1. 10 Nov, 2017 2 commits
  2. 08 Nov, 2017 3 commits
  3. 06 Nov, 2017 2 commits
    • Tobin C. Harding's avatar
      scripts: add leaking_addresses.pl · 136fc5c4
      Tobin C. Harding authored
      Currently we are leaking addresses from the kernel to user space. This
      script is an attempt to find some of those leakages. Script parses
      `dmesg` output and /proc and /sys files for hex strings that look like
      kernel addresses.
      Only works for 64 bit kernels, the reason being that kernel addresses on
      64 bit kernels have 'ffff' as the leading bit pattern making greping
      possible. On 32 kernels we don't have this luxury.
      Scripts is _slightly_ smarter than a straight grep, we check for false
      positives (all 0's or all 1's, and vsyscall start/finish addresses).
      [ I think there is a lot of room for improvement here, but it's already
        useful, so I'm merging it as-is. The whole "hash %p format" series is
        expected to go into 4.15, but will not fix %x users, and will not
        incentivize people to look at what they are leaking.     - Linus ]
      Signed-off-by: default avatarTobin C. Harding <me@tobin.cc>
      Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
    • Salvatore Benedetto's avatar
      MAINTAINERS: update maintainer for qat · 3c24f992
      Salvatore Benedetto authored
      Removing myself as I'm not longer following QAT development.
      Signed-off-by: default avatarSalvatore Benedetto <salvatore.benedetto@intel.com>
      Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
  4. 05 Nov, 2017 2 commits
  5. 04 Nov, 2017 1 commit
  6. 03 Nov, 2017 4 commits
  7. 02 Nov, 2017 1 commit
  8. 01 Nov, 2017 5 commits
  9. 31 Oct, 2017 3 commits
    • Paul Burton's avatar
      Update MIPS email addresses · 48c834be
      Paul Burton authored
      MIPS will soon not be a part of Imagination Technologies, and as such
      many @imgtec.com email addresses will no longer be valid. This patch
      updates the addresses for those who:
       - Have 10 or more patches in mainline authored using an @imgtec.com
         email address, or any patches dated within the past year.
       - Are still with Imagination but leaving as part of the MIPS business
         unit, as determined from an internal email address list.
       - Haven't already updated their email address (ie. JamesH) or expressed
         a desire to be excluded (ie. Maciej).
       - Acked v2 or earlier of this patch, which leaves Deng-Cheng, Matt &
      New addresses are of the form firstname.lastname@mips.com, and all
      verified against an internal email address list. An entry is added to
      .mailmap for each person such that get_maintainer.pl will report the new
      addresses rather than @imgtec.com addresses which will soon be dead.
      Instances of the affected addresses throughout the tree are then
      mechanically replaced with the new @mips.com address.
      Signed-off-by: default avatarPaul Burton <paul.burton@mips.com>
      Cc: Deng-Cheng Zhu <dengcheng.zhu@imgtec.com>
      Cc: Deng-Cheng Zhu <dengcheng.zhu@mips.com>
      Acked-by: default avatarDengcheng Zhu <dengcheng.zhu@mips.com>
      Cc: Matt Redfearn <matt.redfearn@imgtec.com>
      Cc: Matt Redfearn <matt.redfearn@mips.com>
      Acked-by: default avatarMatt Redfearn <matt.redfearn@mips.com>
      Cc: Andrew Morton <akpm@linux-foundation.org>
      Cc: linux-kernel@vger.kernel.org
      Cc: linux-mips@linux-mips.org
      Cc: trivial@kernel.org
      Patchwork: https://patchwork.linux-mips.org/patch/17540/Signed-off-by: default avatarJames Hogan <jhogan@kernel.org>
    • Scott Bauer's avatar
      MAINTAINERS: Remove Rafael from Opal maintainers. · 0e7d3a8d
      Scott Bauer authored
      He is no longer working on storage.
      Signed-off-by: default avatarScott Bauer <scott.bauer@intel.com>
      Signed-off-by: default avatarJens Axboe <axboe@kernel.dk>
    • Eric Biggers's avatar
      fscrypt: add a documentation file for filesystem-level encryption · f4f864c1
      Eric Biggers authored
      Perhaps long overdue, add a documentation file for filesystem-level
      encryption, a.k.a. fscrypt or fs/crypto/, to the Documentation
      directory.  The new file is based loosely on the latest version of the
      "EXT4 Encryption Design Document (public version)" Google Doc, but with
      many improvements made, including:
      - Reflect the reality that it is not specific to ext4 anymore.
      - More thoroughly document the design and user-visible API/behavior.
      - Replace outdated information, such as the outdated explanation of how
        encrypted filenames are hashed for indexed directories and how
        encrypted filenames are presented to userspace without the key.
        (This was changed just before release.)
      For now the focus is on the design and user-visible API/behavior, not on
      how to add encryption support to a filesystem --- since the internal API
      is still pretty messy and any standalone documentation for it would
      become outdated as things get refactored over time.
      Reviewed-by: default avatarMichael Halcrow <mhalcrow@google.com>
      Signed-off-by: default avatarEric Biggers <ebiggers@google.com>
      Signed-off-by: default avatarTheodore Ts'o <tytso@mit.edu>
  10. 30 Oct, 2017 2 commits
  11. 27 Oct, 2017 2 commits
  12. 23 Oct, 2017 2 commits
  13. 19 Oct, 2017 2 commits
  14. 17 Oct, 2017 2 commits
  15. 16 Oct, 2017 3 commits
  16. 12 Oct, 2017 1 commit
  17. 05 Oct, 2017 2 commits
  18. 04 Oct, 2017 1 commit