 Thread David Howells
Rusty Russell wrote: > warning: (MODULE_SIG) selects ASYMMETRIC_KEY_TYPE which has unmet direct > dependencies (CRYPTO && KEYS) > > Ah, I see: > > + select CONFIG_KEYS > + select CONFIG_CRYPTO > > I fixed this commit, rather than go around again. Thanks. select is irritatingly broke

Re: [GIT PULL] Asymmetric keys and module signing

2012-09-28 Thread David Howells
Rusty Russell wrote: > [3.361036] Request for unknown module key 'Magrathea: Glacier signing > key: 6 > e03943da0f3b015ba6ed7f5e0cac4fe48680994' err -11 Okay, it turns out that my attempts to remove SHA1 by editing it out of the .config file were doomed to failure because a couple of IPv6

Re: [GIT PULL] Asymmetric keys and module signing

2012-09-28 Thread David Howells
description for modsign-post-KS local branch) post Kernel-Summit module signing -------- David Howells (2): MODSIGN: Use the same digest for the autogen key sig as for the module sig MODSIGN: Use utf8 strings in signer's name in

Re: [GIT PULL] Asymmetric keys and module signing

2012-09-29 Thread David Howells
Rusty Russell wrote: > [2.808075] Loading module verification certificates > [2.809331] X.509: Cert 6e03943da0f3b015ba6ed7f5e0cac4fe48680994 has > expired > [2.810500] MODSIGN: Problem loading in-kernel X.509 certificate (-127) Hmmm... Other people have seen that. Ah! I wonde

Re: [GIT PULL] Asymmetric keys and module signing

2012-09-29 Thread David Howells
Rusty Russell wrote: > I noticed the Cert number didn't change with rebuilds: "distclean" > didn't remove some files: > > $ git clean -f -f -x -d > Removing extra_certificates > Removing signing_key.priv > Removing signing_key.x509 > Removing signing_key.x509.keyid > Removing signing_key.x509.si

Re: [RFC 1/1] ima: digital signature verification using asymmetric keys

2013-01-17 Thread David Howells
Looks reasonable, I think, so you can add: Acked-by: David Howells David -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Pleas

Re: [RFC 0/1] ima/evm: signature verification support using asymmetric keys

2013-01-17 Thread David Howells
Mimi Zohar wrote: > David, are you ok with how support for asymmetric keys is being added to > EVM/IMA-appraisal for verifying signatures? Any comments? I would also like to have a look at altering your trusted key type[*] to be a subtype of asymmetric keys so that the asymmetric key type can c

[PATCH 1/3] KEYS: Load *.x509 files into kernel keyring

2013-01-17 Thread David Howells
Load all the files matching the pattern "*.x509" that are to be found in kernel base source dir and base build dir into the module signing keyring. The "extra_certificates" file is then redundant. Signed-off-by: David Howells --- kernel/Makefile

[PATCH 2/3] KEYS: Separate the kernel signature checking keyring from module signing

2013-01-17 Thread David Howells
Separate the kernel signature checking keyring from module signing so that it can be used by code other than the module-signing code. Signed-off-by: David Howells --- init/Kconfig | 13 + kernel/Makefile | 17 --- kernel/modsign_certificate.S | 18

[PATCH 3/3] KEYS: Add a 'trusted' flag and a 'trusted only' flag

2013-01-17 Thread David Howells
. Signed-off-by: David Howells Reviewed-by: Kees Cook --- include/linux/key-type.h |1 + include/linux/key.h |3 +++ kernel/system_keyring.c |4 +++- security/keys/key.c |8 security/keys/keyring.c |4 5 files changed, 19 insertions(+), 1 deletion

Re: [PATCH 2/3] KEYS: Separate the kernel signature checking keyring from module signing

2013-01-17 Thread David Howells
Mimi Zohar wrote: > Lets assume accepting built in keys should is acceptable for all use > cases. Adding additional keys from userspace is probably not acceptable > for all use cases. Those keys should be added to specific 'trusted' > keyrings. > > EVM and IMA-appraisal have separate keyrings

Re: linux-next: Tree for Jan 18 [MODSIGN: KEYS:]

2013-01-18 Thread David Howells
Sedat Dilek wrote: > Culprit seems to be... > > commit d6941c0c6bd42c725e45240a86c4add92e9bfb3e > "KEYS: Separate the kernel signature checking keyring from module signing" Try updating. I pushed a new version out today. This is now at commit ID c82af351e270e0d95059d09a1975b61494fbbcd7. Davi

Re: [PATCH] include/keys/system_keyring.h: fix building error

2013-01-18 Thread David Howells
Cong Ding wrote: > When I am doing "make randconfig", it causes the following building error if > CONFIG_SYSTEM_TRUSTED_KEYRING is not defined and CONFIG_MODULE_SIG is defined. Can you tell me what you're doing your build upon? > -#ifdef CONFIG_SYSTEM_TRUSTED_KEYRING > +#if defined(CONFIG_SYSTE

Re: [PATCH next-20130118 1/2] KEYS: Fix build-error when SYSTEM_TRUSTED_KEYRING=n

2013-01-18 Thread David Howells
Sedat Dilek wrote: > - select KEYS > + depends on KEYS This change was pushed upstream a few hours ago. It may not have made it into linux-next yet. David -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org Mo

Re: [PATCH 09/37] Security: Allow kernel services to override LSM settings for task actions

2008-02-22 Thread David Howells
Casey Schaufler <[EMAIL PROTECTED]> wrote: > > +static int smack_task_kernel_act_as(struct task_struct *p, > > + struct task_security *sec, u32 secid) > > +{ > > + return -ENOTSUPP; > > +} > ... > > +static int smack_task_create_files_as(struct task_struct *p, > > +

Re: [PATCH 00/37] Permit filesystem local caching

2008-02-22 Thread David Howells
David Howells <[EMAIL PROTECTED]> wrote: > > > Have you got before/after benchmark results? > > > > See attached. > > Attached here are results using BTRFS (patched so that it'll work at all) > rather than Ext3 on the client on the partition backing the

Re: [PATCH 00/37] Permit filesystem local caching

2008-02-22 Thread David Howells
Chris Mason <[EMAIL PROTECTED]> wrote: > > The interesting case is where the disk cache is warm, but the pagecache is > > cold (ie: just after a reboot after filling the caches). Here, for the two > > big files case, BTRFS appears quite a bit better than Ext3, showing a 21% > > reduction in time

Re: [PATCH 00/37] Permit filesystem local caching

2008-02-22 Thread David Howells
Chris Mason <[EMAIL PROTECTED]> wrote: > Thanks for trying this, of course I'll ask you to try again with the latest > v0.13 code, it has a number of optimizations especially for CPU usage. Here you go. The numbers are very similar. David = FEW BIG FILES TEST O

Re: [PATCH 00/37] Permit filesystem local caching

2008-02-22 Thread David Howells
Daniel Phillips <[EMAIL PROTECTED]> wrote: > I am eventually going to suggest cutting the backing filesystem entirely out > of the picture, You still need a database to manage the cache. A filesystem such as Ext3 makes a very handy database for four reasons: (1) It exists and works. (2) It h

Re: [PATCH 01/16] Make the macro get_personality function-like.

2008-02-23 Thread David Howells
WANG Cong <[EMAIL PROTECTED]> wrote: > This patch makes the macro get_personality function-like. > > Signed-off-by: WANG Cong <[EMAIL PROTECTED]> Acked-By: David Howells <[EMAIL PROTECTED]> -- To unsubscribe from this list: send the line "unsubscribe linux-ker

Re: [PATCH 14/16] frv: use get_personality()

2008-02-23 Thread David Howells
WANG Cong <[EMAIL PROTECTED]> wrote: > Use get_personality() macro instead of explicit reference > for frv code. > > Signed-off-by: WANG Cong <[EMAIL PROTECTED]> Acked-By: David Howells <[EMAIL PROTECTED]> -- To unsubscribe from this list: send the line "unsub

Re: [PATCH 15/16] mn10300: use get_personality()

2008-02-23 Thread David Howells
WANG Cong <[EMAIL PROTECTED]> wrote: > Use get_personality() macro instead of explicit reference > for mn10300 code. > > Signed-off-by: WANG Cong <[EMAIL PROTECTED]> Acked-By: David Howells <[EMAIL PROTECTED]> -- To unsubscribe from this list: send the line "un

Re: + kthread-add-a-missing-memory-barrier-to-kthread_stop.patch added to -mm tree

2008-02-25 Thread David Howells
Dmitry Adamushko <[EMAIL PROTECTED]> wrote: > (3) > > LOCK > > LOAD(a) > MODIFY(b) > > UNLOCK > > and this last one is a problem. No? I assume you meant: LOCK LOAD(b) MODIFY(a) UNLOCK David -- To unsubscribe from this list: send the line "unsubscribe linux-ke

Re: [PATCH 00/37] Permit filesystem local caching

2008-02-25 Thread David Howells
Daniel Phillips <[EMAIL PROTECTED]> wrote: > This factor of four (even worse on XFS, not quite as bad on Ext3) is > worth ruminating upon. Is all of the difference explained by avoiding > seeks on the server, which has the files in memory? Here are some more stats for you to consider: (1) Cop

Re: [PATCH 00/37] Permit filesystem local caching

2008-02-25 Thread David Howells
Daniel Phillips <[EMAIL PROTECTED]> wrote: > On Monday 25 February 2008 15:19, David Howells wrote: > > So I guess there's a problem in cachefiles's efficiency - possibly due > > to the fact that it tries to be fully asynchronous. > > OK, not just my ima

Re: [PATCH] Make the kernel NTP code hand 64-bit *unsigned* values to do_div()

2008-02-25 Thread David Howells
Roman Zippel <[EMAIL PROTECTED]> wrote: > I would actually prefer to introduce an explicit API for signed 64 > divides to get rid of the temps completely Yeah, that's a better plan. David -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMA

Re: [PATCH 00/37] Permit filesystem local caching

2008-02-26 Thread David Howells
Daniel Phillips <[EMAIL PROTECTED]> wrote: > I need to respond to this in pieces... first the bit that is bugging > me: > > > > * two new page flags > > > > I need to keep track of two bits of per-cached-page information: > > > > (1) This page is known by the cache, and that the cache must b

[PATCH] MPILIB: Provide count_leading/trailing_zeros() based on arch functions

2012-07-06 Thread David Howells
ed in using it. Signed-off-by: David Howells Cc: David S. Miller Cc: Dmitry Kasatkin Cc: Arnd Bergmann --- include/asm-generic/bitops/count_zeros.h | 57 lib/mpi/longlong.h | 138 -- lib/mpi/mpi-bit.c|

[PATCH] cred: Remove tgcred pointer from struct cred

2013-01-09 Thread David Howells
From: Marc Dionne Commit 3a50597de86 in mainline removed the definition of the thread_group_cred structure, but left a now unused pointer in struct cred. Signed-off-by: Marc Dionne Signed-off-by: David Howells --- include/linux/cred.h |1 - 1 file changed, 1 deletion(-) diff --git a

rw_semaphore bug

2001-04-04 Thread David Howells
I've found a bug in the write path of the read/write semaphore stuff (at least for the i386 arch). The attached kernel module (rwsem.c) and driver program (driver.c) demonstrate it. What happens is that once the driver finishes, you end up with a whole load of processes forked off of driver that

Re: rw_semaphores

2001-04-10 Thread David Howells
Since you're willing to use CMPXCHG in your suggested implementation, would it make it make life easier if you were willing to use XADD too? Plus, are you really willing to limit the number of readers or writers to be 32767? If so, I think I can suggest a way that limits it to ~65535 apiece inst

[PATCH] i386 rw_semaphores fix

2001-04-10 Thread David Howells
e obtained as well as write locks and a revised driver program (driver.c) that can use rwsem.c. Try the following tests: driver -200 & driver 200 # fork 200 writers and then 200 readers driver 200 & driver -200 # fork 200 readers and then 200 writers David Howells diff -uN

Re: [PATCH] i386 rw_semaphores fix

2001-04-11 Thread David Howells
Can CONFIG_X86_XADD be equated to CONFIG_X86_CMPXCHG? David - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/

[PATCH] 2nd try: i386 rw_semaphores fix

2001-04-11 Thread David Howells
_bias_granted, 1)) + rwsemdebug("E\n"); + + /* grant an infinite number of read locks to the readers at the front of the +queue +* - note we increment the 'active part' of the count by the number of readers +just woken, +* less one for the activity decr

Re: [PATCH] 2nd try: i386 rw_semaphores fix

2001-04-11 Thread David Howells
> I'd like you to look over it. It seems newer GCC's (snapshots and the > upcoming 3.0) will be more strict when modifying some values through > assembler-passed pointers - in this case, the passed semaphore structure got > freed too early, causing massive stack corruption on early bootup. > > The

Re: [PATCH] 2nd try: i386 rw_semaphores fix

2001-04-11 Thread David Howells
I've been discussing it with some other kernel and GCC people, and they think that only "memory" is required. > What are the reasons against mentioning sem->count directly as a "=m" > reference? This makes the whole thing less fragile and no more dependent > on the memory layout of the structure

[PATCH] 3rd try: i386 rw_semaphores fix

2001-04-11 Thread David Howells
default: BUG(); - wake_up(&sem->wait); - return sem; -} + } -struct rw_semaphore *rwsem_wake_writer(struct rw_semaphore *sem) -{ - if (xchg(&sem->write_bias_granted, 1)) + rwsemdebug("E\n"); + + /* grant an infinite n

<    3   4   5   6   7   8   9   10   11   12   >