Skip to content
Snippets Groups Projects
  1. Dec 05, 2019
    • Yonghong Song's avatar
      bpf: Fix a bug when getting subprog 0 jited image in check_attach_btf_id · e9eeec58
      Yonghong Song authored
      
      For jited bpf program, if the subprogram count is 1, i.e.,
      there is no callees in the program, prog->aux->func will be NULL
      and prog->bpf_func points to image address of the program.
      
      If there is more than one subprogram, prog->aux->func is populated,
      and subprogram 0 can be accessed through either prog->bpf_func or
      prog->aux->func[0]. Other subprograms should be accessed through
      prog->aux->func[subprog_id].
      
      This patch fixed a bug in check_attach_btf_id(), where
      prog->aux->func[subprog_id] is used to access any subprogram which
      caused a segfault like below:
        [79162.619208] BUG: kernel NULL pointer dereference, address:
        0000000000000000
        ......
        [79162.634255] Call Trace:
        [79162.634974]  ? _cond_resched+0x15/0x30
        [79162.635686]  ? kmem_cache_alloc_trace+0x162/0x220
        [79162.636398]  ? selinux_bpf_prog_alloc+0x1f/0x60
        [79162.637111]  bpf_prog_load+0x3de/0x690
        [79162.637809]  __do_sys_bpf+0x105/0x1740
        [79162.638488]  do_syscall_64+0x5b/0x180
        [79162.639147]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
        ......
      
      Fixes: 5b92a28a ("bpf: Support attaching tracing BPF program to other BPF programs")
      Reported-by: default avatarEelco Chaudron <echaudro@redhat.com>
      Signed-off-by: default avatarYonghong Song <yhs@fb.com>
      Signed-off-by: default avatarAlexei Starovoitov <ast@kernel.org>
      Link: https://lore.kernel.org/bpf/20191205010606.177774-1-yhs@fb.com
      e9eeec58
    • Andrey Konovalov's avatar
      kcov: remote coverage support · eec028c9
      Andrey Konovalov authored
      Patch series " kcov: collect coverage from usb and vhost", v3.
      
      This patchset extends kcov to allow collecting coverage from backgound
      kernel threads.  This extension requires custom annotations for each of
      the places where coverage collection is desired.  This patchset
      implements this for hub events in the USB subsystem and for vhost
      workers.  See the first patch description for details about the kcov
      extension.  The other two patches apply this kcov extension to USB and
      vhost.
      
      Examples of other subsystems that might potentially benefit from this
      when custom annotations are added (the list is based on
      process_one_work() callers for bugs recently reported by syzbot):
      
      1. fs: writeback wb_workfn() worker,
      2. net: addrconf_dad_work()/addrconf_verify_work() workers,
      3. net: neigh_periodic_work() worker,
      4. net/p9: p9_write_work()/p9_read_work() workers,
      5. block: blk_mq_run_work_fn() worker.
      
      These patches have been used to enable coverage-guided USB fuzzing with
      syzkaller for the last few years, see the details here:
      
        https://github.com/google/syzkaller/blob/master/docs/linux/external_fuzzing_usb.md
      
      This patchset has been pushed to the public Linux kernel Gerrit
      instance:
      
        https://linux-review.googlesource.com/c/linux/kernel/git/torvalds/linux/+/1524
      
      This patch (of 3):
      
      Add background thread coverage collection ability to kcov.
      
      With KCOV_ENABLE coverage is collected only for syscalls that are issued
      from the current process.  With KCOV_REMOTE_ENABLE it's possible to
      collect coverage for arbitrary parts of the kernel code, provided that
      those parts are annotated with kcov_remote_start()/kcov_remote_stop().
      
      This allows to collect coverage from two types of kernel background
      threads: the global ones, that are spawned during kernel boot in a
      limited number of instances (e.g.  one USB hub_event() worker thread is
      spawned per USB HCD); and the local ones, that are spawned when a user
      interacts with some kernel interface (e.g.  vhost workers).
      
      To enable collecting coverage from a global background thread, a unique
      global handle must be assigned and passed to the corresponding
      kcov_remote_start() call.  Then a userspace process can pass a list of
      such handles to the KCOV_REMOTE_ENABLE ioctl in the handles array field
      of the kcov_remote_arg struct.  This will attach the used kcov device to
      the code sections, that are referenced by those handles.
      
      Since there might be many local background threads spawned from
      different userspace processes, we can't use a single global handle per
      annotation.  Instead, the userspace process passes a non-zero handle
      through the common_handle field of the kcov_remote_arg struct.  This
      common handle gets saved to the kcov_handle field in the current
      task_struct and needs to be passed to the newly spawned threads via
      custom annotations.  Those threads should in turn be annotated with
      kcov_remote_start()/kcov_remote_stop().
      
      Internally kcov stores handles as u64 integers.  The top byte of a
      handle is used to denote the id of a subsystem that this handle belongs
      to, and the lower 4 bytes are used to denote the id of a thread instance
      within that subsystem.  A reserved value 0 is used as a subsystem id for
      common handles as they don't belong to a particular subsystem.  The
      bytes 4-7 are currently reserved and must be zero.  In the future the
      number of bytes used for the subsystem or handle ids might be increased.
      
      When a particular userspace process collects coverage by via a common
      handle, kcov will collect coverage for each code section that is
      annotated to use the common handle obtained as kcov_handle from the
      current task_struct.  However non common handles allow to collect
      coverage selectively from different subsystems.
      
      Link: http://lkml.kernel.org/r/e90e315426a384207edbec1d6aa89e43008e4caf.1572366574.git.andreyknvl@google.com
      
      
      Signed-off-by: default avatarAndrey Konovalov <andreyknvl@google.com>
      Cc: Dmitry Vyukov <dvyukov@google.com>
      Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
      Cc: Alan Stern <stern@rowland.harvard.edu>
      Cc: "Michael S. Tsirkin" <mst@redhat.com>
      Cc: Jason Wang <jasowang@redhat.com>
      Cc: Arnd Bergmann <arnd@arndb.de>
      Cc: Steven Rostedt <rostedt@goodmis.org>
      Cc: David Windsor <dwindsor@gmail.com>
      Cc: Elena Reshetova <elena.reshetova@intel.com>
      Cc: Anders Roxell <anders.roxell@linaro.org>
      Cc: Alexander Potapenko <glider@google.com>
      Cc: Marco Elver <elver@google.com>
      Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
      eec028c9
    • Huang Shijie's avatar
      lib/genalloc.c: rename addr_in_gen_pool to gen_pool_has_addr · 964975ac
      Huang Shijie authored
      Follow the kernel conventions, rename addr_in_gen_pool to
      gen_pool_has_addr.
      
      [sjhuang@iluvatar.ai: fix Documentation/ too]
       Link: http://lkml.kernel.org/r/20181229015914.5573-1-sjhuang@iluvatar.ai
      Link: http://lkml.kernel.org/r/20181228083950.20398-1-sjhuang@iluvatar.ai
      
      
      Signed-off-by: default avatarHuang Shijie <sjhuang@iluvatar.ai>
      Reviewed-by: default avatarAndrew Morton <akpm@linux-foundation.org>
      Cc: Russell King <linux@armlinux.org.uk>
      Cc: Arnd Bergmann <arnd@arndb.de>
      Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
      Cc: Christoph Hellwig <hch@lst.de>
      Cc: Marek Szyprowski <m.szyprowski@samsung.com>
      Cc: Robin Murphy <robin.murphy@arm.com>
      Cc: Stephen Rothwell <sfr@canb.auug.org.au>
      Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
      964975ac
    • Joe Perches's avatar
      kernel/sys.c: avoid copying possible padding bytes in copy_to_user · 5e1aada0
      Joe Perches authored
      Initialization is not guaranteed to zero padding bytes so use an
      explicit memset instead to avoid leaking any kernel content in any
      possible padding bytes.
      
      Link: http://lkml.kernel.org/r/dfa331c00881d61c8ee51577a082d8bebd61805c.camel@perches.com
      
      
      Signed-off-by: default avatarJoe Perches <joe@perches.com>
      Cc: Dan Carpenter <error27@gmail.com>
      Cc: Julia Lawall <julia.lawall@lip6.fr>
      Cc: Thomas Gleixner <tglx@linutronix.de>
      Cc: Kees Cook <keescook@chromium.org>
      Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
      5e1aada0
    • Nathan Chancellor's avatar
      kernel/profile.c: use cpumask_available to check for NULL cpumask · ef70eff9
      Nathan Chancellor authored
      When building with clang + -Wtautological-pointer-compare, these
      instances pop up:
      
        kernel/profile.c:339:6: warning: comparison of array 'prof_cpu_mask' not equal to a null pointer is always true [-Wtautological-pointer-compare]
                if (prof_cpu_mask != NULL)
                    ^~~~~~~~~~~~~    ~~~~
        kernel/profile.c:376:6: warning: comparison of array 'prof_cpu_mask' not equal to a null pointer is always true [-Wtautological-pointer-compare]
                if (prof_cpu_mask != NULL)
                    ^~~~~~~~~~~~~    ~~~~
        kernel/profile.c:406:26: warning: comparison of array 'prof_cpu_mask' not equal to a null pointer is always true [-Wtautological-pointer-compare]
                if (!user_mode(regs) && prof_cpu_mask != NULL &&
                                      ^~~~~~~~~~~~~    ~~~~
        3 warnings generated.
      
      This can be addressed with the cpumask_available helper, introduced in
      commit f7e30f01 ("cpumask: Add helper cpumask_available()") to fix
      warnings like this while keeping the code the same.
      
      Link: https://github.com/ClangBuiltLinux/linux/issues/747
      Link: http://lkml.kernel.org/r/20191022191957.9554-1-natechancellor@gmail.com
      
      
      Signed-off-by: default avatarNathan Chancellor <natechancellor@gmail.com>
      Reviewed-by: default avatarAndrew Morton <akpm@linux-foundation.org>
      Cc: Thomas Gleixner <tglx@linutronix.de>
      Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
      ef70eff9
    • Xiaoming Ni's avatar
      kernel/notifier.c: remove blocking_notifier_chain_cond_register() · 260a2679
      Xiaoming Ni authored
      blocking_notifier_chain_cond_register() does not consider system_booting
      state, which is the only difference between this function and
      blocking_notifier_cain_register().  This can be a bug and is a piece of
      duplicate code.
      
      Delete blocking_notifier_chain_cond_register()
      
      Link: http://lkml.kernel.org/r/1568861888-34045-4-git-send-email-nixiaoming@huawei.com
      
      
      Signed-off-by: default avatarXiaoming Ni <nixiaoming@huawei.com>
      Reviewed-by: default avatarAndrew Morton <akpm@linux-foundation.org>
      Cc: Alan Stern <stern@rowland.harvard.edu>
      Cc: Alexey Dobriyan <adobriyan@gmail.com>
      Cc: Andy Lutomirski <luto@kernel.org>
      Cc: Anna Schumaker <anna.schumaker@netapp.com>
      Cc: Arjan van de Ven <arjan@linux.intel.com>
      Cc: Chuck Lever <chuck.lever@oracle.com>
      Cc: David S. Miller <davem@davemloft.net>
      Cc: Ingo Molnar <mingo@kernel.org>
      Cc: J. Bruce Fields <bfields@fieldses.org>
      Cc: Jeff Layton <jlayton@kernel.org>
      Cc: Nadia Derbey <Nadia.Derbey@bull.net>
      Cc: "Paul E. McKenney" <paulmck@kernel.org>
      Cc: Sam Protsenko <semen.protsenko@linaro.org>
      Cc: Thomas Gleixner <tglx@linutronix.de>
      Cc: Trond Myklebust <trond.myklebust@hammerspace.com>
      Cc: Vasily Averin <vvs@virtuozzo.com>
      Cc: Viresh Kumar <viresh.kumar@linaro.org>
      Cc: YueHaibing <yuehaibing@huawei.com>
      Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
      260a2679
    • Xiaoming Ni's avatar
      kernel/notifier.c: remove notifier_chain_cond_register() · 5adaabb6
      Xiaoming Ni authored
      The only difference between notifier_chain_cond_register() and
      notifier_chain_register() is the lack of warning hints for duplicate
      registrations.  Use notifier_chain_register() instead of
      notifier_chain_cond_register() to avoid duplicate code
      
      Link: http://lkml.kernel.org/r/1568861888-34045-3-git-send-email-nixiaoming@huawei.com
      
      
      Signed-off-by: default avatarXiaoming Ni <nixiaoming@huawei.com>
      Reviewed-by: default avatarAndrew Morton <akpm@linux-foundation.org>
      Cc: Alan Stern <stern@rowland.harvard.edu>
      Cc: Alexey Dobriyan <adobriyan@gmail.com>
      Cc: Andy Lutomirski <luto@kernel.org>
      Cc: Anna Schumaker <anna.schumaker@netapp.com>
      Cc: Arjan van de Ven <arjan@linux.intel.com>
      Cc: Chuck Lever <chuck.lever@oracle.com>
      Cc: David S. Miller <davem@davemloft.net>
      Cc: Ingo Molnar <mingo@kernel.org>
      Cc: J. Bruce Fields <bfields@fieldses.org>
      Cc: Jeff Layton <jlayton@kernel.org>
      Cc: Nadia Derbey <Nadia.Derbey@bull.net>
      Cc: "Paul E. McKenney" <paulmck@kernel.org>
      Cc: Sam Protsenko <semen.protsenko@linaro.org>
      Cc: Thomas Gleixner <tglx@linutronix.de>
      Cc: Trond Myklebust <trond.myklebust@hammerspace.com>
      Cc: Vasily Averin <vvs@virtuozzo.com>
      Cc: Viresh Kumar <viresh.kumar@linaro.org>
      Cc: YueHaibing <yuehaibing@huawei.com>
      Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
      5adaabb6
    • Xiaoming Ni's avatar
      kernel/notifier.c: intercept duplicate registrations to avoid infinite loops · 1a50cb80
      Xiaoming Ni authored
      Registering the same notifier to a hook repeatedly can cause the hook
      list to form a ring or lose other members of the list.
      
        case1: An infinite loop in notifier_chain_register() can cause soft lockup
                atomic_notifier_chain_register(&test_notifier_list, &test1);
                atomic_notifier_chain_register(&test_notifier_list, &test1);
                atomic_notifier_chain_register(&test_notifier_list, &test2);
      
        case2: An infinite loop in notifier_chain_register() can cause soft lockup
                atomic_notifier_chain_register(&test_notifier_list, &test1);
                atomic_notifier_chain_register(&test_notifier_list, &test1);
                atomic_notifier_call_chain(&test_notifier_list, 0, NULL);
      
        case3: lose other hook test2
                atomic_notifier_chain_register(&test_notifier_list, &test1);
                atomic_notifier_chain_register(&test_notifier_list, &test2);
                atomic_notifier_chain_register(&test_notifier_list, &test1);
      
        case4: Unregister returns 0, but the hook is still in the linked list,
               and it is not really registered. If you call
               notifier_call_chain after ko is unloaded, it will trigger oops.
      
      If the system is configured with softlockup_panic and the same hook is
      repeatedly registered on the panic_notifier_list, it will cause a loop
      panic.
      
      Add a check in notifier_chain_register(), intercepting duplicate
      registrations to avoid infinite loops
      
      Link: http://lkml.kernel.org/r/1568861888-34045-2-git-send-email-nixiaoming@huawei.com
      
      
      Signed-off-by: default avatarXiaoming Ni <nixiaoming@huawei.com>
      Reviewed-by: default avatarVasily Averin <vvs@virtuozzo.com>
      Reviewed-by: default avatarAndrew Morton <akpm@linux-foundation.org>
      Cc: Alexey Dobriyan <adobriyan@gmail.com>
      Cc: Anna Schumaker <anna.schumaker@netapp.com>
      Cc: Arjan van de Ven <arjan@linux.intel.com>
      Cc: J. Bruce Fields <bfields@fieldses.org>
      Cc: Chuck Lever <chuck.lever@oracle.com>
      Cc: David S. Miller <davem@davemloft.net>
      Cc: Jeff Layton <jlayton@kernel.org>
      Cc: Andy Lutomirski <luto@kernel.org>
      Cc: Ingo Molnar <mingo@kernel.org>
      Cc: Nadia Derbey <Nadia.Derbey@bull.net>
      Cc: "Paul E. McKenney" <paulmck@kernel.org>
      Cc: Sam Protsenko <semen.protsenko@linaro.org>
      Cc: Alan Stern <stern@rowland.harvard.edu>
      Cc: Thomas Gleixner <tglx@linutronix.de>
      Cc: Trond Myklebust <trond.myklebust@hammerspace.com>
      Cc: Viresh Kumar <viresh.kumar@linaro.org>
      Cc: Xiaoming Ni <nixiaoming@huawei.com>
      Cc: YueHaibing <yuehaibing@huawei.com>
      Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
      1a50cb80
  2. Dec 04, 2019
    • Steven Rostedt (VMware)'s avatar
      tracing: Do not create directories if lockdown is in affect · a356646a
      Steven Rostedt (VMware) authored
      
      If lockdown is disabling tracing on boot up, it prevents the tracing files
      from even bering created. But when that happens, there's several places that
      will give a warning that the files were not created as that is usually a
      sign of a bug.
      
      Add in strategic locations where a check is made to see if tracing is
      disabled by lockdown, and if it is, do not go further, and fail silently
      (but print that tracing is disabled by lockdown, without doing a WARN_ON()).
      
      Cc: Matthew Garrett <mjg59@google.com>
      Fixes: 17911ff3 ("tracing: Add locked_down checks to the open calls of files created for tracefs")
      Signed-off-by: default avatarSteven Rostedt (VMware) <rostedt@goodmis.org>
      a356646a
  3. Dec 02, 2019
    • Cong Wang's avatar
      tracing: Introduce trace event injection · 6c3edaf9
      Cong Wang authored
      We have been trying to use rasdaemon to monitor hardware errors like
      correctable memory errors. rasdaemon uses trace events to monitor
      various hardware errors. In order to test it, we have to inject some
      hardware errors, unfortunately not all of them provide error
      injections. MCE does provide a way to inject MCE errors, but errors
      like PCI error and devlink error don't, it is not easy to add error
      injection to each of them. Instead, it is relatively easier to just
      allow users to inject trace events in a generic way so that all trace
      events can be injected.
      
      This patch introduces trace event injection, where a new 'inject' is
      added to each tracepoint directory. Users could write into this file
      with key=value pairs to specify the value of each fields of the trace
      event, all unspecified fields are set to zero values by default.
      
      For example, for the net/net_dev_queue tracepoint, we can inject:
      
        INJECT=/sys/kernel/debug/tracing/events/net/net_dev_queue/inject
        echo "" > $INJECT
        echo "name='test'" > $INJECT
        echo "name='test' len=1024" > $INJECT
        cat /sys/kernel/debug/tracing/trace
        ...
         <...>-614   [000] ....    36.571483: net_dev_queue: dev= skbaddr=00000000fbf338c2 len=0
         <...>-614   [001] ....   136.588252: net_dev_queue: dev=test skbaddr=00000000fbf338c2 len=0
         <...>-614   [001] .N..   208.431878: net_dev_queue: dev=test skbaddr=00000000fbf338c2 len=1024
      
      Triggers could be triggered as usual too:
      
        echo "stacktrace if len == 1025" > /sys/kernel/debug/tracing/events/net/net_dev_queue/trigger
        echo "len=1025" > $INJECT
        cat /sys/kernel/debug/tracing/trace
        ...
            bash-614   [000] ....    36.571483: net_dev_queue: dev= skbaddr=00000000fbf338c2 len=0
            bash-614   [001] ....   136.588252: net_dev_queue: dev=test skbaddr=00000000fbf338c2 len=0
            bash-614   [001] .N..   208.431878: net_dev_queue: dev=test skbaddr=00000000fbf338c2 len=1024
            bash-614   [001] .N.1   284.236349: <stack trace>
       => event_inject_write
       => vfs_write
       => ksys_write
       => do_syscall_64
       => entry_SYSCALL_64_after_hwframe
      
      The only thing that can't be injected is string pointers as they
      require constant string pointers, this can't be done at run time.
      
      Link: http://lkml.kernel.org/r/20191130045218.18979-1-xiyou.wangcong@gmail.com
      
      
      
      Cc: Ingo Molnar <mingo@redhat.com>
      Signed-off-by: default avatarCong Wang <xiyou.wangcong@gmail.com>
      Signed-off-by: default avatarSteven Rostedt (VMware) <rostedt@goodmis.org>
      6c3edaf9
  4. Dec 01, 2019
  5. Nov 29, 2019
  6. Nov 27, 2019
  7. Nov 26, 2019
    • Eric W. Biederman's avatar
      sysctl: Remove the sysctl system call · 61a47c1a
      Eric W. Biederman authored
      
      This system call has been deprecated almost since it was introduced, and
      in a survey of the linux distributions I can no longer find any of them
      that enable CONFIG_SYSCTL_SYSCALL.  The only indication that I can find
      that anyone might care is that a few of the defconfigs in the kernel
      enable CONFIG_SYSCTL_SYSCALL.  However this appears in only 31 of 414
      defconfigs in the kernel, so I suspect this symbols presence is simply
      because it is harmless to include rather than because it is necessary.
      
      As there appear to be no users of the sysctl system call, remove the
      code.  As this removes one of the few uses of the internal kernel mount
      of proc I hope this allows for even more simplifications of the proc
      filesystem.
      
      Cc: Alex Smith <alex.smith@imgtec.com>
      Cc: Anders Berg <anders.berg@lsi.com>
      Cc: Apelete Seketeli <apelete@seketeli.net>
      Cc: Arnd Bergmann <arnd@arndb.de>
      Cc: Chee Nouk Phoon <cnphoon@altera.com>
      Cc: Chris Zankel <chris@zankel.net>
      Cc: Christian Ruppert <christian.ruppert@abilis.com>
      Cc: Greg Ungerer <gerg@uclinux.org>
      Cc: Harvey Hunt <harvey.hunt@imgtec.com>
      Cc: Helge Deller <deller@gmx.de>
      Cc: Hongliang Tao <taohl@lemote.com>
      Cc: Hua Yan <yanh@lemote.com>
      Cc: Huacai Chen <chenhc@lemote.com>
      Cc: John Crispin <blogic@openwrt.org>
      Cc: Jonas Jensen <jonas.jensen@gmail.com>
      Cc: Josh Boyer <jwboyer@gmail.com>
      Cc: Jun Nie <jun.nie@linaro.org>
      Cc: Kevin Hilman <khilman@linaro.org>
      Cc: Kevin Wells <kevin.wells@nxp.com>
      Cc: Kumar Gala <galak@codeaurora.org>
      Cc: Lars-Peter Clausen <lars@metafoo.de>
      Cc: Ley Foon Tan <lftan@altera.com>
      Cc: Linus Walleij <linus.walleij@linaro.org>
      Cc: Markos Chandras <markos.chandras@imgtec.com>
      Cc: Max Filippov <jcmvbkbc@gmail.com>
      Cc: Noam Camus <noamc@ezchip.com>
      Cc: Olof Johansson <olof@lixom.net>
      Cc: Paul Burton <paul.burton@mips.com>
      Cc: Paul Mundt <lethal@linux-sh.org>
      Cc: Phil Edworthy <phil.edworthy@renesas.com>
      Cc: Pierrick Hascoet <pierrick.hascoet@abilis.com>
      Cc: Ralf Baechle <ralf@linux-mips.org>
      Cc: Roland Stigge <stigge@antcom.de>
      Cc: Santosh Shilimkar <santosh.shilimkar@ti.com>
      Cc: Scott Telford <stelford@cadence.com>
      Cc: Stephen Boyd <sboyd@codeaurora.org>
      Cc: Steven J. Hill <Steven.Hill@imgtec.com>
      Cc: Tanmay Inamdar <tinamdar@apm.com>
      Cc: Vineet Gupta <vgupta@synopsys.com>
      Cc: Wolfram Sang <w.sang@pengutronix.de>
      Acked-by: default avatarAndi Kleen <ak@linux.intel.com>
      Reviewed-by: default avatarKees Cook <keescook@chromium.org>
      Signed-off-by: default avatar"Eric W. Biederman" <ebiederm@xmission.com>
      61a47c1a
  8. Nov 25, 2019
  9. Nov 23, 2019
  10. Nov 22, 2019
  11. Nov 21, 2019
  12. Nov 20, 2019
Loading