[PATCH 4.14 20/43] sunrpc: fix refcount leak for rpc auth modules

2021-03-22 Thread Greg Kroah-Hartman
From: Daniel Kobras commit f1442d6349a2e7bb7a6134791bdc26cb776c79af upstream. If an auth module's accept op returns SVC_CLOSE, svc_process_common() enters a call path that does not call svc_authorise() before leaving the function, and thus leaks a reference on the auth module's refcount. Hence

[PATCH 4.9 11/25] sunrpc: fix refcount leak for rpc auth modules

2021-03-22 Thread Greg Kroah-Hartman
From: Daniel Kobras commit f1442d6349a2e7bb7a6134791bdc26cb776c79af upstream. If an auth module's accept op returns SVC_CLOSE, svc_process_common() enters a call path that does not call svc_authorise() before leaving the function, and thus leaks a reference on the auth module's refcount. Hence

[PATCH 4.19 17/43] sunrpc: fix refcount leak for rpc auth modules

2021-03-22 Thread Greg Kroah-Hartman
From: Daniel Kobras commit f1442d6349a2e7bb7a6134791bdc26cb776c79af upstream. If an auth module's accept op returns SVC_CLOSE, svc_process_common() enters a call path that does not call svc_authorise() before leaving the function, and thus leaks a reference on the auth module's refcount. Hence

[PATCH 5.4 26/60] sunrpc: fix refcount leak for rpc auth modules

2021-03-22 Thread Greg Kroah-Hartman
From: Daniel Kobras commit f1442d6349a2e7bb7a6134791bdc26cb776c79af upstream. If an auth module's accept op returns SVC_CLOSE, svc_process_common() enters a call path that does not call svc_authorise() before leaving the function, and thus leaks a reference on the auth module's refcount. Hence

[PATCH 5.10 048/157] sunrpc: fix refcount leak for rpc auth modules

2021-03-22 Thread Greg Kroah-Hartman
From: Daniel Kobras commit f1442d6349a2e7bb7a6134791bdc26cb776c79af upstream. If an auth module's accept op returns SVC_CLOSE, svc_process_common() enters a call path that does not call svc_authorise() before leaving the function, and thus leaks a reference on the auth module's refcount. Hence

[PATCH 5.11 053/120] sunrpc: fix refcount leak for rpc auth modules

2021-03-22 Thread Greg Kroah-Hartman
From: Daniel Kobras commit f1442d6349a2e7bb7a6134791bdc26cb776c79af upstream. If an auth module's accept op returns SVC_CLOSE, svc_process_common() enters a call path that does not call svc_authorise() before leaving the function, and thus leaks a reference on the auth module's refcount. Hence

[PATCH v7 22/23] arm64: cpufeatures: Allow disabling of Pointer Auth from the command-line

2021-02-08 Thread Marc Zyngier
In order to be able to disable Pointer Authentication at runtime, whether it is for testing purposes, or to work around HW issues, let's add support for overriding the ID_AA64ISAR1_EL1.{GPI,GPA,API,APA} fields. This is further mapped on the arm64.nopauth command-line alias. Signed-off-by: Marc

[PATCH v6 21/21] arm64: cpufeatures: Allow disabling of Pointer Auth from the command-line

2021-02-01 Thread Marc Zyngier
In order to be able to disable Pointer Authentication at runtime, whether it is for testing purposes, or to work around HW issues, let's add support for overriding the ID_AA64ISAR1_EL1.{GPI,GPA,API,APA} fields. This is further mapped on the arm64.nopauth command-line alias. Signed-off-by: Marc

Re: [PATCH v4 21/21] arm64: cpufeatures: Allow disabling of Pointer Auth from the command-line

2021-01-26 Thread Srinivas Ramana
Hi Marc, On 1/23/2021 6:28 AM, Catalin Marinas wrote: On Mon, Jan 18, 2021 at 09:45:33AM +, Marc Zyngier wrote: In order to be able to disable Pointer Authentication at runtime, whether it is for testing purposes, or to work around HW issues, let's add support for overriding the

[PATCH v5 21/21] arm64: cpufeatures: Allow disabling of Pointer Auth from the command-line

2021-01-25 Thread Marc Zyngier
In order to be able to disable Pointer Authentication at runtime, whether it is for testing purposes, or to work around HW issues, let's add support for overriding the ID_AA64ISAR1_EL1.{GPI,GPA,API,APA} fields. This is further mapped on the arm64.nopauth command-line alias. Signed-off-by: Marc

Re: [PATCH v4 21/21] arm64: cpufeatures: Allow disabling of Pointer Auth from the command-line

2021-01-23 Thread Catalin Marinas
On Mon, Jan 18, 2021 at 09:45:33AM +, Marc Zyngier wrote: > In order to be able to disable Pointer Authentication at runtime, > whether it is for testing purposes, or to work around HW issues, > let's add support for overriding the ID_AA64ISAR1_EL1.{GPI,GPA,API,APA} > fields. > > This is

[PATCH v4 21/21] arm64: cpufeatures: Allow disabling of Pointer Auth from the command-line

2021-01-18 Thread Marc Zyngier
In order to be able to disable Pointer Authentication at runtime, whether it is for testing purposes, or to work around HW issues, let's add support for overriding the ID_AA64ISAR1_EL1.{GPI,GPA,API,APA} fields. This is further mapped on the arm64.nopauth command-line alias. Signed-off-by: Marc

[PATCH v3 21/21] arm64: cpufeatures: Allow disabling of Pointer Auth from the command-line

2021-01-11 Thread Marc Zyngier
In order to be able to disable Pointer Authentication at runtime, whether it is for testing purposes, or to work around HW issues, let's add support for overriding the ID_AA64ISAR1_EL1.{GPI,GPA,API,APA} fields. This is further mapped on the arm64.nopauth command-line alias. Signed-off-by: Marc

[PATCH 5.9 305/391] ubifs: journal: Make sure to not dirty twice for auth nodes

2020-11-03 Thread Greg Kroah-Hartman
From: Richard Weinberger commit 78c7d49f55d8631b67c09f9bfbe8155211a9ea06 upstream. When removing the last reference of an inode the size of an auth node is already part of write_len. So we must not call ubifs_add_auth_dirt(). Call it only when needed. Cc: Cc: Sascha Hauer Cc: Kristof Havasi

[PATCH 5.4 169/214] ubifs: journal: Make sure to not dirty twice for auth nodes

2020-11-03 Thread Greg Kroah-Hartman
From: Richard Weinberger commit 78c7d49f55d8631b67c09f9bfbe8155211a9ea06 upstream. When removing the last reference of an inode the size of an auth node is already part of write_len. So we must not call ubifs_add_auth_dirt(). Call it only when needed. Cc: Cc: Sascha Hauer Cc: Kristof Havasi

Re: [PATCH] ubifs: journal: Make sure to not dirty twice for auth nodes

2020-09-29 Thread Richard Weinberger
- Ursprüngliche Mail - > Von: "Sascha Hauer" > An: "richard" > CC: "linux-mtd" , "linux-kernel" > , "stable" > , "Kristof Havasi" > Gesendet: Dienstag, 29. September 2020 10:32:32 > Betreff: Re: [PATCH]

Re: [PATCH] ubifs: journal: Make sure to not dirty twice for auth nodes

2020-09-29 Thread Sascha Hauer
On Mon, Sep 28, 2020 at 09:06:12PM +0200, Richard Weinberger wrote: > When removing the last reference of an inode the size of an auth node > is already part of write_len. So we must not call ubifs_add_auth_dirt(). > Call it only when needed. > > Cc: > Cc: Sascha Hauer &g

[PATCH] ubifs: journal: Make sure to not dirty twice for auth nodes

2020-09-28 Thread Richard Weinberger
When removing the last reference of an inode the size of an auth node is already part of write_len. So we must not call ubifs_add_auth_dirt(). Call it only when needed. Cc: Cc: Sascha Hauer Cc: Kristof Havasi Fixes: 6a98bc4614de ("ubifs: Add authentication nodes to journal"

[PATCH 5.7 041/112] Revert "tpm: selftest: cleanup after unseal with wrong auth/policy test"

2020-07-07 Thread Greg Kroah-Hartman
is not used only solely for testing. Fixes: a9920d3bad40 ("tpm: selftest: cleanup after unseal with wrong auth/policy test") Cc: Tadeusz Struk Cc: sta...@vger.kernel.org Cc: linux-integr...@vger.kernel.org Cc: linux-kselft...@vger.kernel.org Signed-off-by: Jarkko Sakkinen Signed-off

[PATCH 1/3] Revert "tpm: selftest: cleanup after unseal with wrong auth/policy test"

2020-06-22 Thread Jarkko Sakkinen
eanup after unseal with wrong auth/policy test") Cc: Tadeusz Struk Cc: sta...@vger.kernel.org Cc: linux-integr...@vger.kernel.org Cc: linux-kselft...@vger.kernel.org Signed-off-by: Jarkko Sakkinen --- tools/testing/selftests/tpm2/test_smoke.sh | 5 - 1 file changed, 5 deletions(-)

Re: [PATCH][next] drm/auth: remove redundant assignment to variable ret

2020-05-25 Thread Daniel Vetter
On Sun, May 24, 2020 at 11:27:15PM +0100, Colin King wrote: > From: Colin Ian King > > The variable ret is being initialized with a value that is > never read and it is being updated later with a new value. The > initialization is redundant and can be removed. > > Addresses-Coverity: ("Unused

[PATCH][next] drm/auth: remove redundant assignment to variable ret

2020-05-24 Thread Colin King
From: Colin Ian King The variable ret is being initialized with a value that is never read and it is being updated later with a new value. The initialization is redundant and can be removed. Addresses-Coverity: ("Unused value") Signed-off-by: Colin Ian King --- drivers/gpu/drm/drm_auth.c | 2

[PATCH 5.6 014/194] SUNRPC: Fix GSS privacy computation of auth->au_ralign

2020-05-18 Thread Greg Kroah-Hartman
s.c +++ b/net/sunrpc/auth_gss/auth_gss.c @@ -2030,7 +2030,6 @@ gss_unwrap_resp_priv(struct rpc_task *task, struct rpc_cred *cred, struct xdr_buf *rcv_buf = >rq_rcv_buf; struct kvec *head = rqstp->rq_rcv_buf.head; struct rpc_auth *auth = cred->cr_auth; - unsigned

[PATCH 5.4 007/147] SUNRPC: Fix GSS privacy computation of auth->au_ralign

2020-05-18 Thread Greg Kroah-Hartman
s.c +++ b/net/sunrpc/auth_gss/auth_gss.c @@ -2030,7 +2030,6 @@ gss_unwrap_resp_priv(struct rpc_task *task, struct rpc_cred *cred, struct xdr_buf *rcv_buf = >rq_rcv_buf; struct kvec *head = rqstp->rq_rcv_buf.head; struct rpc_auth *auth = cred->cr_auth; - unsigned

[PATCH 3.16 82/87] sctp: change to hold sk after auth shkey is created successfully

2019-10-02 Thread Ben Hutchings
3.16.75-rc1 review patch. If anyone has any objections, please let me know. -- From: Xin Long commit 25bff6d5478b2a02368097015b7d8eb727c87e16 upstream. Now in sctp_endpoint_init(), it holds the sk then creates auth shkey. But when the creation fails, it doesn't release the sk

[PATCH -next] staging: rtl8723bs: remove set but not used variables 'prspbuf' and 'auth'

2019-07-31 Thread YueHaibing
rtw_joinbss_cmd: drivers/staging/rtl8723bs/core/rtw_cmd.c:771:6: warning: variable auth set but not used [-Wunused-but-set-variable] They are never used, so can be removed. Reported-by: Hulk Robot Signed-off-by: YueHaibing --- drivers/staging/rtl8723bs/core/rtw_cmd.c | 6 ++ 1 file changed, 2

[PATCH 4.4 40/73] sctp: change to hold sk after auth shkey is created successfully

2019-07-08 Thread Greg Kroah-Hartman
From: Xin Long [ Upstream commit 25bff6d5478b2a02368097015b7d8eb727c87e16 ] Now in sctp_endpoint_init(), it holds the sk then creates auth shkey. But when the creation fails, it doesn't release the sk, which causes a sk defcnf leak, Here to fix it by only holding the sk when auth shkey

[PATCH 4.9 054/102] sctp: change to hold sk after auth shkey is created successfully

2019-07-08 Thread Greg Kroah-Hartman
From: Xin Long [ Upstream commit 25bff6d5478b2a02368097015b7d8eb727c87e16 ] Now in sctp_endpoint_init(), it holds the sk then creates auth shkey. But when the creation fails, it doesn't release the sk, which causes a sk defcnf leak, Here to fix it by only holding the sk when auth shkey

[PATCH 5.1 38/55] sctp: change to hold sk after auth shkey is created successfully

2019-07-02 Thread Greg Kroah-Hartman
From: Xin Long [ Upstream commit 25bff6d5478b2a02368097015b7d8eb727c87e16 ] Now in sctp_endpoint_init(), it holds the sk then creates auth shkey. But when the creation fails, it doesn't release the sk, which causes a sk defcnf leak, Here to fix it by only holding the sk when auth shkey

[PATCH 4.14 32/43] sctp: change to hold sk after auth shkey is created successfully

2019-07-02 Thread Greg Kroah-Hartman
From: Xin Long [ Upstream commit 25bff6d5478b2a02368097015b7d8eb727c87e16 ] Now in sctp_endpoint_init(), it holds the sk then creates auth shkey. But when the creation fails, it doesn't release the sk, which causes a sk defcnf leak, Here to fix it by only holding the sk when auth shkey

[PATCH 4.19 57/72] sctp: change to hold sk after auth shkey is created successfully

2019-07-02 Thread Greg Kroah-Hartman
From: Xin Long [ Upstream commit 25bff6d5478b2a02368097015b7d8eb727c87e16 ] Now in sctp_endpoint_init(), it holds the sk then creates auth shkey. But when the creation fails, it doesn't release the sk, which causes a sk defcnf leak, Here to fix it by only holding the sk when auth shkey

[PATCH 08/10] keys: Grant Link permission to possessers of request_key auth keys [ver #3]

2019-06-19 Thread David Howells
Grant Link permission to the possessers of request_key authentication keys, thereby allowing a daemon that is servicing upcalls to arrange things such that only the necessary auth key is passed to the actual service program and not all the daemon's pending auth keys. Signed-off-by: David Howells

[PATCH 08/10] keys: Grant Link permission to possessers of request_key auth keys [ver #2]

2019-05-30 Thread David Howells
Grant Link permission to the possessers of request_key authentication keys, thereby allowing a daemon that is servicing upcalls to arrange things such that only the necessary auth key is passed to the actual service program and not all the daemon's pending auth keys. Signed-off-by: David Howells

Re: [PATCH 7/7] keys: Grant Link permission to possessers of request_key auth keys

2019-05-28 Thread James Morris
On Wed, 22 May 2019, David Howells wrote: > Grant Link permission to the possessers of request_key authentication keys, > thereby allowing a daemon that is servicing upcalls to arrange things such > that only the necessary auth key is passed to the actual service program >

[PATCH 7/7] keys: Grant Link permission to possessers of request_key auth keys

2019-05-22 Thread David Howells
Grant Link permission to the possessers of request_key authentication keys, thereby allowing a daemon that is servicing upcalls to arrange things such that only the necessary auth key is passed to the actual service program and not all the daemon's pending auth keys. Signed-off-by: David Howells

[PATCH 4.19 077/280] keys: Fix dependency loop between construction record and auth key

2019-03-22 Thread Greg Kroah-Hartman
ook and the userspace side manages to lose the authorisation key, the auth key and the internal construction record (struct key_construction) can keep each other pinned. Fix this by the following changes: (1) Killing off the construction record and using the auth key instead. (2) Including the operation n

[PATCH 4.14 043/183] keys: Fix dependency loop between construction record and auth key

2019-03-22 Thread Greg Kroah-Hartman
ook and the userspace side manages to lose the authorisation key, the auth key and the internal construction record (struct key_construction) can keep each other pinned. Fix this by the following changes: (1) Killing off the construction record and using the auth key instead. (2) Including the operation n

[PATCH AUTOSEL 4.14 07/33] keys: Fix dependency loop between construction record and auth key

2019-03-13 Thread Sasha Levin
From: David Howells [ Upstream commit 822ad64d7e46a8e2c8b8a796738d7b657cbb146d ] In the request_key() upcall mechanism there's a dependency loop by which if a key type driver overrides the ->request_key hook and the userspace side manages to lose the authorisation key, the auth

[PATCH AUTOSEL 4.19 11/48] keys: Fix dependency loop between construction record and auth key

2019-03-13 Thread Sasha Levin
From: David Howells [ Upstream commit 822ad64d7e46a8e2c8b8a796738d7b657cbb146d ] In the request_key() upcall mechanism there's a dependency loop by which if a key type driver overrides the ->request_key hook and the userspace side manages to lose the authorisation key, the auth

[PATCH AUTOSEL 4.20 13/60] keys: Fix dependency loop between construction record and auth key

2019-03-13 Thread Sasha Levin
From: David Howells [ Upstream commit 822ad64d7e46a8e2c8b8a796738d7b657cbb146d ] In the request_key() upcall mechanism there's a dependency loop by which if a key type driver overrides the ->request_key hook and the userspace side manages to lose the authorisation key, the auth

[PATCH 3.18 040/108] NFS: nfs_compare_mount_options always compare auth flavors.

2019-02-18 Thread Greg Kroah-Hartman
auth flavors and instead just always compares auth flavors. Consider the following scenario: You have a server with the address 192.168.1.1 and two exports /export/a and /export/b. The first export supports `sys' and `krb5' security, the second just `sys'. Assume you start with no mounts from

[PATCH 4.4 055/143] NFS: nfs_compare_mount_options always compare auth flavors.

2019-02-18 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 594d1644cd59447f4fceb592448d5cd09eb09b5e ] This patch removes the check from nfs_compare_mount_options to see if a `sec' option was passed for the current mount before comparing auth

[RFC PATCH 16/27] keys: Grant Link permission to possessers of request_key auth keys

2019-02-15 Thread David Howells
Grant Link permission to the possessers of request_key authentication keys, thereby allowing a daemon that is servicing upcalls to arrange things such that only the necessary auth key is passed to the actual service program and not all the daemon's pending auth keys. Signed-off-by: David Howells

[PATCH 3/4] keys: Fix dependency loop between construction record and auth key

2019-02-14 Thread David Howells
In the request_key() upcall mechanism there's a dependency loop by which if a key type driver overrides the ->request_key hook and the userspace side manages to lose the authorisation key, the auth key and the internal construction record (struct key_construction) can keep each other pinned.

[PATCH 4.14 135/205] NFS: nfs_compare_mount_options always compare auth flavors.

2019-02-11 Thread Greg Kroah-Hartman
auth flavors and instead just always compares auth flavors. Consider the following scenario: You have a server with the address 192.168.1.1 and two exports /export/a and /export/b. The first export supports `sys' and `krb5' security, the second just `sys'. Assume you start with no mounts from

[PATCH 4.9 080/137] NFS: nfs_compare_mount_options always compare auth flavors.

2019-02-11 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 594d1644cd59447f4fceb592448d5cd09eb09b5e ] This patch removes the check from nfs_compare_mount_options to see if a `sec' option was passed for the current mount before comparing auth

[PATCH 4.19 209/313] NFS: nfs_compare_mount_options always compare auth flavors.

2019-02-11 Thread Greg Kroah-Hartman
auth flavors and instead just always compares auth flavors. Consider the following scenario: You have a server with the address 192.168.1.1 and two exports /export/a and /export/b. The first export supports `sys' and `krb5' security, the second just `sys'. Assume you start with no mounts from

[PATCH 4.20 249/352] NFS: nfs_compare_mount_options always compare auth flavors.

2019-02-11 Thread Greg Kroah-Hartman
auth flavors and instead just always compares auth flavors. Consider the following scenario: You have a server with the address 192.168.1.1 and two exports /export/a and /export/b. The first export supports `sys' and `krb5' security, the second just `sys'. Assume you start with no mounts from

[PATCH 3.16 130/305] smb3: on kerberos mount if server doesn't specify auth type use krb5

2019-02-03 Thread Ben Hutchings
("sec=krb5") we can fail, as we expected the server to list its supported auth types (OIDs in the spnego blob in the negprot response). Change this so that on krb5 mounts we default to trying krb5 if the server doesn't list its supported protocol mechanisms. Signed-off-by: Steve French

[PATCH AUTOSEL 4.19 218/258] NFS: nfs_compare_mount_options always compare auth flavors.

2019-01-28 Thread Sasha Levin
From: Chris Perl [ Upstream commit 594d1644cd59447f4fceb592448d5cd09eb09b5e ] This patch removes the check from nfs_compare_mount_options to see if a `sec' option was passed for the current mount before comparing auth flavors and instead just always compares auth flavors. Consider

[PATCH AUTOSEL 4.14 140/170] NFS: nfs_compare_mount_options always compare auth flavors.

2019-01-28 Thread Sasha Levin
From: Chris Perl [ Upstream commit 594d1644cd59447f4fceb592448d5cd09eb09b5e ] This patch removes the check from nfs_compare_mount_options to see if a `sec' option was passed for the current mount before comparing auth flavors and instead just always compares auth flavors. Consider

[PATCH AUTOSEL 4.9 083/107] NFS: nfs_compare_mount_options always compare auth flavors.

2019-01-28 Thread Sasha Levin
From: Chris Perl [ Upstream commit 594d1644cd59447f4fceb592448d5cd09eb09b5e ] This patch removes the check from nfs_compare_mount_options to see if a `sec' option was passed for the current mount before comparing auth flavors and instead just always compares auth flavors. Consider

[PATCH AUTOSEL 4.4 62/80] NFS: nfs_compare_mount_options always compare auth flavors.

2019-01-28 Thread Sasha Levin
From: Chris Perl [ Upstream commit 594d1644cd59447f4fceb592448d5cd09eb09b5e ] This patch removes the check from nfs_compare_mount_options to see if a `sec' option was passed for the current mount before comparing auth flavors and instead just always compares auth flavors. Consider

[PATCH AUTOSEL 3.18 46/61] NFS: nfs_compare_mount_options always compare auth flavors.

2019-01-28 Thread Sasha Levin
From: Chris Perl [ Upstream commit 594d1644cd59447f4fceb592448d5cd09eb09b5e ] This patch removes the check from nfs_compare_mount_options to see if a `sec' option was passed for the current mount before comparing auth flavors and instead just always compares auth flavors. Consider

[PATCH AUTOSEL 4.20 261/304] NFS: nfs_compare_mount_options always compare auth flavors.

2019-01-28 Thread Sasha Levin
From: Chris Perl [ Upstream commit 594d1644cd59447f4fceb592448d5cd09eb09b5e ] This patch removes the check from nfs_compare_mount_options to see if a `sec' option was passed for the current mount before comparing auth flavors and instead just always compares auth flavors. Consider

[PATCH 4.4 041/104] arm64: Dont trap host pointer auth use to EL2

2019-01-24 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- [ Backport of upstream commit b3669b1e1c09890d61109a1a8ece2c5b66804714 ] To allow EL0 (and/or EL1) to use pointer authentication functionality, we must ensure that pointer authentication instructions

[PATCH 4.20 016/111] arm64: Dont trap host pointer auth use to EL2

2019-01-21 Thread Greg Kroah-Hartman
4.20-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit b3669b1e1c09890d61109a1a8ece2c5b66804714 ] To allow EL0 (and/or EL1) to use pointer authentication functionality, we must ensure that pointer authentication instructions and

[PATCH 4.19 19/99] arm64: Dont trap host pointer auth use to EL2

2019-01-21 Thread Greg Kroah-Hartman
4.19-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit b3669b1e1c09890d61109a1a8ece2c5b66804714 ] To allow EL0 (and/or EL1) to use pointer authentication functionality, we must ensure that pointer authentication instructions and

[PATCH 4.9 12/51] arm64: Dont trap host pointer auth use to EL2

2019-01-21 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- [ Backport of upstream commit b3669b1e1c09890d61109a1a8ece2c5b66804714 ] To allow EL0 (and/or EL1) to use pointer authentication functionality, we must ensure that pointer authentication instructions

[PATCH 4.14 12/59] arm64: Dont trap host pointer auth use to EL2

2019-01-21 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- [ Backport of upstream commit b3669b1e1c09890d61109a1a8ece2c5b66804714 ] To allow EL0 (and/or EL1) to use pointer authentication functionality, we must ensure that pointer authentication instructions

Re: [PATCH v6 05/13] arm64: Don't trap host pointer auth use to EL2

2018-12-09 Thread Richard Henderson
On 12/7/18 12:39 PM, Kristina Martsenko wrote: > From: Mark Rutland > > To allow EL0 (and/or EL1) to use pointer authentication functionality, > we must ensure that pointer authentication instructions and accesses to > pointer authentication keys are not trapped to EL2. > > This patch ensures

[PATCH v6 05/13] arm64: Don't trap host pointer auth use to EL2

2018-12-07 Thread Kristina Martsenko
From: Mark Rutland To allow EL0 (and/or EL1) to use pointer authentication functionality, we must ensure that pointer authentication instructions and accesses to pointer authentication keys are not trapped to EL2. This patch ensures that HCR_EL2 is configured appropriately when the kernel is

[PATCH 3.18 41/90] smb3: on kerberos mount if server doesnt specify auth type use krb5

2018-11-19 Thread Greg Kroah-Hartman
("sec=krb5") we can fail, as we expected the server to list its supported auth types (OIDs in the spnego blob in the negprot response). Change this so that on krb5 mounts we default to trying krb5 if the server doesn't list its supported protocol mechanisms. Signed-off-by: Steve French

[PATCH 3.18 41/90] smb3: on kerberos mount if server doesnt specify auth type use krb5

2018-11-19 Thread Greg Kroah-Hartman
("sec=krb5") we can fail, as we expected the server to list its supported auth types (OIDs in the spnego blob in the negprot response). Change this so that on krb5 mounts we default to trying krb5 if the server doesn't list its supported protocol mechanisms. Signed-off-by: Steve French

[PATCH 4.4 065/160] smb3: on kerberos mount if server doesnt specify auth type use krb5

2018-11-19 Thread Greg Kroah-Hartman
("sec=krb5") we can fail, as we expected the server to list its supported auth types (OIDs in the spnego blob in the negprot response). Change this so that on krb5 mounts we default to trying krb5 if the server doesn't list its supported protocol mechanisms. Signed-off-by: Steve French

[PATCH 4.4 065/160] smb3: on kerberos mount if server doesnt specify auth type use krb5

2018-11-19 Thread Greg Kroah-Hartman
("sec=krb5") we can fail, as we expected the server to list its supported auth types (OIDs in the spnego blob in the negprot response). Change this so that on krb5 mounts we default to trying krb5 if the server doesn't list its supported protocol mechanisms. Signed-off-by: Steve French

[PATCH 4.19 265/361] smb3: on kerberos mount if server doesnt specify auth type use krb5

2018-11-11 Thread Greg Kroah-Hartman
("sec=krb5") we can fail, as we expected the server to list its supported auth types (OIDs in the spnego blob in the negprot response). Change this so that on krb5 mounts we default to trying krb5 if the server doesn't list its supported protocol mechanisms. Signed-off-by: Steve French

[PATCH 4.19 265/361] smb3: on kerberos mount if server doesnt specify auth type use krb5

2018-11-11 Thread Greg Kroah-Hartman
("sec=krb5") we can fail, as we expected the server to list its supported auth types (OIDs in the spnego blob in the negprot response). Change this so that on krb5 mounts we default to trying krb5 if the server doesn't list its supported protocol mechanisms. Signed-off-by: Steve French

[PATCH 4.18 258/350] smb3: on kerberos mount if server doesnt specify auth type use krb5

2018-11-11 Thread Greg Kroah-Hartman
("sec=krb5") we can fail, as we expected the server to list its supported auth types (OIDs in the spnego blob in the negprot response). Change this so that on krb5 mounts we default to trying krb5 if the server doesn't list its supported protocol mechanisms. Signed-off-by: Steve French

[PATCH 4.18 258/350] smb3: on kerberos mount if server doesnt specify auth type use krb5

2018-11-11 Thread Greg Kroah-Hartman
("sec=krb5") we can fail, as we expected the server to list its supported auth types (OIDs in the spnego blob in the negprot response). Change this so that on krb5 mounts we default to trying krb5 if the server doesn't list its supported protocol mechanisms. Signed-off-by: Steve French

[PATCH 4.14 166/222] smb3: on kerberos mount if server doesnt specify auth type use krb5

2018-11-11 Thread Greg Kroah-Hartman
("sec=krb5") we can fail, as we expected the server to list its supported auth types (OIDs in the spnego blob in the negprot response). Change this so that on krb5 mounts we default to trying krb5 if the server doesn't list its supported protocol mechanisms. Signed-off-by: Steve French

[PATCH 4.14 166/222] smb3: on kerberos mount if server doesnt specify auth type use krb5

2018-11-11 Thread Greg Kroah-Hartman
("sec=krb5") we can fail, as we expected the server to list its supported auth types (OIDs in the spnego blob in the negprot response). Change this so that on krb5 mounts we default to trying krb5 if the server doesn't list its supported protocol mechanisms. Signed-off-by: Steve French

[PATCH 4.9 108/141] smb3: on kerberos mount if server doesnt specify auth type use krb5

2018-11-11 Thread Greg Kroah-Hartman
("sec=krb5") we can fail, as we expected the server to list its supported auth types (OIDs in the spnego blob in the negprot response). Change this so that on krb5 mounts we default to trying krb5 if the server doesn't list its supported protocol mechanisms. Signed-off-by: Steve French

[PATCH 4.9 108/141] smb3: on kerberos mount if server doesnt specify auth type use krb5

2018-11-11 Thread Greg Kroah-Hartman
("sec=krb5") we can fail, as we expected the server to list its supported auth types (OIDs in the spnego blob in the negprot response). Change this so that on krb5 mounts we default to trying krb5 if the server doesn't list its supported protocol mechanisms. Signed-off-by: Steve French

Re: [PATCH] ubifs: auth: add CONFIG_KEYS dependency

2018-11-02 Thread Richard Weinberger
Am Freitag, 2. November 2018, 12:11:22 CET schrieb Arnd Bergmann: > The new authentication support causes a build failure > when CONFIG_KEYS is disabled, so add a dependency. > > fs/ubifs/auth.c: In function 'ubifs_init_authentication': > fs/ubifs/auth.c:249:16: error: implicit declaration of

Re: [PATCH] ubifs: auth: add CONFIG_KEYS dependency

2018-11-02 Thread Richard Weinberger
Am Freitag, 2. November 2018, 12:11:22 CET schrieb Arnd Bergmann: > The new authentication support causes a build failure > when CONFIG_KEYS is disabled, so add a dependency. > > fs/ubifs/auth.c: In function 'ubifs_init_authentication': > fs/ubifs/auth.c:249:16: error: implicit declaration of

[PATCH] ubifs: auth: add CONFIG_KEYS dependency

2018-11-02 Thread Arnd Bergmann
The new authentication support causes a build failure when CONFIG_KEYS is disabled, so add a dependency. fs/ubifs/auth.c: In function 'ubifs_init_authentication': fs/ubifs/auth.c:249:16: error: implicit declaration of function 'request_key'; did you mean 'request_irq'?

[PATCH] ubifs: auth: add CONFIG_KEYS dependency

2018-11-02 Thread Arnd Bergmann
The new authentication support causes a build failure when CONFIG_KEYS is disabled, so add a dependency. fs/ubifs/auth.c: In function 'ubifs_init_authentication': fs/ubifs/auth.c:249:16: error: implicit declaration of function 'request_key'; did you mean 'request_irq'?

[PATCH 3.16 251/366] sctp: fix the issue that the cookie-ack with auth can't get processed

2018-10-14 Thread Ben Hutchings
3.16.60-rc1 review patch. If anyone has any objections, please let me know. -- From: Xin Long commit ce402f044e4e432c296f90eaabb8dbe8f3624391 upstream. When auth is enabled for cookie-ack chunk, in sctp_inq_pop, sctp processes auth chunk first, then continues to the next

[PATCH 3.16 251/366] sctp: fix the issue that the cookie-ack with auth can't get processed

2018-10-14 Thread Ben Hutchings
3.16.60-rc1 review patch. If anyone has any objections, please let me know. -- From: Xin Long commit ce402f044e4e432c296f90eaabb8dbe8f3624391 upstream. When auth is enabled for cookie-ack chunk, in sctp_inq_pop, sctp processes auth chunk first, then continues to the next

[PATCH 16/25] ubifs: Add auth nodes to garbage collector journal head

2018-09-07 Thread Sascha Hauer
= move_node(c, sleb, snod, wbuf); if (err) goto out; + moved = 1; + } + + if (ubifs_authenticated(c) && moved) { + struct ubifs_auth_node *auth; + + auth = k

[PATCH 16/25] ubifs: Add auth nodes to garbage collector journal head

2018-09-07 Thread Sascha Hauer
= move_node(c, sleb, snod, wbuf); if (err) goto out; + moved = 1; + } + + if (ubifs_authenticated(c) && moved) { + struct ubifs_auth_node *auth; + + auth = k

Re: [PATCH 15/25] ubifs: Add auth nodes to garbage collector journal head

2018-08-30 Thread Sascha Hauer
03,7 +409,32 @@ static int move_nodes(struct ubifs_info *c, struct > > ubifs_scan_leb *sleb) > > continue; > > } > > > > + ubifs_shash_update(c, c->jheads[GCHD].log_hash, > > +

Re: [PATCH 15/25] ubifs: Add auth nodes to garbage collector journal head

2018-08-30 Thread Sascha Hauer
03,7 +409,32 @@ static int move_nodes(struct ubifs_info *c, struct > > ubifs_scan_leb *sleb) > > continue; > > } > > > > + ubifs_shash_update(c, c->jheads[GCHD].log_hash, > > +

Re: [PATCH 15/25] ubifs: Add auth nodes to garbage collector journal head

2018-08-27 Thread Richard Weinberger
snod->node, snod->len); > + > err = move_node(c, sleb, snod, wbuf); > + if (err) > + goto out; > + moved = 1; > + } > + > +

Re: [PATCH 15/25] ubifs: Add auth nodes to garbage collector journal head

2018-08-27 Thread Richard Weinberger
snod->node, snod->len); > + > err = move_node(c, sleb, snod, wbuf); > + if (err) > + goto out; > + moved = 1; > + } > + > +

auth c79684fb subscribe linux-kernel luoji...@gmail.com

2018-07-25 Thread aqs luoji
auth c79684fb subscribe linux-kernel luoji...@gmail.com

auth c79684fb subscribe linux-kernel luoji...@gmail.com

2018-07-25 Thread aqs luoji
auth c79684fb subscribe linux-kernel luoji...@gmail.com

[PATCH 15/25] ubifs: Add auth nodes to garbage collector journal head

2018-07-04 Thread Sascha Hauer
snod->node, snod->len); + err = move_node(c, sleb, snod, wbuf); + if (err) + goto out; + moved = 1; + } + + if (ubifs_authenticated(c

[PATCH 15/25] ubifs: Add auth nodes to garbage collector journal head

2018-07-04 Thread Sascha Hauer
snod->node, snod->len); + err = move_node(c, sleb, snod, wbuf); + if (err) + goto out; + moved = 1; + } + + if (ubifs_authenticated(c

[PATCH 4.4 18/92] sctp: fix the issue that the cookie-ack with auth cant get processed

2018-05-24 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Xin Long <lucien@gmail.com> [ Upstream commit ce402f044e4e432c296f90eaabb8dbe8f3624391 ] When auth is enabled for cookie-ack chunk, in sctp_inq_pop, sctp processes auth chunk

[PATCH 4.4 18/92] sctp: fix the issue that the cookie-ack with auth cant get processed

2018-05-24 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Xin Long [ Upstream commit ce402f044e4e432c296f90eaabb8dbe8f3624391 ] When auth is enabled for cookie-ack chunk, in sctp_inq_pop, sctp processes auth chunk first, then continues to the next

[PATCH 3.18 15/45] sctp: fix the issue that the cookie-ack with auth cant get processed

2018-05-24 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Xin Long <lucien@gmail.com> [ Upstream commit ce402f044e4e432c296f90eaabb8dbe8f3624391 ] When auth is enabled for cookie-ack chunk, in sctp_inq_pop, sctp processes auth chunk

[PATCH 3.18 15/45] sctp: fix the issue that the cookie-ack with auth cant get processed

2018-05-24 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Xin Long [ Upstream commit ce402f044e4e432c296f90eaabb8dbe8f3624391 ] When auth is enabled for cookie-ack chunk, in sctp_inq_pop, sctp processes auth chunk first, then continues to the next

[PATCH 4.16 24/55] sctp: fix the issue that the cookie-ack with auth cant get processed

2018-05-18 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Xin Long <lucien@gmail.com> [ Upstream commit ce402f044e4e432c296f90eaabb8dbe8f3624391 ] When auth is enabled for cookie-ack chunk, in sctp_inq_pop, sctp processes auth chunk

[PATCH 4.16 24/55] sctp: fix the issue that the cookie-ack with auth cant get processed

2018-05-18 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Xin Long [ Upstream commit ce402f044e4e432c296f90eaabb8dbe8f3624391 ] When auth is enabled for cookie-ack chunk, in sctp_inq_pop, sctp processes auth chunk first, then continues to the next

[PATCH 4.14 23/45] sctp: fix the issue that the cookie-ack with auth cant get processed

2018-05-18 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Xin Long <lucien@gmail.com> [ Upstream commit ce402f044e4e432c296f90eaabb8dbe8f3624391 ] When auth is enabled for cookie-ack chunk, in sctp_inq_pop, sctp processes auth chunk

[PATCH 4.14 23/45] sctp: fix the issue that the cookie-ack with auth cant get processed

2018-05-18 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Xin Long [ Upstream commit ce402f044e4e432c296f90eaabb8dbe8f3624391 ] When auth is enabled for cookie-ack chunk, in sctp_inq_pop, sctp processes auth chunk first, then continues to the next

[PATCH 4.9 24/33] sctp: fix the issue that the cookie-ack with auth cant get processed

2018-05-18 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Xin Long <lucien@gmail.com> [ Upstream commit ce402f044e4e432c296f90eaabb8dbe8f3624391 ] When auth is enabled for cookie-ack chunk, in sctp_inq_pop, sctp processes auth chunk

[PATCH 4.9 24/33] sctp: fix the issue that the cookie-ack with auth cant get processed

2018-05-18 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Xin Long [ Upstream commit ce402f044e4e432c296f90eaabb8dbe8f3624391 ] When auth is enabled for cookie-ack chunk, in sctp_inq_pop, sctp processes auth chunk first, then continues to the next

  1   2   3   4   >