#include "ubifs.h" static int ubifs_crypt_get_context(struct inode *inode, void *ctx, size_t len) { return ubifs_xattr_get(inode, UBIFS_XATTR_NAME_ENCRYPTION_CONTEXT, ctx, len); } static int ubifs_crypt_set_context(struct inode *inode, const void *ctx, size_t len, void *fs_data) { return ubifs_xattr_set(inode, UBIFS_XATTR_NAME_ENCRYPTION_CONTEXT, ctx, len, 0); } static bool ubifs_crypt_empty_dir(struct inode *inode) { return ubifs_check_dir_empty(inode) == 0; } static unsigned int ubifs_crypt_max_namelen(struct inode *inode) { if (S_ISLNK(inode->i_mode)) return UBIFS_MAX_INO_DATA; else return UBIFS_MAX_NLEN; } static int ubifs_key_prefix(struct inode *inode, u8 **key) { static char prefix[] = "ubifs:"; *key = prefix; return sizeof(prefix) - 1; } int ubifs_encrypt(const struct inode *inode, struct ubifs_data_node *dn, unsigned int in_len, unsigned int *out_len, int block) { struct ubifs_info *c = inode->i_sb->s_fs_info; void *p = &dn->data; struct page *ret; unsigned int pad_len = round_up(in_len, UBIFS_CIPHER_BLOCK_SIZE); ubifs_assert(pad_len <= *out_len); dn->compr_size = cpu_to_le16(in_len); /* pad to full block cipher length */ if (pad_len != in_len) memset(p + in_len, 0, pad_len - in_len); ret = fscrypt_encrypt_page(inode, virt_to_page(&dn->data), pad_len, offset_in_page(&dn->data), block, GFP_NOFS); if (IS_ERR(ret)) { ubifs_err(c, "fscrypt_encrypt_page failed: %ld", PTR_ERR(ret)); return PTR_ERR(ret); } *out_len = pad_len; return 0; } int ubifs_decrypt(const struct inode *inode, struct ubifs_data_node *dn, unsigned int *out_len, int block) { struct ubifs_info *c = inode->i_sb->s_fs_info; int err; unsigned int clen = le16_to_cpu(dn->compr_size); unsigned int dlen = *out_len; if (clen <= 0 || clen > UBIFS_BLOCK_SIZE || clen > dlen) { ubifs_err(c, "bad compr_size: %i", clen); return -EINVAL; } ubifs_assert(dlen <= UBIFS_BLOCK_SIZE); err = fscrypt_decrypt_page(inode, virt_to_page(&dn->data), dlen, offset_in_page(&dn->data), block); if (err) { ubifs_err(c, "fscrypt_decrypt_page failed: %i", err); return err; } *out_len = clen; return 0; } struct fscrypt_operations ubifs_crypt_operations = { .flags = FS_CFLG_OWN_PAGES, .get_context = ubifs_crypt_get_context, .set_context = ubifs_crypt_set_context, .is_encrypted = __ubifs_crypt_is_encrypted, .empty_dir = ubifs_crypt_empty_dir, .max_namelen = ubifs_crypt_max_namelen, .key_prefix = ubifs_key_prefix, }; >
path: root/drivers/usb/musb/cppi_dma.c
diff options
context:
space:
mode:
authorThomas Gleixner <tglx@linutronix.de>2017-01-31 09:37:34 +0100
committerThomas Gleixner <tglx@linutronix.de>2017-01-31 21:47:58 +0100
commit0becc0ae5b42828785b589f686725ff5bc3b9b25 (patch)
treebe6d0e1f37c38ed0a7dd5da2d4b1e93f0fb43101 /drivers/usb/musb/cppi_dma.c
parent24c2503255d35c269b67162c397a1a1c1e02f6ce (diff)
x86/mce: Make timer handling more robust
Erik reported that on a preproduction hardware a CMCI storm triggers the BUG_ON in add_timer_on(). The reason is that the per CPU MCE timer is started by the CMCI logic before the MCE CPU hotplug callback starts the timer with add_timer_on(). So the timer is already queued which triggers the BUG. Using add_timer_on() is pretty pointless in this code because the timer is strictlty per CPU, initialized as pinned and all operations which arm the timer happen on the CPU to which the timer belongs. Simplify the whole machinery by using mod_timer() instead of add_timer_on() which avoids the problem because mod_timer() can handle already queued timers. Use __start_timer() everywhere so the earliest armed expiry time is preserved. Reported-by: Erik Veijola <erik.veijola@intel.com> Tested-by: Borislav Petkov <bp@alien8.de> Signed-off-by: Thomas Gleixner <tglx@linutronix.de> Reviewed-by: Borislav Petkov <bp@alien8.de> Cc: Tony Luck <tony.luck@intel.com> Link: http://lkml.kernel.org/r/alpine.DEB.2.20.1701310936080.3457@nanos Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Diffstat (limited to 'drivers/usb/musb/cppi_dma.c')