[PATCH v2 2/3] ARM: sunxi: fix the core number of V3s in sunxi README

2017-08-21 Thread Icenowy Zheng
The Allwinner V3s SoC is not quad-core, but single-core. Fix this in the README file. Fixes: b074fede01c0 ("arm: sunxi: add support for V3s SoC") Signed-off-by: Icenowy Zheng --- Documentation/arm/sunxi/README | 9 + 1 file changed, 5 insertions(+), 4 deletions(-)

[PATCH v2 3/3] ARM: sunxi: add support for R40 SoC

2017-08-21 Thread Icenowy Zheng
Allwinner R40 is a new SoC, with Quad Core Cortex-A7 and peripherals like A20. Add support for it. Signed-off-by: Icenowy Zheng --- Changes in v2: - Fix alphabetical orders. Documentation/arm/sunxi/README | 6 ++

[PATCH v2 1/3] dt-bindings: add compatible string for Allwinner V3s SoC

2017-08-21 Thread Icenowy Zheng
The compatible string for Allwinner V3s SoC used to be missing. Add it to the binding document. Fixes: b074fede01c0 ("arm: sunxi: add support for V3s SoC") Signed-off-by: Icenowy Zheng --- Documentation/devicetree/bindings/arm/sunxi.txt | 1 + 1 file changed, 1 insertion(+)

Re: [PATCH 2/2] ARM: sunxi: add support for R40 SoC

2017-08-21 Thread icenowy
在 2017-08-21 17:34,Maxime Ripard 写道: Hi, On Sun, Aug 20, 2017 at 01:29:57PM +0800, Icenowy Zheng wrote: Allwinner R40 is a new SoC, with Quad Core Cortex-A7 and peripherals like A20. Add support for it. Signed-off-by: Icenowy Zheng --- Documentation/arm/sunxi/README

Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption

2017-08-21 Thread Eric Biggers
On Tue, Aug 22, 2017 at 10:22:13AM +0800, Anand Jain wrote: > > > > > > > +fscrypt is not guaranteed to protect confidentiality or authenticity > > > > +if an attacker is able to manipulate the filesystem offline prior to > > > > +an authorized user later accessing the filesystem. > > > > > >

Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption

2017-08-21 Thread Theodore Ts'o
On Tue, Aug 22, 2017 at 10:22:13AM +0800, Anand Jain wrote: > > I think AE is the only good solution for this, File-name encryption at > this stage won't solve any kind of Evil Maid attack, (as it was quoted > somewhere else in ML). AE doesn't help at all against the Evil Maid attack, since

RE: [PATCH v3 0/5] fs/dcache: Limit # of negative dentries

2017-08-21 Thread Wangkai (Kevin,C)
> -Original Message- > From: Waiman Long [mailto:long...@redhat.com] > Sent: Monday, August 21, 2017 9:35 PM > To: Wangkai (Kevin,C); Alexander Viro; Jonathan Corbet > Cc: linux-ker...@vger.kernel.org; linux-doc@vger.kernel.org; > linux-fsde...@vger.kernel.org; Paul E. McKenney; Andrew

Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption

2017-08-21 Thread Eric Biggers
On Tue, Aug 22, 2017 at 10:22:30AM +0800, Anand Jain wrote: > > Hi Eric, > > How about a section on the threat model specific to the file-name ? > > (Sorry if I am missing something). > > Thanks, Anand It's already mentioned that filenames are encrypted: "fscrypt protects the

Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption

2017-08-21 Thread Anand Jain
Hi Eric, How about a section on the threat model specific to the file-name ? (Sorry if I am missing something). Thanks, Anand -- To unsubscribe from this list: send the line "unsubscribe linux-doc" in the body of a message to majord...@vger.kernel.org More majordomo info at

Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption

2017-08-21 Thread Anand Jain
+fscrypt is not guaranteed to protect confidentiality or authenticity +if an attacker is able to manipulate the filesystem offline prior to +an authorized user later accessing the filesystem. How does fscrypt / Android protect against Evil Maid attack. ? _However_, an "Evil Maid"

Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption

2017-08-21 Thread Eric Biggers
On Mon, Aug 21, 2017 at 09:44:11PM +0800, Anand Jain wrote: > > > >+fscrypt is not guaranteed to protect confidentiality or authenticity > >+if an attacker is able to manipulate the filesystem offline prior to > >+an authorized user later accessing the filesystem. > > How does fscrypt /

Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption

2017-08-21 Thread Eric Biggers
On Sat, Aug 19, 2017 at 10:32:27PM -0400, Theodore Ts'o wrote: > On Fri, Aug 18, 2017 at 03:06:52PM -0600, Andreas Dilger wrote: > > On Aug 18, 2017, at 1:47 PM, Eric Biggers wrote: > > > +Key hierarchy > > > += > > > + > > > +Master Keys > > > +--- > > >

Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption

2017-08-21 Thread Theodore Ts'o
On Mon, Aug 21, 2017 at 09:44:11PM +0800, Anand Jain wrote: > > > > +fscrypt is not guaranteed to protect confidentiality or authenticity > > +if an attacker is able to manipulate the filesystem offline prior to > > +an authorized user later accessing the filesystem. > > How does fscrypt /

Re: [PATCH v2 1/3] dt-bindings: i2c: Document the POWER system power supply device

2017-08-21 Thread Eddie James
On 08/17/2017 10:11 AM, Rob Herring wrote: On Thu, Aug 10, 2017 at 05:19:44PM -0500, Eddie James wrote: From: "Edward A. James" Signed-off-by: Edward A. James --- .../devicetree/bindings/i2c/ibm,power-ps.txt| 21 + 1

Re: [RFC PATCH 3/3] kbuild: generate *.tab.c and *.tab.h during build

2017-08-21 Thread Rob Herring
On Sat, Aug 19, 2017 at 3:49 AM, Masahiro Yamada wrote: > *.tab.[ch] files are artifacts generated from *.y by using bison. > Instead of running bison, we conventionally version-control > *.tab.[ch]_shipped files and copy them to *.tab.[ch] during build. > > It is

[PATCH v6 03/19] crypto: remove redundant backlog checks on EBUSY

2017-08-21 Thread Gilad Ben-Yossef
Now that -EBUSY return code only indicates backlog queueing we can safely remove the now redundant check for the CRYPTO_TFM_REQ_MAY_BACKLOG flag when -EBUSY is returned. Signed-off-by: Gilad Ben-Yossef --- crypto/ahash.c| 12 +++- crypto/cts.c | 6

[PATCH v6 02/19] crypto: ccp: use -EAGAIN for transient busy indication

2017-08-21 Thread Gilad Ben-Yossef
Replace -EBUSY with -EAGAIN when reporting transient busy indication in the absence of backlog. Signed-off-by: Gilad Ben-Yossef Reviewed-by: Gary R Hook --- drivers/crypto/ccp/ccp-crypto-main.c | 8 +++- drivers/crypto/ccp/ccp-dev.c | 7

[PATCH v6 04/19] crypto: marvell/cesa: remove redundant backlog checks on EBUSY

2017-08-21 Thread Gilad Ben-Yossef
Now that -EBUSY return code only indicates backlog queueing we can safely remove the now redundant check for the CRYPTO_TFM_REQ_MAY_BACKLOG flag when -EBUSY is returned. Signed-off-by: Gilad Ben-Yossef Acked-by: Boris Brezillon ---

[PATCH v6 06/19] crypto: move algif to generic async completion

2017-08-21 Thread Gilad Ben-Yossef
algif starts several async crypto ops and waits for their completion. Move it over to generic code doing the same. Signed-off-by: Gilad Ben-Yossef --- crypto/af_alg.c | 27 --- crypto/algif_aead.c | 8 crypto/algif_hash.c |

[PATCH v6 05/19] crypto: introduce crypto wait for async op

2017-08-21 Thread Gilad Ben-Yossef
Invoking a possibly async. crypto op and waiting for completion while correctly handling backlog processing is a common task in the crypto API implementation and outside users of it. This patch adds a generic implementation for doing so in preparation for using it across the board instead of hand

[PATCH v6 07/19] crypto: move pub key to generic async completion

2017-08-21 Thread Gilad Ben-Yossef
public_key_verify_signature() is starting an async crypto op and waiting for it to complete. Move it over to generic code doing the same. Signed-off-by: Gilad Ben-Yossef --- crypto/asymmetric_keys/public_key.c | 28 1 file changed, 4

[PATCH v6 08/19] crypto: move drbg to generic async completion

2017-08-21 Thread Gilad Ben-Yossef
DRBG is starting an async. crypto op and waiting for it complete. Move it over to generic code doing the same. The code now also passes CRYPTO_TFM_REQ_MAY_SLEEP flag indicating crypto request memory allocation may use GFP_KERNEL which should be perfectly fine as the code is obviously sleeping for

[PATCH v6 10/19] crypto: move testmgr to generic async completion

2017-08-21 Thread Gilad Ben-Yossef
testmgr is starting async. crypto ops and waiting for them to complete. Move it over to generic code doing the same. This also provides a test of the generic crypto async. wait code. Signed-off-by: Gilad Ben-Yossef --- crypto/testmgr.c | 204

[PATCH v6 11/19] fscrypt: move to generic async completion

2017-08-21 Thread Gilad Ben-Yossef
fscrypt starts several async. crypto ops and waiting for them to complete. Move it over to generic code doing the same. Signed-off-by: Gilad Ben-Yossef --- fs/crypto/crypto.c | 28 fs/crypto/fname.c | 36

[PATCH v6 14/19] ima: move to generic async completion

2017-08-21 Thread Gilad Ben-Yossef
ima starts several async crypto ops and waits for their completions. Move it over to generic code doing the same. Signed-off-by: Gilad Ben-Yossef Acked-by: Mimi Zohar --- security/integrity/ima/ima_crypto.c | 56

[PATCH v6 13/19] cifs: move to generic async completion

2017-08-21 Thread Gilad Ben-Yossef
cifs starts an async. crypto op and waits for their completion. Move it over to generic code doing the same. Signed-off-by: Gilad Ben-Yossef Acked-by: Pavel Shilovsky --- fs/cifs/smb2ops.c | 30 -- 1 file changed, 4

[PATCH v6 15/19] crypto: tcrypt: move to generic async completion

2017-08-21 Thread Gilad Ben-Yossef
tcrypt starts several async crypto ops and waits for their completions. Move it over to generic code doing the same. Signed-off-by: Gilad Ben-Yossef --- crypto/tcrypt.c | 84 + 1 file changed, 25 insertions(+), 59

[PATCH v6 17/19] crypto: qce: move to generic async completion

2017-08-21 Thread Gilad Ben-Yossef
The qce driver starts several async crypto ops and waits for their completions. Move it over to generic code doing the same. Signed-off-by: Gilad Ben-Yossef --- drivers/crypto/qce/sha.c | 30 -- 1 file changed, 4 insertions(+), 26 deletions(-)

[PATCH v6 16/19] crypto: talitos: move to generic async completion

2017-08-21 Thread Gilad Ben-Yossef
The talitos driver starts several async crypto ops and waits for their completions. Move it over to generic code doing the same. Signed-off-by: Gilad Ben-Yossef --- drivers/crypto/talitos.c | 38 +- 1 file changed, 5 insertions(+), 33

[PATCH v6 18/19] crypto: mediatek: move to generic async completion

2017-08-21 Thread Gilad Ben-Yossef
The mediatek driver starts several async crypto ops and waits for their completions. Move it over to generic code doing the same. Signed-off-by: Gilad Ben-Yossef Acked-by: Ryder Lee --- drivers/crypto/mediatek/mtk-aes.c | 31

[PATCH v6 19/19] crypto: adapt api sample to use async. op wait

2017-08-21 Thread Gilad Ben-Yossef
The code sample is waiting for an async. crypto op completion. Adapt sample to use the new generic infrastructure to do the same. This also fixes a possible data coruption bug created by the use of wait_for_completion_interruptible() without dealing correctly with an interrupt aborting the wait

[PATCH v6 12/19] dm: move dm-verity to generic async completion

2017-08-21 Thread Gilad Ben-Yossef
dm-verity is starting async. crypto ops and waiting for them to complete. Move it over to generic code doing the same. This also avoids a future potential data coruption bug created by the use of wait_for_completion_interruptible() without dealing correctly with an interrupt aborting the wait

[PATCH v6 09/19] crypto: move gcm to generic async completion

2017-08-21 Thread Gilad Ben-Yossef
gcm is starting an async. crypto op and waiting for it complete. Move it over to generic code doing the same. Signed-off-by: Gilad Ben-Yossef --- crypto/gcm.c | 32 ++-- 1 file changed, 6 insertions(+), 26 deletions(-) diff --git a/crypto/gcm.c

[PATCH v6 00/19] simplify crypto wait for async op

2017-08-21 Thread Gilad Ben-Yossef
Many users of kernel async. crypto services have a pattern of starting an async. crypto op and than using a completion to wait for it to end. This patch set simplifies this common use case in two ways: First, by separating the return codes of the case where a request is queued to a backlog due

Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption

2017-08-21 Thread Anand Jain
+fscrypt is not guaranteed to protect confidentiality or authenticity +if an attacker is able to manipulate the filesystem offline prior to +an authorized user later accessing the filesystem. How does fscrypt / Android protect against Evil Maid attack. ? Thanks, Anand -- To unsubscribe

Re: [PATCH v3 0/5] fs/dcache: Limit # of negative dentries

2017-08-21 Thread Waiman Long
On 08/20/2017 11:23 PM, Wangkai (Kevin,C) wrote: > > Yes, I have add some trace info for the dentry state changed, with dentry > flag and reference count: > > File create: > [ 42.636675] dentry [_1234] 0x880230be8180 flag 0x0 ref 1 ev dentry > alloc > File close: > [ 42.637421]

[PATCH v2 1/2] PM: docs: Describe high-level PM strategies and sleep states

2017-08-21 Thread Rafael J. Wysocki
From: Rafael J. Wysocki Reorganize the power management part of admin-guide by adding a description of major power management strategies supported by the kernel (system-wide and working-state power management) to it and dividing the rest of the material into the

Re: [PATCH 2/2] PM: docs: Delete the obsolete states.txt document

2017-08-21 Thread Rafael J. Wysocki
On Monday, August 21, 2017 9:39:17 AM CEST Markus Heiser wrote: > > > Am 20.08.2017 um 18:06 schrieb Rafael J. Wysocki : > > > > From: Rafael J. Wysocki > > > > The Documentation/power/states.txt document is now redundant and > > sonewhat

Re: [PATCH 1/2] docs: Standardise capitalisation of section headers in core.rst

2017-08-21 Thread Jonathan Corbet
On Mon, 21 Aug 2017 12:15:26 +0300 Jani Nikula wrote: > However, if you want to sphinxify things a little, you could make the > resulting html a little bit nicer with automatic links, and document > maintenance a little bit easier, by replacing the hand written

Re: [PATCH v5 05/19] crypto: introduce crypto wait for async op

2017-08-21 Thread Gilad Ben-Yossef
On Tue, Aug 15, 2017 at 5:23 AM, Jonathan Cameron wrote: > On Mon, 14 Aug 2017 18:21:15 +0300 > Gilad Ben-Yossef wrote: > >> Invoking a possibly async. crypto op and waiting for completion >> while correctly handling backlog processing is a

Re: [dm-devel] [PATCH v5 12/19] dm: move dm-verity to generic async completion

2017-08-21 Thread Gilad Ben-Yossef
On Sat, Aug 19, 2017 at 11:08 PM, Mikulas Patocka wrote: > > > > On Mon, 14 Aug 2017, Gilad Ben-Yossef wrote: > > > dm-verity is starting async. crypto ops and waiting for them to complete. > > Move it over to generic code doing the same. > > > > This also fixes a possible

Re: [PATCH 1/2] PM: docs: Describe high-level PM strategies and sleep states

2017-08-21 Thread Rafael J. Wysocki
On Mon, Aug 21, 2017 at 11:51 AM, Markus Heiser wrote: > Hi Rafael, > > great work, helps me and the world saving fossil fuels ;) Thanks! >> Am 20.08.2017 um 18:05 schrieb Rafael J. Wysocki : >> >> From: Rafael J. Wysocki

Re: [PATCH v7 3/4] lib/cmdline.c Remove quotes symmetrically.

2017-08-21 Thread Michal Suchánek
On Mon, 21 Aug 2017 18:27:12 +0800 Baoquan He wrote: > On 08/17/17 at 10:14pm, Michal Suchanek wrote: > > Remove quotes from argument value only if there is qoute on both > > sides. > > > > Signed-off-by: Michal Suchanek > > Sounds reasonable. Just for

Re: [PATCH 0/2] extend PWM framework to support PWM dead-times

2017-08-21 Thread Thierry Reding
On Mon, Aug 21, 2017 at 01:23:08PM +0300, m18063 wrote: > Hi Thierry, > > Thank you for your response. I added few comments below. > > Thank you, > Claudiu > > On 21.08.2017 11:25, Thierry Reding wrote: > > On Tue, May 09, 2017 at 03:15:51PM +0300, Claudiu Beznea wrote: > >> Hi all, > >> > >>

Re: [PATCH v7 3/4] lib/cmdline.c Remove quotes symmetrically.

2017-08-21 Thread Baoquan He
On 08/17/17 at 10:14pm, Michal Suchanek wrote: > Remove quotes from argument value only if there is qoute on both sides. > > Signed-off-by: Michal Suchanek Sounds reasonable. Just for curiosity, do we have chance to pass in option with a single '"'? > --- >

Re: [PATCH v8 00/20] ILP32 for ARM64

2017-08-21 Thread Yury Norov
On Tue, Aug 08, 2017 at 02:34:11PM +0100, Catalin Marinas wrote: > On Mon, Jul 24, 2017 at 02:26:24PM +0300, Yury Norov wrote: > > This is the 4.12 and linux-next - based kernel patches: > > https://github.com/norov/linux/tree/ilp32-4.12 > > https://github.com/norov/linux/tree/ilp32-20170724 > >

Re: [PATCH 1/2] PM: docs: Describe high-level PM strategies and sleep states

2017-08-21 Thread Markus Heiser
Hi Rafael, great work, helps me and the world saving fossil fuels ;) > Am 20.08.2017 um 18:05 schrieb Rafael J. Wysocki : > > From: Rafael J. Wysocki > > Reorganize the power management part of admin-guide by adding a > description of major

Re: [PATCH 2/2] ARM: sunxi: add support for R40 SoC

2017-08-21 Thread Maxime Ripard
Hi, On Sun, Aug 20, 2017 at 01:29:57PM +0800, Icenowy Zheng wrote: > Allwinner R40 is a new SoC, with Quad Core Cortex-A7 and peripherals > like A20. > > Add support for it. > > Signed-off-by: Icenowy Zheng > --- > Documentation/arm/sunxi/README | 6 ++ >

Re: [PATCH 0/2] extend PWM framework to support PWM dead-times

2017-08-21 Thread Thierry Reding
On Tue, May 09, 2017 at 03:15:51PM +0300, Claudiu Beznea wrote: > Hi all, > > Please give feedback on these patches which extends the PWM > framework in order to support multiple PWM signal types. > Since I didn't receive any inputs on RFC series I'm resending it as > normal patch series. > >

Re: [PATCH 2/2] PM: docs: Delete the obsolete states.txt document

2017-08-21 Thread Markus Heiser
> Am 20.08.2017 um 18:06 schrieb Rafael J. Wysocki : > > From: Rafael J. Wysocki > > The Documentation/power/states.txt document is now redundant and > sonewhat outdated, so delete it. > > Signed-off-by: Rafael J. Wysocki