[PATCH v3 25/25] KVM: x86: Add capability to grant VM access to privileged SGX attribute

2021-03-19 Thread Kai Huang
From: Sean Christopherson Add a capability, KVM_CAP_SGX_ATTRIBUTE, that can be used by userspace to grant a VM access to a priveleged attribute, with args[0] holding a file handle to a valid SGX attribute file. The SGX subsystem restricts access to a subset of enclave attributes to provide

[PATCH v2 25/25] KVM: x86: Add capability to grant VM access to privileged SGX attribute

2021-03-08 Thread Kai Huang
From: Sean Christopherson Add a capability, KVM_CAP_SGX_ATTRIBUTE, that can be used by userspace to grant a VM access to a priveleged attribute, with args[0] holding a file handle to a valid SGX attribute file. The SGX subsystem restricts access to a subset of enclave attributes to provide

[PATCH 25/25] KVM: x86: Add capability to grant VM access to privileged SGX attribute

2021-03-01 Thread Kai Huang
From: Sean Christopherson Add a capability, KVM_CAP_SGX_ATTRIBUTE, that can be used by userspace to grant a VM access to a priveleged attribute, with args[0] holding a file handle to a valid SGX attribute file. The SGX subsystem restricts access to a subset of enclave attributes to provide

[PATCH 5.9 081/105] xen: add helpers for caching grant mapping pages

2020-12-14 Thread Greg Kroah-Hartman
/grant-table.c | 72 + drivers/xen/xen-scsiback.c | 60 include/xen/grant_table.h | 13 + 6 files changed, 116 insertions(+), 128 deletions(-) --- a/drivers/block/xen-blkback/blkback.c +++ b/drivers/block/xen

Re: [PATCH 1/2] xen: add helpers for caching grant mapping pages

2020-12-07 Thread boris . ostrovsky
On 12/7/20 8:30 AM, Juergen Gross wrote: > Instead of having similar helpers in multiple backend drivers use > common helpers for caching pages allocated via gnttab_alloc_pages(). > > Make use of those helpers in blkback and scsiback. > > Signed-off-by: Juergen Gross Reviewed-by: Boris Ostrovs

[PATCH 1/2] xen: add helpers for caching grant mapping pages

2020-12-07 Thread Juergen Gross
++--- drivers/block/xen-blkback/common.h | 4 +- drivers/block/xen-blkback/xenbus.c | 6 +- drivers/xen/grant-table.c | 72 +++ drivers/xen/xen-scsiback.c | 60 --- include/xen/grant_table.h | 13 + 6 files changed, 116 insertions

Re: [PATCH v2] block: grant IOPRIO_CLASS_RT to CAP_SYS_NICE

2020-09-01 Thread Jens Axboe
On 9/1/20 4:49 PM, Khazhismel Kumykov wrote: > On Sat, Aug 29, 2020 at 6:00 PM Bart Van Assche wrote: >> >> From https://www.kernel.org/doc/man-pages/linux-api-ml.html: >> "all Linux kernel patches that change userspace interfaces should be CCed >> to linux-...@vger.kernel.org" >> >> So I have add

Re: [PATCH v2] block: grant IOPRIO_CLASS_RT to CAP_SYS_NICE

2020-09-01 Thread Khazhismel Kumykov
On Sat, Aug 29, 2020 at 6:00 PM Bart Van Assche wrote: > > From https://www.kernel.org/doc/man-pages/linux-api-ml.html: > "all Linux kernel patches that change userspace interfaces should be CCed > to linux-...@vger.kernel.org" > > So I have added the linux-api mailing list to the Cc-list. Anyway:

Re: [PATCH v2] block: grant IOPRIO_CLASS_RT to CAP_SYS_NICE

2020-08-29 Thread Bart Van Assche
On 2020-08-24 15:10, Khazhismel Kumykov wrote: > CAP_SYS_ADMIN is too broad, and ionice fits into CAP_SYS_NICE's grouping. > > Retain CAP_SYS_ADMIN permission for backwards compatibility. > > Signed-off-by: Khazhismel Kumykov > --- > block/ioprio.c | 2 +- > include/uapi/linux/

Re: [PATCH v2] block: grant IOPRIO_CLASS_RT to CAP_SYS_NICE

2020-08-24 Thread Serge E. Hallyn
On Mon, Aug 24, 2020 at 03:10:34PM -0700, Khazhismel Kumykov wrote: > CAP_SYS_ADMIN is too broad, and ionice fits into CAP_SYS_NICE's grouping. > > Retain CAP_SYS_ADMIN permission for backwards compatibility. > > Signed-off-by: Khazhismel Kumykov Acked-by: Serge Hallyn > --- > block/ioprio.c

[PATCH v2] block: grant IOPRIO_CLASS_RT to CAP_SYS_NICE

2020-08-24 Thread Khazhismel Kumykov
CAP_SYS_ADMIN is too broad, and ionice fits into CAP_SYS_NICE's grouping. Retain CAP_SYS_ADMIN permission for backwards compatibility. Signed-off-by: Khazhismel Kumykov --- block/ioprio.c | 2 +- include/uapi/linux/capability.h | 2 ++ 2 files changed, 3 insertions(+), 1 deleti

Re: [PATCH] block: grant IOPRIO_CLASS_RT to CAP_SYS_NICE

2020-08-24 Thread Khazhismel Kumykov
On Mon, Aug 24, 2020 at 1:45 PM Khazhismel Kumykov wrote: > > CAP_SYS_ADMIN is too broad, and ionice fits into CAP_SYS_NICE's grouping. > > Retain CAP_SYS_ADMIN permission for backwards compatibility. > > Signed-off-by: Khazhismel Kumykov > --- > block/ioprio.c | 2 +- > include

[PATCH] block: grant IOPRIO_CLASS_RT to CAP_SYS_NICE

2020-08-24 Thread Khazhismel Kumykov
CAP_SYS_ADMIN is too broad, and ionice fits into CAP_SYS_NICE's grouping. Retain CAP_SYS_ADMIN permission for backwards compatibility. Signed-off-by: Khazhismel Kumykov --- block/ioprio.c | 2 +- include/uapi/linux/capability.h | 2 ++ 2 files changed, 3 insertions(+), 1 deleti

drivers/xen/grant-table.c:747:17: sparse: sparse: incorrect type in argument 1 (different address spaces)

2020-07-17 Thread kernel test robot
ing tag as appropriate Reported-by: kernel test robot sparse warnings: (new ones prefixed by >>) drivers/xen/grant-table.c:739:15: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected void *vaddr @@ got void [noderef] __iomem * @@ drivers/xen/gran

[PATCH] MIPS: Grant pte read permission, even if vma only have VM_WRITE permission.

2020-06-29 Thread Lichao Liu
_user_writeable() to fix the error -> retry; . The first perspective of root cause: Futex think a pte have write permission will have read permission. When page fault, it only try to fixup with FAULT_FLAG_WRITE. The second perspective of root cause: MIPS platform doesn't grant pte r

Grant(info)

2020-05-03 Thread Mr. X
Lieber Bewohner, lieber Die DBZ Project Foundation hat 25 Millionen US-Dollar für Notfallzuschüsse für kleine Unternehmen und einzelne Projekte bereitgestellt. Der Betrag variiert zwischen 300.000,00 USD und 800.000,00 USD pro Antragsteller. Die Bewerbung beginnt am 27. April unter folgender E-

[PATCH 4.4 63/70] xen/xenbus: ensure xenbus_map_ring_valloc() returns proper grant status

2020-05-01 Thread Greg Kroah-Hartman
From: Juergen Gross [ Upstream commit 6b51fd3f65a22e3d1471b18a1d56247e246edd46 ] xenbus_map_ring_valloc() maps a ring page and returns the status of the used grant (0 meaning success). There are Xen hypervisors which might return the value 1 for the status of a failed grant mapping due to a

[PATCH 4.9 71/80] xen/xenbus: ensure xenbus_map_ring_valloc() returns proper grant status

2020-05-01 Thread Greg Kroah-Hartman
From: Juergen Gross [ Upstream commit 6b51fd3f65a22e3d1471b18a1d56247e246edd46 ] xenbus_map_ring_valloc() maps a ring page and returns the status of the used grant (0 meaning success). There are Xen hypervisors which might return the value 1 for the status of a failed grant mapping due to a

[PATCH 4.19 37/46] xen/xenbus: ensure xenbus_map_ring_valloc() returns proper grant status

2020-05-01 Thread Greg Kroah-Hartman
From: Juergen Gross [ Upstream commit 6b51fd3f65a22e3d1471b18a1d56247e246edd46 ] xenbus_map_ring_valloc() maps a ring page and returns the status of the used grant (0 meaning success). There are Xen hypervisors which might return the value 1 for the status of a failed grant mapping due to a

[PATCH 5.4 66/83] xen/xenbus: ensure xenbus_map_ring_valloc() returns proper grant status

2020-05-01 Thread Greg Kroah-Hartman
From: Juergen Gross [ Upstream commit 6b51fd3f65a22e3d1471b18a1d56247e246edd46 ] xenbus_map_ring_valloc() maps a ring page and returns the status of the used grant (0 meaning success). There are Xen hypervisors which might return the value 1 for the status of a failed grant mapping due to a

[PATCH 5.6 082/106] xen/xenbus: ensure xenbus_map_ring_valloc() returns proper grant status

2020-05-01 Thread Greg Kroah-Hartman
From: Juergen Gross [ Upstream commit 6b51fd3f65a22e3d1471b18a1d56247e246edd46 ] xenbus_map_ring_valloc() maps a ring page and returns the status of the used grant (0 meaning success). There are Xen hypervisors which might return the value 1 for the status of a failed grant mapping due to a

[PATCH 4.14 104/117] xen/xenbus: ensure xenbus_map_ring_valloc() returns proper grant status

2020-05-01 Thread Greg Kroah-Hartman
From: Juergen Gross [ Upstream commit 6b51fd3f65a22e3d1471b18a1d56247e246edd46 ] xenbus_map_ring_valloc() maps a ring page and returns the status of the used grant (0 meaning success). There are Xen hypervisors which might return the value 1 for the status of a failed grant mapping due to a

Re: [PATCH] xen/grant-table: remove unnecessary printing

2019-10-10 Thread Jürgen Groß
On 10.10.19 10:32, Fuqian Huang wrote: xen_auto_xlat_grant_frames.vaddr is definitely NULL in this case. So the address printing is unnecessary. Signed-off-by: Fuqian Huang Reviewed-by: Juergen Gross Juergen

[PATCH] xen/grant-table: remove unnecessary printing

2019-10-10 Thread Fuqian Huang
xen_auto_xlat_grant_frames.vaddr is definitely NULL in this case. So the address printing is unnecessary. Signed-off-by: Fuqian Huang --- drivers/xen/grant-table.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/drivers/xen/grant-table.c b/drivers/xen/grant-table.c index

Re: [RFC PATCH 21/21] KVM: x86: Add capability to grant VM access to privileged SGX attribute

2019-07-27 Thread Andy Lutomirski
g > inside a geniune SGX enclave and/or to obtain a stable fingerprint. > > To prevent userspace from circumventing such restrictions by running an > enclave in a VM, KVM restricts guest access to privileged attributes by > default. Add a capability, KVM_CAP_SGX_ATTRIBUTE, that can be use

[RFC PATCH 21/21] KVM: x86: Add capability to grant VM access to privileged SGX attribute

2019-07-26 Thread Sean Christopherson
userspace from circumventing such restrictions by running an enclave in a VM, KVM restricts guest access to privileged attributes by default. Add a capability, KVM_CAP_SGX_ATTRIBUTE, that can be used by userspace to grant a VM access to a priveleged attribute, with args[0] holding a file handle to a

[PATCH 08/10] keys: Grant Link permission to possessers of request_key auth keys [ver #3]

2019-06-19 Thread David Howells
Grant Link permission to the possessers of request_key authentication keys, thereby allowing a daemon that is servicing upcalls to arrange things such that only the necessary auth key is passed to the actual service program and not all the daemon's pending auth keys. Signed-off-by: David Ho

Re: [RFC PATCH 16/16] xen/grant-table: host_addr fixup in mapping on xenhost_r0

2019-06-18 Thread Ankur Arora
On 6/17/19 3:55 AM, Juergen Gross wrote: On 09.05.19 19:25, Ankur Arora wrote: Xenhost type xenhost_r0 does not support standard GNTTABOP_map_grant_ref semantics (map a gref onto a specified host_addr). That's because since the hypervisor is local (same address space as the caller of GNTTABOP_ma

Re: [RFC PATCH 11/16] xen/grant-table: make grant-table xenhost aware

2019-06-18 Thread Ankur Arora
On 6/17/19 2:36 AM, Juergen Gross wrote: On 09.05.19 19:25, Ankur Arora wrote: Largely mechanical changes: the exported grant table symbols now take xenhost_t * as a parameter. Also, move the grant table global state inside xenhost_t. If there's more than one xenhost, then initialize

Re: [RFC PATCH 16/16] xen/grant-table: host_addr fixup in mapping on xenhost_r0

2019-06-17 Thread Juergen Gross
On 09.05.19 19:25, Ankur Arora wrote: Xenhost type xenhost_r0 does not support standard GNTTABOP_map_grant_ref semantics (map a gref onto a specified host_addr). That's because since the hypervisor is local (same address space as the caller of GNTTABOP_map_grant_ref), there is no external entity

Re: [RFC PATCH 11/16] xen/grant-table: make grant-table xenhost aware

2019-06-17 Thread Juergen Gross
On 09.05.19 19:25, Ankur Arora wrote: Largely mechanical changes: the exported grant table symbols now take xenhost_t * as a parameter. Also, move the grant table global state inside xenhost_t. If there's more than one xenhost, then initialize both. Signed-off-by: Ankur Arora --- arc

Re: Loan grant @affordable rate

2019-06-05 Thread Loan Grant
Hello Dear, We are a large Company based in Istanbul Turkey and we offers flexible loans and funding for all projects for as low as 2% interest rate per annum for a period of 5-15 yrs . We invite you to partner with us and benefit in our new Loan and Project funding program. We can approve a

[PATCH 08/10] keys: Grant Link permission to possessers of request_key auth keys [ver #2]

2019-05-30 Thread David Howells
Grant Link permission to the possessers of request_key authentication keys, thereby allowing a daemon that is servicing upcalls to arrange things such that only the necessary auth key is passed to the actual service program and not all the daemon's pending auth keys. Signed-off-by: David Ho

Re: [PATCH 7/7] keys: Grant Link permission to possessers of request_key auth keys

2019-05-28 Thread James Morris
On Wed, 22 May 2019, David Howells wrote: > Grant Link permission to the possessers of request_key authentication keys, > thereby allowing a daemon that is servicing upcalls to arrange things such > that only the necessary auth key is passed to the actual service program > and

[PATCH 7/7] keys: Grant Link permission to possessers of request_key auth keys

2019-05-22 Thread David Howells
Grant Link permission to the possessers of request_key authentication keys, thereby allowing a daemon that is servicing upcalls to arrange things such that only the necessary auth key is passed to the actual service program and not all the daemon's pending auth keys. Signed-off-by: David Ho

[RFC PATCH 11/16] xen/grant-table: make grant-table xenhost aware

2019-05-09 Thread Ankur Arora
Largely mechanical changes: the exported grant table symbols now take xenhost_t * as a parameter. Also, move the grant table global state inside xenhost_t. If there's more than one xenhost, then initialize both. Signed-off-by: Ankur Arora --- arch/x86/xen/grant-table.c | 71 +++-- driver

[RFC PATCH 16/16] xen/grant-table: host_addr fixup in mapping on xenhost_r0

2019-05-09 Thread Ankur Arora
rtins Signed-off-by: Ankur Arora --- drivers/block/xen-blkback/blkback.c | 14 +- drivers/xen/gntdev.c| 2 +- drivers/xen/grant-table.c | 20 ++-- include/xen/grant_table.h | 11 ++- 4 files changed, 38 insertions(+), 9 dele

[PATCH v2] mm: do not grant +x by default in memfd_create()

2019-05-04 Thread Dima Krasner
This syscall allows easy fileless execution, without calling chmod() first. Thus, some security-related restrictions (like seccomp filters that deny chmod +x) can by bypassed using memfd_create() if the policy author is unaware of this. Signed-off-by: Dima Krasner Cc: linux...@kvack.org Cc: Hugh

Re: Grant-

2019-04-22 Thread M. M. Fridman
I Mikhail Fridman picked you for $5,000,000 donatiion,Reply for more details IZJAVA O ODRICANJU ODGOVORNOSTI: Ova elektronicka posta moze sadrzavati povjerljive informacije i namijenjena je samo osobama na koje je naslovljena. Ukoliko Vi niste navedeni primatelj nije Vam dopusteno koristiti nje

[PATCH 4.4 068/230] xen-netback: fix occasional leak of grant ref mappings under memory pressure

2019-03-22 Thread Greg Kroah-Hartman
. This eventually results in leaking grant ref mappings since xenvif_zerocopy_callback() is never called for these fragments. Those eventually build up and cause Xen to kill Dom0 as the slots get reused for new mappings: "d0v0 Attempt to implicitly unmap a granted PTE c01329fce005" That b

[PATCH 4.9 22/96] xen-netback: fix occasional leak of grant ref mappings under memory pressure

2019-03-12 Thread Greg Kroah-Hartman
. This eventually results in leaking grant ref mappings since xenvif_zerocopy_callback() is never called for these fragments. Those eventually build up and cause Xen to kill Dom0 as the slots get reused for new mappings: "d0v0 Attempt to implicitly unmap a granted PTE c01329fce005" That b

[PATCH 4.14 025/135] xen-netback: fix occasional leak of grant ref mappings under memory pressure

2019-03-12 Thread Greg Kroah-Hartman
. This eventually results in leaking grant ref mappings since xenvif_zerocopy_callback() is never called for these fragments. Those eventually build up and cause Xen to kill Dom0 as the slots get reused for new mappings: "d0v0 Attempt to implicitly unmap a granted PTE c01329fce005" Tha

Accept My Legit Grant.

2019-03-09 Thread Amandha Ferreira da Silva - VOCE NA TV
/lottery-mania/ I intend to grant you a portion of my wealth as a free-will financial grant to you. Respond to sjjo...@mail.com to partake. IMPORTANT NOTE: Only mails sent to sjjo...@mail.com will be attend to. Best Regards, Mrs Mavis Wanczyk

Grant Donation of €1,700,000

2019-03-08 Thread Maria Eliza
You were chosen to receive a Cash Grant Donation of €1,700,000 from Maria-Elisabeth Schaeffler, Respond back for more details email me at: patriciachandl...@gmail.com

[PATCH 4.20 47/76] xen-netback: fix occasional leak of grant ref mappings under memory pressure

2019-03-08 Thread Greg Kroah-Hartman
. This eventually results in leaking grant ref mappings since xenvif_zerocopy_callback() is never called for these fragments. Those eventually build up and cause Xen to kill Dom0 as the slots get reused for new mappings: "d0v0 Attempt to implicitly unmap a granted PTE c01329fce005" Tha

[PATCH 4.19 40/68] xen-netback: fix occasional leak of grant ref mappings under memory pressure

2019-03-08 Thread Greg Kroah-Hartman
. This eventually results in leaking grant ref mappings since xenvif_zerocopy_callback() is never called for these fragments. Those eventually build up and cause Xen to kill Dom0 as the slots get reused for new mappings: "d0v0 Attempt to implicitly unmap a granted PTE c01329fce005" Tha

Re: [PATCH v2] xen-netback: fix occasional leak of grant ref mappings under memory pressure

2019-02-28 Thread David Miller
From: Igor Druzhinin Date: Thu, 28 Feb 2019 12:48:03 + > Zero-copy callback flag is not yet set on frag list skb at the moment > xenvif_handle_frag_list() returns -ENOMEM. This eventually results in > leaking grant ref mappings since xenvif_zerocopy_callback() is never > call

Re: [PATCH v2] xen-netback: fix occasional leak of grant ref mappings under memory pressure

2019-02-28 Thread Wei Liu
On Thu, Feb 28, 2019 at 12:48:03PM +, Igor Druzhinin wrote: > Zero-copy callback flag is not yet set on frag list skb at the moment > xenvif_handle_frag_list() returns -ENOMEM. This eventually results in > leaking grant ref mappings since xenvif_zerocopy_callback() is never > call

[PATCH v2] xen-netback: fix occasional leak of grant ref mappings under memory pressure

2019-02-28 Thread Igor Druzhinin
Zero-copy callback flag is not yet set on frag list skb at the moment xenvif_handle_frag_list() returns -ENOMEM. This eventually results in leaking grant ref mappings since xenvif_zerocopy_callback() is never called for these fragments. Those eventually build up and cause Xen to kill Dom0 as the

Re: [PATCH] xen-netback: fix occasional leak of grant ref mappings under memory pressure

2019-02-28 Thread Wei Liu
On Thu, Feb 28, 2019 at 12:07:07PM +, Paul Durrant wrote: > Yes, I meant kfree_skb(nskb). > In that case I think your patch looks fine. Wei.

RE: [PATCH] xen-netback: fix occasional leak of grant ref mappings under memory pressure

2019-02-28 Thread Paul Durrant
...@lists.xenproject.org; > da...@davemloft.net > Subject: Re: [Xen-devel] [PATCH] xen-netback: fix occasional leak of grant > ref mappings under memory > pressure > > > -Original Message- > > From: Wei Liu [mailto:wei.l...@citrix.com] > > Sent: 28 Februar

RE: [PATCH] xen-netback: fix occasional leak of grant ref mappings under memory pressure

2019-02-28 Thread Paul Durrant
Subject: Re: [PATCH] xen-netback: fix occasional leak of grant ref mappings > under memory pressure > > On 28/02/2019 11:21, Paul Durrant wrote: > >>> @@ -1153,6 +1152,10 @@ static int xenvif_tx_submit(struct xenvif_queue > >>> *q

Re: [PATCH] xen-netback: fix occasional leak of grant ref mappings under memory pressure

2019-02-28 Thread Igor Druzhinin
On 28/02/2019 11:21, Paul Durrant wrote: >>> @@ -1153,6 +1152,10 @@ static int xenvif_tx_submit(struct xenvif_queue >>> *queue) >>> kfree_skb(skb); >>> continue; >>> } >>> + >>> + /* Copie

RE: [PATCH] xen-netback: fix occasional leak of grant ref mappings under memory pressure

2019-02-28 Thread Paul Durrant
t.net > Subject: Re: [PATCH] xen-netback: fix occasional leak of grant ref mappings > under memory pressure > > On Thu, Feb 28, 2019 at 09:46:57AM +, Paul Durrant wrote: > > > -Original Message- > > > From: Igor Druzhinin [mailto:igor.druzhi...@citrix

Re: [PATCH] xen-netback: fix occasional leak of grant ref mappings under memory pressure

2019-02-28 Thread Wei Liu
el@vger.kernel.org > > Cc: Wei Liu ; Paul Durrant ; > > da...@davemloft.net; Igor > > Druzhinin > > Subject: [PATCH] xen-netback: fix occasional leak of grant ref mappings > > under memory pressure > > > > Zero-copy callback flag is not yet set on frag li

Re: [Xen-devel] [PATCH] xen-netback: fix occasional leak of grant ref mappings under memory pressure

2019-02-28 Thread Andrew Cooper
On 28/02/2019 02:03, Igor Druzhinin wrote: > Zero-copy callback flag is not yet set on frag list skb at the moment > xenvif_handle_frag_list() returns -ENOMEM. This eventually results in > leaking grant ref mappings since xenvif_zerocopy_callback() is never > called for these frag

RE: [PATCH] xen-netback: fix occasional leak of grant ref mappings under memory pressure

2019-02-28 Thread Paul Durrant
gt; Druzhinin > Subject: [PATCH] xen-netback: fix occasional leak of grant ref mappings under > memory pressure > > Zero-copy callback flag is not yet set on frag list skb at the moment > xenvif_handle_frag_list() returns -ENOMEM. This eventually results in > leaking grant ref ma

[PATCH] xen-netback: fix occasional leak of grant ref mappings under memory pressure

2019-02-27 Thread Igor Druzhinin
Zero-copy callback flag is not yet set on frag list skb at the moment xenvif_handle_frag_list() returns -ENOMEM. This eventually results in leaking grant ref mappings since xenvif_zerocopy_callback() is never called for these fragments. Those eventually build up and cause Xen to kill Dom0 as the

[PATCH RFC 25/39] KVM: x86/xen: grant map support

2019-02-20 Thread Joao Martins
From: Ankur Arora Introduce support for mapping grant references. The sequence of events to map a grant is: rframe = read_shared_entry(guest_grant_table, grant-ref); rpfn = get_user_pages_remote(remote_mm, rframe); mark_shared_entry(guest_grant_table, grant-ref

[PATCH RFC 26/39] KVM: x86/xen: grant unmap support

2019-02-20 Thread Joao Martins
From: Ankur Arora Grant unmap removes the grant from maptrack and marks it as not in use. We maintain a one-to-one correspondence between grant table and maptrack entries so there's no contention in allocation/free. Co-developed-by: Joao Martins Signed-off-by: Ankur Arora Signed-off-by:

[PATCH RFC 33/39] xen/grant-table: xen_shim_domain() support

2019-02-20 Thread Joao Martins
With xen-shim, allocate_xenballooned_pages() only allocates a place-holder page (pfn 0) expecting a subsequent map_grant_ref to fix it up. However, this means that, until the grant operation (GNTTABOP_map_grant_ref) provides a valid page, we cannot set PagePrivate or save any state. This patch

[PATCH RFC 23/39] KVM: x86/xen: grant table grow support

2019-02-20 Thread Joao Martins
Guests grant tables with core Xen PV devices (xenbus, console) need to be seeded with a bunch of reserved entries at boot. However, at init, the grant table is, from a guest perspective, empty and has no frames backing it. That only happens once the guest does: XENMEM_add_to_physmap(idx=N,gfn=M

[PATCH RFC 22/39] KVM: x86/xen: grant table init

2019-02-20 Thread Joao Martins
Add support for guest grant table initialization. This is mostly scaffolding at this point: we allocate grant table state and map it globally. Later patches add support for seeding the grant table with reserved entries, and setup maptrack which would be used for grant map and unmap operations

[PATCH RFC 27/39] KVM: x86/xen: grant copy support

2019-02-20 Thread Joao Martins
Copies from source grant reference to dest grant reference (or the other way around.) Signed-off-by: Joao Martins --- arch/x86/kvm/xen.c | 151 + 1 file changed, 151 insertions(+) diff --git a/arch/x86/kvm/xen.c b/arch/x86/kvm/xen.c index

[RFC PATCH 27/27] containers: Sample to grant access to a key in a container

2019-02-15 Thread David Howells
Provide a sample program that will grant access to the specified key for a container named "foo-test" (as created by the test-container sample) and then link the key into the container keyring (either given on the command line or searches for a keyring called "_container" in th

[RFC PATCH 16/27] keys: Grant Link permission to possessers of request_key auth keys

2019-02-15 Thread David Howells
Grant Link permission to the possessers of request_key authentication keys, thereby allowing a daemon that is servicing upcalls to arrange things such that only the necessary auth key is passed to the actual service program and not all the daemon's pending auth keys. Signed-off-by: David Ho

[PATCH 4.19 10/50] CIFS: Do not set credits to 1 if the server didnt grant anything

2019-01-15 Thread Greg Kroah-Hartman
4.19-stable review patch. If anyone has any objections, please let me know. -- From: Pavel Shilovsky commit 33fa5c8b8a7dbe6353a56eaa654b790348890d42 upstream. Currently we reset the number of total credits granted by the server to 1 if the server didn't grant us anythin

[PATCH 4.20 13/57] CIFS: Do not set credits to 1 if the server didnt grant anything

2019-01-15 Thread Greg Kroah-Hartman
4.20-stable review patch. If anyone has any objections, please let me know. -- From: Pavel Shilovsky commit 33fa5c8b8a7dbe6353a56eaa654b790348890d42 upstream. Currently we reset the number of total credits granted by the server to 1 if the server didn't grant us anythin

Re: Yes: The linux devs can rescind their license grant. GPLv2 is a bare license and is revocable by

2019-01-06 Thread vnsndalce
That may be OpenBSD policy, but it is not the law. Your OpenBSD policy cannot bind the copyright holder of the works you distribute. It's also an incorrect statement of the law. If the copyright holder did not receive consideration/payment/etc from you: you have no interest to bind him with.

FWD: 2: Re: [gentoo-user] Re: Yes: The linux devs can rescind their license grant. GPLv2 is a bare license and is revocable by the grantor.

2018-12-28 Thread vnsndalce
Subject: Re: [gentoo-user] Re: Yes: The linux devs can rescind their license grant. GPLv2 is a bare license and is revocable by the grantor. FromR0b0t1 To gentoo-u...@lists.gentoo.org Cc ubuntu-us...@lists.ubuntu.com , debian-u...@lists.debian.org, d...@lists.dyne.org Reply-To

FWD: [gentoo-user] Re: Yes: The linux devs can rescind their license grant. GPLv2 is a bare license and is revocable by the grantor.

2018-12-28 Thread vnsndalce
Re: [gentoo-user] Re: Yes: The linux devs can rescind their license grant. GPLv2 is a bare license and is revocable by the grantor. FromR0b0t1 To gentoo-u...@lists.gentoo.org Cc ubuntu-us...@lists.ubuntu.com , debian-u...@lists.debian.org, d...@lists.dyne.org Reply-Togentoo

A license is a temporary grant, not a transfer.

2018-12-28 Thread vnsndalce
Did each of the linux programmers make such a promise to you? No they did not. Did you pay each of the linux programmers anything. No you did not. They can rescind the license from you. Understand? A license is a temporary grant, it is not a transfer.

Re: Yes: The linux devs can rescind their license grant. GPLv2 is a bare license and is revocable by the grantor.

2018-12-28 Thread Raul Miller
On Thu, Dec 27, 2018 at 3:12 PM wrote: > ... pompous programmer asshole*. I think you are projecting your own personality in your perception of others (which is a natural thing to do - everyone does that to some degree). That said, I am going to filter your messages to my spam bucket from now on

Re: Yes: The linux devs can rescind their license grant. GPLv2 is a bare license and is revocable by the grantor.

2018-12-27 Thread vsnsdualce
(2) ... (I am not going to go over the legal mistakes you've made, because of (1))... I have not made legal mistakes, pompous programmer a__hole*. A gratuitous license, absent an attached interest, is revocable at will. This goes for GPLv2 as used by linux, just as it goes for the BSD license

Re: Yes: The linux devs can rescind their license grant. GPLv2 is a bare license and is revocable by the grantor.

2018-12-27 Thread vsnsdualce
a permanent alienation of the article(property) in question. The impinged property, being under a non bargained-for temporary grant, can be taken back into the sole dominion of the owner - at his election to do so. Now as to the 9th circuit appellate court's decision in Jacobsen v. Katzer .

Fwd: Re: [DNG] 2 months and no response from Eben Moglen - Yes you can rescind your grant. -- The CoC regime is a License violation - Additional restrictive terms

2018-12-24 Thread vnsndalce
Original Message Subject: Re: [DNG] 2 months and no response from Eben Moglen - Yes you can rescind your grant. -- The CoC regime is a License violation - Additional restrictive terms Date: 2018-12-24 16:24 From: vnsnda...@memeware.net To: d...@lists.dyne.org Version 2 of

Re: [DNG] 2 months and no response from Eben Moglen - Yes you can rescind your grant. -- The CoC regime is a License violation - Additional restrictive terms

2018-12-24 Thread vnsndalce
Hendrik Boom, are you a lawyer? No? How about you shut your fucking mouth about things you have no clue of? Sound like a plan, ignorant lay person? Below is an explanation of just how it is a violation of the rights-holder's grant. The courts are not fooled by "clever" verbi

Yes: The linux devs can rescind their license grant. GPLv2 is a bare license and is revocable by the grantor.

2018-12-24 Thread vsnsdualce
he article of property that is being impinged. A license is NOT a full nor is it a permanent alienation of the article(property) in question. The impinged property, being under a non bargained-for temporary grant, can be taken back into the sole dominion of the owner - at his election to do so.

2 months and no response from Eben Moglen - Yes you can rescind your grant.

2018-12-24 Thread vsnsdualce
It has been 2 months. Eben Moglen has published no research. Because there is nothing more to say: The GPLv2, as used by linux, is a bare license. It can be rescinded at the will of the grantor. The regime that the FSF used, vis-a-vis the GPLv2, is essential: copyright transfers to a central

Yes: The linux devs can rescind their license grant.

2018-12-23 Thread visionsofalice
is being impinged. A license is NOT a full nor is it a permanent alienation of the article(property) in question. The impinged property, being under a non bargained-for temporary grant, can be taken back into the sole dominion of the owner - at his election to do so. Now as to the 9th circuit appell

2 months and no response from Eben Moglen - Yes you can rescind your grant.

2018-12-23 Thread visionsofalice
It has been 2 months. Eben Moglen has published no research. Because there is nothing more to say: The GPLv2, as used by linux, is a bare license. It can be rescinded at the will of the grantor. The regime that the FSF used, vis-a-vis the GPLv2, is essential: copyright transfers to a central

2 months and no response from Eben Moglen - Yes you can rescind your grant.

2018-12-22 Thread visionsofalice
It has been 2 months. Eben Moglen has published no research. Because there is nothing more to say: The GPLv2, as used by linux, is a bare license. It can be rescinded at the will of the grantor. The regime that the FSF used, vis-a-vis the GPLv2, is essential: copyright transfers to a central

Yes: The linux devs can rescind their license grant.

2018-12-22 Thread visionsofalice
is being impinged. A license is NOT a full nor is it a permanent alienation of the article(property) in question. The impinged property, being under a non bargained-for temporary grant, can be taken back into the sole dominion of the owner - at his election to do so. Now as to the 9th circuit appell

Re: The linux devs can rescind their license grant.

2018-12-18 Thread visionsofalice
is being impinged. A license is NOT a full nor is it a permanent alienation of the article(property) in question. The impinged property, being under a non bargained-for temporary grant, can be taken back into the sole dominion of the owner - at his election to do so. Now as to the 9th circuit appell

Re: The linux devs can rescind their license grant. - Analysis published?

2018-12-18 Thread visionsofalice
Has the analysis been published yet? I have been away on an artistic sabbatical, but I don't see it in the inbox using searches, this was the last mail I received on the subject. On 2018-10-26 18:31, Eben Moglen wrote: On Friday, 26 October 2018, visionsofal...@redchan.it wrote: You are co

[PATCH 4.19 060/118] xen/grant-table: Fix incorrect gnttab_dma_free_pages() pr_debug message

2018-11-26 Thread Greg Kroah-Hartman
ation..." which should be "Failed to increase reservation..." Fixes: 9bdc7304f536 ('xen/grant-table: Allow allocating buffers suitable for DMA') Reported-by: Ross Philipson Signed-off-by: Liam Merwick Reviewed-by: Mark Kanda Reviewed-by: Juergen Gross Signed-off-by: Juergen Gro

[PATCH AUTOSEL 4.19 36/73] xen/grant-table: Fix incorrect gnttab_dma_free_pages() pr_debug message

2018-11-14 Thread Sasha Levin
: 9bdc7304f536 ('xen/grant-table: Allow allocating buffers suitable for DMA') Reported-by: Ross Philipson Signed-off-by: Liam Merwick Reviewed-by: Mark Kanda Reviewed-by: Juergen Gross Signed-off-by: Juergen Gross Signed-off-by: Sasha Levin --- drivers/xen/grant-table.c | 2 +- 1 f

[PATCH 4.19 156/361] xprtrdma: Reset credit grant properly after a disconnect

2018-11-11 Thread Greg Kroah-Hartman
4.19-stable review patch. If anyone has any objections, please let me know. -- From: Chuck Lever [ Upstream commit ef739b2175dde9c05594f768cb78149f1ce2ac36 ] On a fresh connection, an RPC/RDMA client is supposed to send only one RPC Call until it gets a credit grant in the

[PATCH 4.18 158/350] xprtrdma: Reset credit grant properly after a disconnect

2018-11-11 Thread Greg Kroah-Hartman
4.18-stable review patch. If anyone has any objections, please let me know. -- From: Chuck Lever [ Upstream commit ef739b2175dde9c05594f768cb78149f1ce2ac36 ] On a fresh connection, an RPC/RDMA client is supposed to send only one RPC Call until it gets a credit grant in the

Re: Grant

2018-11-04 Thread M. M. Fridman
I, Mikhail Fridman have selected you specifically as one of my beneficiaries for my Charitable Donation of $5 Million Dollars, Check the link below for confirmation: https://www.rt.com/business/343781-mikhail-fridman-will-charity/ I await your earliest response for further directives. Best Reg

Re: [Ksummit-discuss] The linux devs can rescind their license grant.

2018-11-04 Thread Geert Uytterhoeven
On Fri, Oct 26, 2018 at 12:12 AM NeilBrown wrote: > On Thu, Oct 25 2018, Eric S. Raymond wrote: > > Theodore Y. Ts'o : > >> On Thu, Oct 25, 2018 at 03:39:01PM -0400, Eric S. Raymond wrote: > >> > Under Jacobsen vs. Katzer (535 f 3d 1373 fed cir 2008) authors of > >> > GPLed software have a specifi

[PATCH AUTOSEL 4.19 112/146] xprtrdma: Reset credit grant properly after a disconnect

2018-10-31 Thread Sasha Levin
From: Chuck Lever [ Upstream commit ef739b2175dde9c05594f768cb78149f1ce2ac36 ] On a fresh connection, an RPC/RDMA client is supposed to send only one RPC Call until it gets a credit grant in the first RPC Reply from the server [RFC 8166, Section 3.3.3]. There is a bug in the Linux client&#

[PATCH AUTOSEL 4.18 098/126] xprtrdma: Reset credit grant properly after a disconnect

2018-10-31 Thread Sasha Levin
From: Chuck Lever [ Upstream commit ef739b2175dde9c05594f768cb78149f1ce2ac36 ] On a fresh connection, an RPC/RDMA client is supposed to send only one RPC Call until it gets a credit grant in the first RPC Reply from the server [RFC 8166, Section 3.3.3]. There is a bug in the Linux client&#

Re: The linux devs can rescind their license grant.

2018-10-29 Thread Bradley M. Kuhn
On Thu, Oct 25, 2018 at 07:56:26AM +, visionsofal...@redchan.it wrote: > The linux devs can rescind their license grant. Greg KH responded on Thu, 25 Oct 2018 09:19:11 +0100: >> No they can not, please do not keep spreading false information. I was explicitly cc'ed on

Re: [Ksummit-discuss] The linux devs can rescind their license grant.

2018-10-28 Thread NeilBrown
On Sun, Oct 28 2018, Jiri Kosina wrote: > On Sat, 27 Oct 2018, tim.b...@sony.com wrote: > >> Al, >> >> Can you please, even in the face of comments you find irritating, keep >> your responses more civil? Calling someone a "wankstain" is >> unprofessional > > Tim, > > to be completely honest, co

Re: [Ksummit-discuss] The linux devs can rescind their license grant.

2018-10-27 Thread Al Viro
On Sat, Oct 27, 2018 at 03:46:02PM -0700, Bruce Perens wrote: > The anonymous person is generally thought to have appeared on the net > previously as MikeeUSA. That entity has a well-recorded history of misogyny > and other anti-social behaviour. You are misreading it - behaviour of that... membe

Re: [Ksummit-discuss] The linux devs can rescind their license grant.

2018-10-27 Thread Eric S. Raymond
Bruce Perens : > The anonymous person is generally thought to have appeared on the net > previously as MikeeUSA. That entity has a well-recorded history of misogyny > and other anti-social behaviour. He's also complained to me recently that > because of "people like me", the law prohibits him from

Re: [Ksummit-discuss] The linux devs can rescind their license grant.

2018-10-27 Thread Jiri Kosina
On Sat, 27 Oct 2018, tim.b...@sony.com wrote: > Al, > > Can you please, even in the face of comments you find irritating, keep > your responses more civil? Calling someone a "wankstain" is > unprofessional Tim, to be completely honest, communicating anonymously doesn't really match my "this

RE: [Ksummit-discuss] The linux devs can rescind their license grant.

2018-10-27 Thread Tim.Bird
> -Original Message- > From: Al Viro > > On Sat, Oct 27, 2018 at 06:52:44AM +, visionsofal...@redchan.it wrote: > > Al: the FSF was so insistent on the adoption of the GPL version 3 > > because the GPL version 2 is not operative against the grantor. > > Anonymous wankstain: sod off an

Re: The linux devs can rescind their license grant.

2018-10-27 Thread Al Viro
On Sat, Oct 27, 2018 at 06:52:44AM +, visionsofal...@redchan.it wrote: > Al: the FSF was so insistent on the adoption of the GPL version 3 > because the GPL version 2 is not operative against the grantor. Anonymous wankstain: sod off and learn to troll properly. It *is* an art form, and the o

  1   2   3   4   5   6   7   8   9   >