Re: Reiser4: Transparent compression support. Further development and compatibility.

2007-04-30 Thread Mat
Thanks a lot, this 'plugin' seems to be pretty mature already, me & several other GNU/Gentoo users are using it right now for storing more efficiently the portage-tree - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More maj

Re: [PATCH 2/8] KEYS: Provide keyctls to drive the new key type ops for asymmetric keys [ver #2]

2016-07-28 Thread Mat Martineau
c key algorithm is printed in /proc/keys, but is not returned by KEYCTL_PKEY_QUERY or KEYCTL_DESCRIBE. Does it make sense to add the information from key->type->describe() to KEYCTL_PKEY_QUERY or KEYCTL_DESCRIBE? Or add something new like KEYCTL_DESCRIBE_TYPE? -- Mat Martineau Intel OTC

Re: [PATCH] uapi/linux/keyctl.h: don't use C++ reserved keyword as a struct member name

2018-04-11 Thread Mat Martineau
ot;dh_private" instead to allow the header file to be used in C++ userspace. Fixes: https://bugzilla.kernel.org/show_bug.cgi?id=191051 Ugh. Yeah. This is a UAPI breaker, but I think we have to do it, despite it being 2 years old. Maybe wrap that element in a #ifdef so it's still allowed

Re: [MPTCP][PATCH net-next] mptcp: clear use_ack and use_map when dropping other suboptions

2020-12-15 Thread Mat Martineau
it can be resubmitted as [PATCH net]. In any case, the content is good: Reviewed-by: Mat Martineau -- Mat Martineau Intel

Re: [RFC PATCH] KEYS: Provide keyctls to do public key operations

2016-04-15 Thread Mat Martineau
t(key); + return ret; +} + +static void keyctl_pkey_params_free(struct kernel_pkey_params *params) +{ + kfree(params->info); + key_put(params->key); + key_put(params->password); +} + +enum { + Opt_err = -1, + Opt_enc,/* "enc=" eg. &q

Re: [RFC PATCH 2/8] KEYS: Provide keyctls to drive the new key type ops for asymmetric keys [ver 3]

2016-05-11 Thread Mat Martineau
eed to check for NULL asym_eds_op before calling. Regards, -- Mat Martineau Intel OTC

Re: [RFC PATCH 5/8] KEYS: Provide software public key query function [ver 3]

2016-05-11 Thread Mat Martineau
ize = len; + info->max_enc_size = len; + info->max_dec_size = len; If len > UINT16_MAX, should UINT16_MAX be reported as the max size? Similar question for len*8 and key_size. -- Mat Martineau Intel OTC

Re: [RFC PATCH 8/8] KEYS: Implement PKCS#8 RSA Private Key parser [ver 3]

2016-05-11 Thread Mat Martineau
-asn1.h + +clean-files+= pkcs8-asn1.c pkcs8-asn1.h -- Mat Martineau Intel OTC

Re: [PATCH v6 6/6] crypto: AF_ALG - add support for key_id

2016-05-25 Thread Mat Martineau
ed with all the requisite plumbing to the asymmetric key subtype. -- Mat Martineau Intel OTC

Re: [RFC PATCH 5/8] KEYS: Provide software public key query function [ver 3]

2016-05-12 Thread Mat Martineau
On Thu, 12 May 2016, David Howells wrote: Mat Martineau wrote: + len = crypto_akcipher_maxsize(tfm); + info->key_size = len * 8; + info->max_data_size = len; + info->max_sig_size = len; + info->max_enc_size = len; + info->max_dec_size

Re: [PATCH RESEND v5 6/6] crypto: AF_ALG - add support for key_id

2016-05-13 Thread Mat Martineau
akcipher_request *req) ... + ret = verify_signature(key, NULL, &sig); key->type->asym_verify_signature() is available as well. Regards, -- Mat Martineau Intel OTC

Re: [RFC PATCH 02/12] PKCS#7: Make trust determination dependent on contents of trust keyring [ver #4]

2016-04-11 Thread Mat Martineau
35891 ("PKCS#7: pkcs7_validate_trust(): initialize the _trusted output argument"), right after the local declarations. +struct key *trust_keyring) { struct pkcs7_signed_info *sinfo; struct x509_certificate *p; Regards, -- Mat Martineau Intel OTC

Re: New sysfs interface for privacy screens

2019-10-01 Thread Mat King
On Tue, Oct 1, 2019 at 10:27 AM Greg KH wrote: > > On Tue, Oct 01, 2019 at 10:09:46AM -0600, Mat King wrote: > > Resending in plain text mode > > > > I have been looking into adding Linux support for electronic privacy > > screens which is a feature on some new l

Re: [PATCH 2/2] keys: Fix the use of the C++ keyword "private" in uapi/linux/keyctl.h

2018-09-24 Thread Mat Martineau
l.h: don't use C++ reserved keyword as a struct member name") Signed-off-by: David Howells cc: Randy Dunlap cc: Lubomir Rintel cc: James Morris cc: Mat Martineau cc: Stephan Mueller cc: Andrew Morton cc: Linus Torvalds cc: sta...@vger.kernel.org --- include/uapi/linux/keyctl.h

Re: [PATCH v6 3/6] crypto: AF_ALG -- add asymmetric cipher interface

2016-06-22 Thread Mat Martineau
Stephan and Tadeusz, On Fri, 10 Jun 2016, Tadeusz Struk wrote: On 06/09/2016 11:36 AM, Stephan Mueller wrote: Am Donnerstag, 9. Juni 2016, 11:27:13 schrieb Mat Martineau: Hi Mat, Tadeusz, Ok, after checking the code again, I think that dropping that sanity check should be ok given that

Re: [PATCH 5/8] KEYS: Provide software public key query function [ver #2]

2016-06-23 Thread Mat Martineau
return n >= CRYPTO_MAX_ALG_NAME ? -EINVAL : 0; + } + + if (strcmp(encoding, "raw") == 0) { + strcpy(alg_name, pkey->pkey_algo); + return 0; + } + + return -ENOPKG; +} Regards, -- Mat Martineau Intel OTC

Re: [PATCH v6 3/6] crypto: AF_ALG -- add asymmetric cipher interface

2016-06-08 Thread Mat Martineau
On Wed, 8 Jun 2016, Stephan Mueller wrote: Am Dienstag, 7. Juni 2016, 17:28:07 schrieb Mat Martineau: Hi Mat, + used = ctx->used; + + /* convert iovecs of output buffers into scatterlists */ + while (iov_iter_count(&msg->msg_iter)) { + /* make

Re: [PATCH v6 3/6] crypto: AF_ALG -- add asymmetric cipher interface

2016-06-09 Thread Mat Martineau
On Thu, 9 Jun 2016, Stephan Mueller wrote: Am Mittwoch, 8. Juni 2016, 12:14:49 schrieb Mat Martineau: Hi Mat, On Wed, 8 Jun 2016, Stephan Mueller wrote: Am Dienstag, 7. Juni 2016, 17:28:07 schrieb Mat Martineau: Hi Mat, + used = ctx->used; + + /* convert iovecs of out

Re: [PATCH v6 3/6] crypto: AF_ALG -- add asymmetric cipher interface

2016-06-09 Thread Mat Martineau
On Thu, 9 Jun 2016, Stephan Mueller wrote: Am Donnerstag, 9. Juni 2016, 11:18:04 schrieb Mat Martineau: Hi Mat, Or is your concern that the user space interface restricts things too much and thus prevents a valid use case? The latter - my primary concern is the constraint this places on

Re: [PATCH v8 6/6] crypto: AF_ALG - add support for key_id

2016-07-06 Thread Mat Martineau
On Tue, 5 Jul 2016, Tadeusz Struk wrote: Hi Mat, On 06/29/2016 11:43 AM, Mat Martineau wrote: +ret = verify_signature(key, &sig); +if (!ret) { +req->dst_len = sizeof(digest); I think you fixed the BUG_ON() problem but there's still an issue with the handling o

Re: [PATCH v8 6/6] crypto: AF_ALG - add support for key_id

2016-07-08 Thread Mat Martineau
On Fri, 8 Jul 2016, Tadeusz Struk wrote: Hi Mat, On 07/06/2016 12:38 PM, Mat Martineau wrote: So it looks like the only thing that we need to return to the user in this case is the return code. Do you agree? The way verify_signature is implemented today, the only output is the return code

Re: [PATCH v6 3/6] crypto: AF_ALG -- add asymmetric cipher interface

2016-06-14 Thread Mat Martineau
hould it be set to something like -EALREADY to indicate that data is already queued for a different crypto op? +unlock: + akcipher_data_wakeup(sk); + release_sock(sk); + + return err ?: copied; +} Regards, -- Mat Martineau Intel OTC

Re: [PATCH 6/9] efi: Add EFI signature data types

2016-11-16 Thread Mat Martineau
_be_signed_hash; + efi_time_t time_of_revocation; +} efi_cert_x509_sha256_t; + /* * All runtime access to EFI goes through this structure: */ -- Mat Martineau Intel OTC

Re: [PATCH v6 3/6] crypto: AF_ALG -- add asymmetric cipher interface

2016-06-07 Thread Mat Martineau
/* ensure output buffer is sufficiently large */ + if (usedpages < akcipher_calcsize(ctx)) { + err = -EMSGSIZE; + goto unlock; + } Why is the size of the output buffer enforced here instead of depending on the algorithm implementation? Thanks, Mat +

Re: [PATCH v8 6/6] crypto: AF_ALG - add support for key_id

2016-06-29 Thread Mat Martineau
y in a TPM) can or can not provide the digest needed. Maybe this is why the verify_signature hook in struct asymmetric_key_subtype is optional. + scatterwalk_map_and_copy(digest, req->dst, 0, req->dst_len, 1); + } + kfree(src); + return ret; +} + -- Mat Martineau Intel OTC

Re: [PATCH] mptcp: use list_first_entry_or_null

2020-06-12 Thread Mat Martineau
when David announces that it is open again. The change does look ok but will not be merged now. Thanks for your patch, -- Mat Martineau Intel

Re: linux-next: manual merge of the net-next tree with the net tree

2020-10-01 Thread Mat Martineau
WRITE_ONCE() in __mptcp_move_skb() as your conflict resolution does, or I can submit a patch later to add the WRITE_ONCE() in that location. The latter is what I suggested to David when submitting the patch to the net tree. Thanks, Mat diff --cc net/mptcp/protocol.c index 5d747c6a610

Re: linux-next: manual merge of the net-next tree with the net tree

2020-10-01 Thread Mat Martineau
in(struct mptcp_sock *msk, u64 data_fin_seq, bool use_64bit); + void mptcp_destroy_common(struct mptcp_sock *msk); Yes, this is the appropriate conflict resolution. Thanks! -- Mat Martineau Intel

Re: [PATCH 1/4] power_supply: Cleanup power supply sysfs attribute list

2020-05-04 Thread Mat King
On Fri, May 1, 2020 at 6:32 PM Sebastian Reichel wrote: > > Hi, > > On Fri, Apr 24, 2020 at 11:35:30AM -0600, Mathew King wrote: > > Make the device attribute list used to create sysfs attributes more > > robust by decoupling the list order from order of the enum defined in > > power_supply.h. Thi

Re: [PATCH] acpi: battery: Always read fresh battery state on update

2020-06-05 Thread Mat King
On Fri, Jun 5, 2020 at 5:30 AM Rafael J. Wysocki wrote: > > On Thu, Jun 4, 2020 at 9:57 PM Mathew King wrote: > > > > When the ACPI battery receives a notification event it should always > > read the battery state fresh from the ACPI device and not use the cached > > state. > > Why should it? Ac

Re: Trying to run mptcp on my machine

2020-08-31 Thread Mat Martineau
b.com/multipath-tcp/mptcp_net-next/wiki - and we are working on more documentation with the kind of pointers you're looking for. Thanks for trying out MPTCP! -- Mat Martineau Intel

Re: [PATCH net] selftests: mptcp: depends on built-in IPv6

2020-10-21 Thread Mat Martineau
df5 ("mptcp: MPTCP_IPV6 should depend on IPV6 instead of selecting it") Signed-off-by: Matthieu Baerts --- tools/testing/selftests/net/mptcp/config | 1 + 1 file changed, 1 insertion(+) Reviewed-by: Mat Martineau -- Mat Martineau Intel

Re: [PATCH][next] mptcp: fix a dereference of pointer before msk is null checked.

2020-11-11 Thread Mat Martineau
.org/project/netdev/patch/078a2ef5bdc4e3b2c25ef852461692001f426495.1604976945.git.geliangt...@gmail.com/ Thanks! -- Mat Martineau Intel

Re: [MPTCP][PATCH net-next 01/16] mptcp: rename addr_signal and the related functions

2020-09-24 Thread Mat Martineau
| 12 ++-- net/mptcp/protocol.h | 10 +- 3 files changed, 18 insertions(+), 18 deletions(-) Reviewed-by: Mat Martineau -- Mat Martineau Intel

Re: [MPTCP][PATCH net-next 02/16] mptcp: add the outgoing RM_ADDR support

2020-09-24 Thread Mat Martineau
Abeni Signed-off-by: Geliang Tang --- net/mptcp/options.c | 29 + net/mptcp/pm.c | 25 + net/mptcp/protocol.h | 9 + 3 files changed, 63 insertions(+) Reviewed-by: Mat Martineau -- Mat Martineau Intel

Re: [MPTCP][PATCH net-next 03/16] mptcp: add the incoming RM_ADDR support

2020-09-24 Thread Mat Martineau
status, and called mptcp_pm_nl_rm_addr_received to handle it. In mptcp_pm_nl_rm_addr_received, we closed the subflow matching the rm_id, and updated PM counter. Suggested-by: Matthieu Baerts Suggested-by: Paolo Abeni Suggested-by: Mat Martineau Signed-off-by: Geliang Tang --- net/mptcp/options.c

Re: [MPTCP][PATCH net-next 08/16] mptcp: remove addr and subflow in PM netlink

2020-09-24 Thread Mat Martineau
need to move __mptcp_init_sock before the mptcp_is_enabled check in mptcp_init_sock. Suggested-by: Matthieu Baerts Suggested-by: Paolo Abeni Suggested-by: Mat Martineau Acked-by: Paolo Abeni Signed-off-by: Geliang Tang --- net/mptcp/pm.c | 7 ++- net/mptcp/pm_netlink.c | 122

Re: [MPTCP][PATCH net-next 10/16] mptcp: add RM_ADDR related mibs

2020-09-24 Thread Mat Martineau
Baerts Suggested-by: Paolo Abeni Suggested-by: Mat Martineau Acked-by: Paolo Abeni Signed-off-by: Geliang Tang --- net/mptcp/mib.c| 2 ++ net/mptcp/mib.h| 2 ++ net/mptcp/pm_netlink.c | 5 + 3 files changed, 9 insertions(+) Reviewed-by: Mat Martineau -- Mat Martineau Intel

Re: [MPTCP][PATCH net-next 11/16] mptcp: add mptcp_destroy_common helper

2020-09-24 Thread Mat Martineau
| 1 + net/mptcp/subflow.c | 4 +--- 3 files changed, 10 insertions(+), 6 deletions(-) Reviewed-by: Mat Martineau -- Mat Martineau Intel

Re: [MPTCP][PATCH net-next 12/16] selftests: mptcp: add remove cfg in mptcp_connect

2020-09-24 Thread Mat Martineau
can be sent and received completely. Otherwise the remove address and subflow test cases don't work. Suggested-by: Matthieu Baerts Suggested-by: Paolo Abeni Suggested-by: Mat Martineau Acked-by: Paolo Abeni Signed-off-by: Geliang Tang --- .../selftests/net/mptcp/mptcp_connect.c

Re: [MPTCP][PATCH net-next 14/16] mptcp: add struct mptcp_pm_add_entry

2020-09-24 Thread Mat Martineau
On Thu, 24 Sep 2020, Geliang Tang wrote: Add a new struct mptcp_pm_add_entry to describe add_addr's entry. Acked-by: Paolo Abeni Signed-off-by: Geliang Tang --- net/mptcp/pm_netlink.c | 19 --- 1 file changed, 12 insertions(+), 7 deletions(-) Reviewed-by: Mat Mart

Re: [MPTCP][PATCH net-next 13/16] selftests: mptcp: add remove addr and subflow test cases

2020-09-24 Thread Mat Martineau
hieu Baerts Suggested-by: Paolo Abeni Suggested-by: Mat Martineau Acked-by: Paolo Abeni Signed-off-by: Geliang Tang --- .../testing/selftests/net/mptcp/mptcp_join.sh | 145 +- 1 file changed, 142 insertions(+), 3 deletions(-) Reviewed-by: Mat Martineau -- Mat Martineau Intel

Re: [MPTCP][PATCH net-next 15/16] mptcp: add sk_stop_timer_sync helper

2020-09-24 Thread Mat Martineau
changed, 9 insertions(+) Reviewed-by: Mat Martineau -- Mat Martineau Intel

Re: [MPTCP][PATCH net-next 16/16] mptcp: retransmit ADD_ADDR when timeout

2020-09-24 Thread Mat Martineau
On Thu, 24 Sep 2020, Geliang Tang wrote: This patch implemented the retransmition of ADD_ADDR when no ADD_ADDR echo is received. It added a timer with the announced address. When timeout occurs, ADD_ADDR will be retransmitted. Suggested-by: Mat Martineau Suggested-by: Paolo Abeni Acked-by

Re: [PATCH] platform/chrome: fix a double-unlock issue

2020-06-26 Thread Mat King
On Thu, Jun 25, 2020 at 2:26 AM Enric Balletbo i Serra wrote: > > Hi Qiushi, > > Thank you for your patch. > > On 23/5/20 5:16, wu000...@umn.edu wrote: > > From: Qiushi Wu > > > > In function cros_ec_ishtp_probe(), "up_write" is already called > > before function "cros_ec_dev_init". But "up_write

Re: [PATCH] KEYS: reject NULL restriction string when type is specified

2017-11-30 Thread Mat Martineau
I did not find any issues in the patch. Thanks, Mat Reported-by: syzbot Fixes: 97d3aa0f3134 ("KEYS: Add a lookup_restriction function for the asymmetric key type") Cc: # v4.12+ Signed-off-by: Eric Biggers --- security/keys/keyctl.c | 24 ++-- 1 file chan

Re: [PATCH v2] lib/mpi: call cond_resched() from mpi_powm() loop

2017-11-08 Thread Mat Martineau
have a chance I'll see if I can find a reproducer. CONFIG_KEY_DH_OPERATIONS and use of mpi_powm() by KEYCTL_DH_COMPUTE goes back to v4.7, when the MPI library was called directly. KPP was not implemented yet. -- Mat Martineau Intel OTC

Re: [PATCH] lib/mpi: call cond_resched() from mpi_powm() loop

2017-11-07 Thread Mat Martineau
the commit message? Thanks for the fix. Mat Cc: sta...@vger.kernel.org # v4.12+ Signed-off-by: Eric Biggers --- lib/mpi/mpi-pow.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/lib/mpi/mpi-pow.c b/lib/mpi/mpi-pow.c index e24388a863a7..f089a52dbbdb 100644 --- a/lib/mpi/mpi-pow.c +++ b/l

Re: [PATCH] KEYS: reject NULL restriction string when type is specified

2017-12-08 Thread Mat Martineau
On Fri, 8 Dec 2017, David Howells wrote: Mat Martineau wrote: Since this fixes the bug for the asymmetric key type and ensures that other key types won't make the same mistake, I agree this is the way to fix it. I did not find any issues in the patch. Can I put that down as a Review