01 Apr, 2014

2 commits

  • Pull x86 LTO changes from Peter Anvin:
    "More infrastructure work in preparation for link-time optimization
    (LTO). Most of these changes is to make sure symbols accessed from
    assembly code are properly marked as visible so the linker doesn't
    remove them.

    My understanding is that the changes to support LTO are still not
    upstream in binutils, but are on the way there. This patchset should
    conclude the x86-specific changes, and remaining patches to actually
    enable LTO will be fed through the Kbuild tree (other than keeping up
    with changes to the x86 code base, of course), although not
    necessarily in this merge window"

    * 'x86-asmlinkage-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: (25 commits)
    Kbuild, lto: Handle basic LTO in modpost
    Kbuild, lto: Disable LTO for asm-offsets.c
    Kbuild, lto: Add a gcc-ld script to let run gcc as ld
    Kbuild, lto: add ld-version and ld-ifversion macros
    Kbuild, lto: Drop .number postfixes in modpost
    Kbuild, lto, workaround: Don't warn for initcall_reference in modpost
    lto: Disable LTO for sys_ni
    lto: Handle LTO common symbols in module loader
    lto, workaround: Add workaround for initcall reordering
    lto: Make asmlinkage __visible
    x86, lto: Disable LTO for the x86 VDSO
    initconst, x86: Fix initconst mistake in ts5500 code
    initconst: Fix initconst mistake in dcdbas
    asmlinkage: Make trace_hardirqs_on/off_caller visible
    asmlinkage, x86: Fix 32bit memcpy for LTO
    asmlinkage Make __stack_chk_failed and memcmp visible
    asmlinkage: Mark rwsem functions that can be called from assembler asmlinkage
    asmlinkage: Make main_extable_sort_needed visible
    asmlinkage, mutex: Mark __visible
    asmlinkage: Make trace_hardirq visible
    ...

    Linus Torvalds
     
  • Pull scheduler changes from Ingo Molnar:
    "Bigger changes:

    - sched/idle restructuring: they are WIP preparation for deeper
    integration between the scheduler and idle state selection, by
    Nicolas Pitre.

    - add NUMA scheduling pseudo-interleaving, by Rik van Riel.

    - optimize cgroup context switches, by Peter Zijlstra.

    - RT scheduling enhancements, by Thomas Gleixner.

    The rest is smaller changes, non-urgnt fixes and cleanups"

    * 'sched-core-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: (68 commits)
    sched: Clean up the task_hot() function
    sched: Remove double calculation in fix_small_imbalance()
    sched: Fix broken setscheduler()
    sparc64, sched: Remove unused sparc64_multi_core
    sched: Remove unused mc_capable() and smt_capable()
    sched/numa: Move task_numa_free() to __put_task_struct()
    sched/fair: Fix endless loop in idle_balance()
    sched/core: Fix endless loop in pick_next_task()
    sched/fair: Push down check for high priority class task into idle_balance()
    sched/rt: Fix picking RT and DL tasks from empty queue
    trace: Replace hardcoding of 19 with MAX_NICE
    sched: Guarantee task priority in pick_next_task()
    sched/idle: Remove stale old file
    sched: Put rq's sched_avg under CONFIG_FAIR_GROUP_SCHED
    cpuidle/arm64: Remove redundant cpuidle_idle_call()
    cpuidle/powernv: Remove redundant cpuidle_idle_call()
    sched, nohz: Exclude isolated cores from load balancing
    sched: Fix select_task_rq_fair() description comments
    workqueue: Replace hardcoding of -20 and 19 with MIN_NICE and MAX_NICE
    sys: Replace hardcoding of -20 and 19 with MIN_NICE and MAX_NICE
    ...

    Linus Torvalds
     

24 Feb, 2014

1 commit

  • Because rcu_torture_random() will be used by the locking equivalent to
    rcutorture, pull it out into its own module. This new module cannot
    be separately configured, instead, use the Kconfig "select" statement
    from the Kconfig options of tests depending on it.

    Suggested-by: Rusty Russell
    Signed-off-by: Paul E. McKenney

    Paul E. McKenney
     

14 Feb, 2014

1 commit

  • The assembler alias code in cond_syscall does not work
    when compiled for LTO. Just disable LTO for that file.

    Signed-off-by: Andi Kleen
    Link: http://lkml.kernel.org/r/1391846481-31491-6-git-send-email-ak@linux.intel.com
    Signed-off-by: H. Peter Anvin

    Andi Kleen
     

11 Feb, 2014

1 commit

  • Integration of cpuidle with the scheduler requires that the idle loop be
    closely integrated with the scheduler proper. Moving cpu/idle.c into the
    sched directory will allow for a smoother integration, and eliminate a
    subdirectory which contained only one source file.

    Signed-off-by: Nicolas Pitre
    Signed-off-by: Peter Zijlstra
    Cc: Linus Torvalds
    Cc: Andrew Morton
    Cc: Thomas Gleixner
    Link: http://lkml.kernel.org/r/alpine.LFD.2.11.1401301102210.1652@knanqh.ubzr
    Signed-off-by: Ingo Molnar

    Nicolas Pitre
     

13 Dec, 2013

2 commits

  • Always remove generated SYSTEM_TRUSTED_KEYRING files while doing make mrproper.

    Signed-off-by: Kirill Tkhai
    Signed-off-by: David Howells

    Kirill Tkhai
     
  • Fix the gathering of certificates from both the source tree and the build tree
    to correctly calculate the pathnames of all the certificates.

    The problem was that if the default generated cert, signing_key.x509, didn't
    exist then it would not have a path attached and if it did, it would have a
    path attached.

    This means that the contents of kernel/.x509.list would change between the
    first compilation in a directory and the second. After the second it would
    remain stable because the signing_key.x509 file exists.

    The consequence was that the kernel would get relinked unconditionally on the
    second recompilation. The second recompilation would also show something like
    this:

    X.509 certificate list changed
    CERTS kernel/x509_certificate_list
    - Including cert /home/torvalds/v2.6/linux/signing_key.x509
    AS kernel/system_certificates.o
    LD kernel/built-in.o

    which is why the relink would happen.

    Unfortunately, it isn't a simple matter of just sticking a path on the front
    of the filename of the certificate in the build directory as make can't then
    work out how to build it.

    So the path has to be prepended to the name for sorting and duplicate
    elimination and then removed for the make rule if it is in the build tree.

    Reported-by: Linus Torvalds
    Signed-off-by: David Howells

    David Howells
     

22 Nov, 2013

1 commit

  • Pull security subsystem updates from James Morris:
    "In this patchset, we finally get an SELinux update, with Paul Moore
    taking over as maintainer of that code.

    Also a significant update for the Keys subsystem, as well as
    maintenance updates to Smack, IMA, TPM, and Apparmor"

    and since I wanted to know more about the updates to key handling,
    here's the explanation from David Howells on that:

    "Okay. There are a number of separate bits. I'll go over the big bits
    and the odd important other bit, most of the smaller bits are just
    fixes and cleanups. If you want the small bits accounting for, I can
    do that too.

    (1) Keyring capacity expansion.

    KEYS: Consolidate the concept of an 'index key' for key access
    KEYS: Introduce a search context structure
    KEYS: Search for auth-key by name rather than target key ID
    Add a generic associative array implementation.
    KEYS: Expand the capacity of a keyring

    Several of the patches are providing an expansion of the capacity of a
    keyring. Currently, the maximum size of a keyring payload is one page.
    Subtract a small header and then divide up into pointers, that only gives
    you ~500 pointers on an x86_64 box. However, since the NFS idmapper uses
    a keyring to store ID mapping data, that has proven to be insufficient to
    the cause.

    Whatever data structure I use to handle the keyring payload, it can only
    store pointers to keys, not the keys themselves because several keyrings
    may point to a single key. This precludes inserting, say, and rb_node
    struct into the key struct for this purpose.

    I could make an rbtree of records such that each record has an rb_node
    and a key pointer, but that would use four words of space per key stored
    in the keyring. It would, however, be able to use much existing code.

    I selected instead a non-rebalancing radix-tree type approach as that
    could have a better space-used/key-pointer ratio. I could have used the
    radix tree implementation that we already have and insert keys into it by
    their serial numbers, but that means any sort of search must iterate over
    the whole radix tree. Further, its nodes are a bit on the capacious side
    for what I want - especially given that key serial numbers are randomly
    allocated, thus leaving a lot of empty space in the tree.

    So what I have is an associative array that internally is a radix-tree
    with 16 pointers per node where the index key is constructed from the key
    type pointer and the key description. This means that an exact lookup by
    type+description is very fast as this tells us how to navigate directly to
    the target key.

    I made the data structure general in lib/assoc_array.c as far as it is
    concerned, its index key is just a sequence of bits that leads to a
    pointer. It's possible that someone else will be able to make use of it
    also. FS-Cache might, for example.

    (2) Mark keys as 'trusted' and keyrings as 'trusted only'.

    KEYS: verify a certificate is signed by a 'trusted' key
    KEYS: Make the system 'trusted' keyring viewable by userspace
    KEYS: Add a 'trusted' flag and a 'trusted only' flag
    KEYS: Separate the kernel signature checking keyring from module signing

    These patches allow keys carrying asymmetric public keys to be marked as
    being 'trusted' and allow keyrings to be marked as only permitting the
    addition or linkage of trusted keys.

    Keys loaded from hardware during kernel boot or compiled into the kernel
    during build are marked as being trusted automatically. New keys can be
    loaded at runtime with add_key(). They are checked against the system
    keyring contents and if their signatures can be validated with keys that
    are already marked trusted, then they are marked trusted also and can
    thus be added into the master keyring.

    Patches from Mimi Zohar make this usable with the IMA keyrings also.

    (3) Remove the date checks on the key used to validate a module signature.

    X.509: Remove certificate date checks

    It's not reasonable to reject a signature just because the key that it was
    generated with is no longer valid datewise - especially if the kernel
    hasn't yet managed to set the system clock when the first module is
    loaded - so just remove those checks.

    (4) Make it simpler to deal with additional X.509 being loaded into the kernel.

    KEYS: Load *.x509 files into kernel keyring
    KEYS: Have make canonicalise the paths of the X.509 certs better to deduplicate

    The builder of the kernel now just places files with the extension ".x509"
    into the kernel source or build trees and they're concatenated by the
    kernel build and stuffed into the appropriate section.

    (5) Add support for userspace kerberos to use keyrings.

    KEYS: Add per-user_namespace registers for persistent per-UID kerberos caches
    KEYS: Implement a big key type that can save to tmpfs

    Fedora went to, by default, storing kerberos tickets and tokens in tmpfs.
    We looked at storing it in keyrings instead as that confers certain
    advantages such as tickets being automatically deleted after a certain
    amount of time and the ability for the kernel to get at these tokens more
    easily.

    To make this work, two things were needed:

    (a) A way for the tickets to persist beyond the lifetime of all a user's
    sessions so that cron-driven processes can still use them.

    The problem is that a user's session keyrings are deleted when the
    session that spawned them logs out and the user's user keyring is
    deleted when the UID is deleted (typically when the last log out
    happens), so neither of these places is suitable.

    I've added a system keyring into which a 'persistent' keyring is
    created for each UID on request. Each time a user requests their
    persistent keyring, the expiry time on it is set anew. If the user
    doesn't ask for it for, say, three days, the keyring is automatically
    expired and garbage collected using the existing gc. All the kerberos
    tokens it held are then also gc'd.

    (b) A key type that can hold really big tickets (up to 1MB in size).

    The problem is that Active Directory can return huge tickets with lots
    of auxiliary data attached. We don't, however, want to eat up huge
    tracts of unswappable kernel space for this, so if the ticket is
    greater than a certain size, we create a swappable shmem file and dump
    the contents in there and just live with the fact we then have an
    inode and a dentry overhead. If the ticket is smaller than that, we
    slap it in a kmalloc()'d buffer"

    * 'for-linus2' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security: (121 commits)
    KEYS: Fix keyring content gc scanner
    KEYS: Fix error handling in big_key instantiation
    KEYS: Fix UID check in keyctl_get_persistent()
    KEYS: The RSA public key algorithm needs to select MPILIB
    ima: define '_ima' as a builtin 'trusted' keyring
    ima: extend the measurement list to include the file signature
    kernel/system_certificate.S: use real contents instead of macro GLOBAL()
    KEYS: fix error return code in big_key_instantiate()
    KEYS: Fix keyring quota misaccounting on key replacement and unlink
    KEYS: Fix a race between negating a key and reading the error set
    KEYS: Make BIG_KEYS boolean
    apparmor: remove the "task" arg from may_change_ptraced_domain()
    apparmor: remove parent task info from audit logging
    apparmor: remove tsk field from the apparmor_audit_struct
    apparmor: fix capability to not use the current task, during reporting
    Smack: Ptrace access check mode
    ima: provide hash algo info in the xattr
    ima: enable support for larger default filedata hash algorithms
    ima: define kernel parameter 'ima_template=' to change configured default
    ima: add Kconfig default measurement list template
    ...

    Linus Torvalds
     

06 Nov, 2013

9 commits


16 Oct, 2013

1 commit


26 Sep, 2013

3 commits


13 Sep, 2013

1 commit


01 Aug, 2013

1 commit


10 Jul, 2013

1 commit


06 May, 2013

1 commit

  • Pull mudule updates from Rusty Russell:
    "We get rid of the general module prefix confusion with a binary config
    option, fix a remove/insert race which Never Happens, and (my
    favorite) handle the case when we have too many modules for a single
    commandline. Seriously, the kernel is full, please go away!"

    * tag 'modules-next-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/rusty/linux:
    modpost: fix unwanted VMLINUX_SYMBOL_STR expansion
    X.509: Support parse long form of length octets in Authority Key Identifier
    module: don't unlink the module until we've removed all exposure.
    kernel: kallsyms: memory override issue, need check destination buffer length
    MODSIGN: do not send garbage to stderr when enabling modules signature
    modpost: handle huge numbers of modules.
    modpost: add -T option to read module names from file/stdin.
    modpost: minor cleanup.
    genksyms: pass symbol-prefix instead of arch
    module: fix symbol versioning with symbol prefixes
    CONFIG_SYMBOL_PREFIX: cleanup.

    Linus Torvalds
     

11 Apr, 2013

1 commit

  • When compiling kernel with -jN (N > 1), all warning/error messages
    printed while openssl is generating key pair may get mixed dots and
    other symbols openssl sends to stderr. This patch makes sure openssl
    logs go to default stdout.

    Example of the garbage on stderr:

    crypto/anubis.c:581: warning: ‘inter’ is used uninitialized in this function
    Generating a 4096 bit RSA private key
    .........
    drivers/gpu/drm/i915/i915_gem_gtt.c: In function ‘gen6_ggtt_insert_entries’:
    drivers/gpu/drm/i915/i915_gem_gtt.c:440: warning: ‘addr’ may be used uninitialized in this function
    .net/mac80211/tx.c: In function ‘ieee80211_subif_start_xmit’:
    net/mac80211/tx.c:1780: warning: ‘chanctx_conf’ may be used uninitialized in this function
    ..drivers/isdn/hardware/mISDN/hfcpci.c: In function ‘hfcpci_softirq’:
    .....drivers/isdn/hardware/mISDN/hfcpci.c:2298: warning: ignoring return value of ‘driver_for_each_device’, declared with attribute warn_unused_result

    Signed-off-by: David Cohen
    Reviewed-by: mark gross
    Acked-by: David Howells
    Signed-off-by: Rusty Russell

    David Cohen
     

08 Apr, 2013

1 commit

  • For now this calls cpu_idle(), but in the long run we want to move the
    cpu bringup code to the core and therefor we add a state argument.

    Signed-off-by: Thomas Gleixner
    Cc: Linus Torvalds
    Cc: Rusty Russell
    Cc: Paul McKenney
    Cc: Peter Zijlstra
    Reviewed-by: Cc: Srivatsa S. Bhat
    Cc: Magnus Damm
    Link: http://lkml.kernel.org/r/20130321215233.583190032@linutronix.de
    Signed-off-by: Thomas Gleixner

    Thomas Gleixner
     

28 Feb, 2013

4 commits

  • Merge third patch-bumb from Andrew Morton:
    "This wraps me up for -rc1.
    - Lots of misc stuff and things which were deferred/missed from
    patchbombings 1 & 2.
    - ocfs2 things
    - lib/scatterlist
    - hfsplus
    - fatfs
    - documentation
    - signals
    - procfs
    - lockdep
    - coredump
    - seqfile core
    - kexec
    - Tejun's large IDR tree reworkings
    - ipmi
    - partitions
    - nbd
    - random() things
    - kfifo
    - tools/testing/selftests updates
    - Sasha's large and pointless hlist cleanup"

    * emailed patches from Andrew Morton : (163 commits)
    hlist: drop the node parameter from iterators
    kcmp: make it depend on CHECKPOINT_RESTORE
    selftests: add a simple doc
    tools/testing/selftests/Makefile: rearrange targets
    selftests/efivarfs: add create-read test
    selftests/efivarfs: add empty file creation test
    selftests: add tests for efivarfs
    kfifo: fix kfifo_alloc() and kfifo_init()
    kfifo: move kfifo.c from kernel/ to lib/
    arch Kconfig: centralise CONFIG_ARCH_NO_VIRT_TO_BUS
    w1: add support for DS2413 Dual Channel Addressable Switch
    memstick: move the dereference below the NULL test
    drivers/pps/clients/pps-gpio.c: use devm_kzalloc
    Documentation/DMA-API-HOWTO.txt: fix typo
    include/linux/eventfd.h: fix incorrect filename is a comment
    mtd: mtd_stresstest: use prandom_bytes()
    mtd: mtd_subpagetest: convert to use prandom library
    mtd: mtd_speedtest: use prandom_bytes
    mtd: mtd_pagetest: convert to use prandom library
    mtd: mtd_oobtest: convert to use prandom library
    ...

    Linus Torvalds
     
  • Since kcmp syscall has been implemented (initially on x86 architecture) a
    number of other archs wire it up as well: xtensa, sparc, sh, s390, mips,
    microblaze, m68k (not taking into account those who uses
    for syscall numbers definitions).

    But the Makefile, which turns kcmp.o generation on still depends on former
    config-x86. Thus get rid of this limitation and make kcmp.o depend on
    CHECKPOINT_RESTORE option.

    Signed-off-by: Cyrill Gorcunov
    Cc: Pavel Emelyanov
    Cc: Andrey Vagin
    Cc: "H. Peter Anvin"
    Signed-off-by: Andrew Morton
    Signed-off-by: Linus Torvalds

    Cyrill Gorcunov
     
  • Move kfifo.c from kernel/ to lib/

    Signed-off-by: Stefani Seibold
    Signed-off-by: Andrew Morton
    Signed-off-by: Linus Torvalds

    Stefani Seibold
     
  • Pull kbuild changes from Michal Marek:

    - Alias generation in modpost is cross-compile safe.

    - kernel/timeconst.h is now generated using a bc script instead of
    perl.

    - scripts/link-vmlinux.sh now works with an alternative
    $KCONFIG_CONFIG.

    - destination-y for exported headers is supported in Kbuild files
    again.

    - depmod is called with -P $CONFIG_SYMBOL_PREFIX on architectures that
    need it.

    - CONFIG_DEBUG_INFO_REDUCED disables var-tracking

    - scripts/setlocalversion works with too much translated locales ;)

    * 'kbuild' of git://git.kernel.org/pub/scm/linux/kernel/git/mmarek/kbuild:
    kbuild: Fix reading of .config in link-vmlinux.sh
    kbuild: Unset language specific variables in setlocalversion script
    Kbuild: Disable var tracking with CONFIG_DEBUG_INFO_REDUCED
    depmod: pass -P $CONFIG_SYMBOL_PREFIX
    kbuild: Fix destination-y for installed headers
    scripts/link-vmlinux.sh: source variables from KCONFIG_CONFIG
    kernel: Replace timeconst.pl with a bc script
    mod/file2alias: make modalias generation safe for cross compiling

    Linus Torvalds
     

17 Feb, 2013

1 commit

  • bc is the standard tool for multi-precision arithmetic. We switched
    to Perl because akpm reported a hard-to-reproduce build hang, which
    was very odd because affected and unaffected machines were all running
    the same version of GNU bc.

    Unfortunately switching to Perl required a really ugly "canning"
    mechanism to support Perl < 5.8 installations lacking the Math::BigInt
    module.

    It was recently pointed out to me that some very old versions of GNU
    make had problems with pipes in subshells, which was indeed the
    construct used in the Makefile rules in that version of the patch;
    Perl didn't need it so switching to Perl fixed the problem for
    unrelated reasons. With the problem (hopefully) root-caused, we can
    switch back to bc and do the arbitrary-precision arithmetic naturally.

    Signed-off-by: H. Peter Anvin
    Cc: Andrew Morton
    Acked-by: Sam Ravnborg
    Signed-off-by: Michal Marek

    H. Peter Anvin
     

25 Jan, 2013

1 commit


19 Dec, 2012

1 commit

  • Pull module update from Rusty Russell:
    "Nothing all that exciting; a new module-from-fd syscall for those who
    want to verify the source of the module (ChromeOS) and/or use standard
    IMA on it or other security hooks."

    * tag 'modules-next-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/rusty/linux:
    MODSIGN: Fix kbuild output when using default extra_certificates
    MODSIGN: Avoid using .incbin in C source
    modules: don't hand 0 to vmalloc.
    module: Remove a extra null character at the top of module->strtab.
    ASN.1: Use the ASN1_LONG_TAG and ASN1_INDEFINITE_LENGTH constants
    ASN.1: Define indefinite length marker constant
    moduleparam: use __UNIQUE_ID()
    __UNIQUE_ID()
    MODSIGN: Add modules_sign make target
    powerpc: add finit_module syscall.
    ima: support new kernel module syscall
    add finit_module syscall to asm-generic
    ARM: add finit_module syscall to ARM
    security: introduce kernel_module_from_file hook
    module: add flags arg to sys_finit_module()
    module: add syscall to load module from fd

    Linus Torvalds
     

14 Dec, 2012

2 commits


03 Dec, 2012

1 commit

  • …/linux-rcu into core/rcu

    Conflicts:
    arch/x86/kernel/ptrace.c

    Pull the latest RCU tree from Paul E. McKenney:

    " The major features of this series are:

    1. A first version of no-callbacks CPUs. This version prohibits
    offlining CPU 0, but only when enabled via CONFIG_RCU_NOCB_CPU=y.
    Relaxing this constraint is in progress, but not yet ready
    for prime time. These commits were posted to LKML at
    https://lkml.org/lkml/2012/10/30/724, and are at branch rcu/nocb.

    2. Changes to SRCU that allows statically initialized srcu_struct
    structures. These commits were posted to LKML at
    https://lkml.org/lkml/2012/10/30/296, and are at branch rcu/srcu.

    3. Restructuring of RCU's debugfs output. These commits were posted
    to LKML at https://lkml.org/lkml/2012/10/30/341, and are at
    branch rcu/tracing.

    4. Additional CPU-hotplug/RCU improvements, posted to LKML at
    https://lkml.org/lkml/2012/10/30/327, and are at branch rcu/hotplug.
    Note that the commit eliminating __stop_machine() was judged to
    be too-high of risk, so is deferred to 3.9.

    5. Changes to RCU's idle interface, most notably a new module
    parameter that redirects normal grace-period operations to
    their expedited equivalents. These were posted to LKML at
    https://lkml.org/lkml/2012/10/30/739, and are at branch rcu/idle.

    6. Additional diagnostics for RCU's CPU stall warning facility,
    posted to LKML at https://lkml.org/lkml/2012/10/30/315, and
    are at branch rcu/stall. The most notable change reduces the
    default RCU CPU stall-warning time from 60 seconds to 21 seconds,
    so that it once again happens sooner than the softlockup timeout.

    7. Documentation updates, which were posted to LKML at
    https://lkml.org/lkml/2012/10/30/280, and are at branch rcu/doc.
    A couple of late-breaking changes were posted at
    https://lkml.org/lkml/2012/11/16/634 and
    https://lkml.org/lkml/2012/11/16/547.

    8. Miscellaneous fixes, which were posted to LKML at
    https://lkml.org/lkml/2012/10/30/309, along with a late-breaking
    change posted at Fri, 16 Nov 2012 11:26:25 -0800 with message-ID
    <20121116192625.GA447@linux.vnet.ibm.com>, but which lkml.org
    seems to have missed. These are at branch rcu/fixes.

    9. Finally, a fix for an lockdep-RCU splat was posted to LKML
    at https://lkml.org/lkml/2012/11/7/486. This is at rcu/next. "

    Signed-off-by: Ingo Molnar <mingo@kernel.org>

    Ingo Molnar
     

01 Dec, 2012

1 commit

  • Create a new subsystem that probes on kernel boundaries
    to keep track of the transitions between level contexts
    with two basic initial contexts: user or kernel.

    This is an abstraction of some RCU code that use such tracking
    to implement its userspace extended quiescent state.

    We need to pull this up from RCU into this new level of indirection
    because this tracking is also going to be used to implement an "on
    demand" generic virtual cputime accounting. A necessary step to
    shutdown the tick while still accounting the cputime.

    Signed-off-by: Frederic Weisbecker
    Cc: Andrew Morton
    Cc: H. Peter Anvin
    Cc: Ingo Molnar
    Cc: Paul E. McKenney
    Cc: Peter Zijlstra
    Cc: Steven Rostedt
    Cc: Thomas Gleixner
    Cc: Li Zhong
    Cc: Gilad Ben-Yossef
    Reviewed-by: Steven Rostedt
    [ paulmck: fix whitespace error and email address. ]
    Signed-off-by: Paul E. McKenney

    Frederic Weisbecker
     

26 Oct, 2012

1 commit

  • If one includes documentation for an external tool, it should be
    correct. This is not:

    1. Overriding the input to rngd should typically be neither
    necessary nor desired. This is especially so since newer
    versions of rngd support a number of different *types* of sources.
    2. The default kernel-exported device is called /dev/hwrng not
    /dev/hwrandom nor /dev/hw_random (both of which were used in the
    past; however, kernel and udev seem to have converged on
    /dev/hwrng.)

    Overall it is better if the documentation for rngd is kept with rngd
    rather than in a kernel Makefile.

    Signed-off-by: H. Peter Anvin
    Cc: David Howells
    Cc: Jeff Garzik
    Signed-off-by: Linus Torvalds

    H. Peter Anvin
     

15 Oct, 2012

1 commit

  • Pull module signing support from Rusty Russell:
    "module signing is the highlight, but it's an all-over David Howells frenzy..."

    Hmm "Magrathea: Glacier signing key". Somebody has been reading too much HHGTTG.

    * 'modules-next' of git://git.kernel.org/pub/scm/linux/kernel/git/rusty/linux: (37 commits)
    X.509: Fix indefinite length element skip error handling
    X.509: Convert some printk calls to pr_devel
    asymmetric keys: fix printk format warning
    MODSIGN: Fix 32-bit overflow in X.509 certificate validity date checking
    MODSIGN: Make mrproper should remove generated files.
    MODSIGN: Use utf8 strings in signer's name in autogenerated X.509 certs
    MODSIGN: Use the same digest for the autogen key sig as for the module sig
    MODSIGN: Sign modules during the build process
    MODSIGN: Provide a script for generating a key ID from an X.509 cert
    MODSIGN: Implement module signature checking
    MODSIGN: Provide module signing public keys to the kernel
    MODSIGN: Automatically generate module signing keys if missing
    MODSIGN: Provide Kconfig options
    MODSIGN: Provide gitignore and make clean rules for extra files
    MODSIGN: Add FIPS policy
    module: signature checking hook
    X.509: Add a crypto key parser for binary (DER) X.509 certificates
    MPILIB: Provide a function to read raw data into an MPI
    X.509: Add an ASN.1 decoder
    X.509: Add simple ASN.1 grammar compiler
    ...

    Linus Torvalds