CRYPTO_GHASH_CLMUL_NI_INTEL and CRYPTO_AES_NI_INTEL cannot be used
on UML.
Commit 3e02e5cb and 54b6a1b enabled them by accident.
Signed-off-by: Richard Weinberger rich...@nod.at
---
crypto/Kconfig |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/crypto/Kconfig b/crypto
hifn_795x works only on 32 bit, remove the detection while loading
the module and catch non-32 bit systems at build time.
Signed-off-by: Richard Weinberger rich...@nod.at
---
drivers/crypto/Kconfig |1 +
drivers/crypto/hifn_795x.c |6 ++
2 files changed, 3 insertions(+), 4
padata_cpu_callback() takes pinst-lock, to avoid taking
an uninitialized lock, register the notifier after it's
initialization.
Signed-off-by: Richard Weinberger rich...@nod.at
---
kernel/padata.c | 12 ++--
1 file changed, 6 insertions(+), 6 deletions(-)
diff --git a/kernel/padata.c b
Am Sonntag, 24. November 2013, 17:25:06 schrieb Eric Dumazet:
On Mon, 2013-11-25 at 00:42 +0100, Richard Weinberger wrote:
Commit 35f9c09fe (tcp: tcp_sendpages() should call tcp_push() once)
added an internal flag MSG_SENDPAGE_NOTLAST.
We have to ensure that MSG_MORE is also set if we set
On Fri, Nov 22, 2013 at 7:02 AM, Yuanhan Liu
yuanhan@linux.intel.com wrote:
Greetings,
I got the below dmesg and the first bad commit is
commit 20545536cd8ea949c61527b6395ec8c0d2c237b1
Author: Boaz Harrosh bharr...@panasas.com
Date: Thu Jul 19 15:22:37 2012 +0300
RFC:
Am Montag, 25. November 2013, 16:32:19 schrieb Boaz Harrosh:
On 11/25/2013 04:15 PM, Richard Weinberger wrote:
On Fri, Nov 22, 2013 at 7:02 AM, Yuanhan Liu
yuanhan@linux.intel.com wrote:
Greetings,
I got the below dmesg and the first bad commit is
commit
shawnland...@gmail.com
Original-patch: Richard Weinberger rich...@nod.at
Signed-off-by: Shawn Landden sh...@churchofgit.com
May I ask why you took over the my patch without even CC'in me nor
replying to the original
thread [PATCH] pipe_to_sendpage: Ensure that MSG_MORE is set if we
set
. Miller da...@davemloft.net
Cc: sta...@vger.kernel.org # 3.2.x
Reported-and-tested-by: Shawn Landden shawnland...@gmail.com
Signed-off-by: Richard Weinberger rich...@nod.at
---
crypto/algif_hash.c | 3 +++
crypto/algif_skcipher.c | 3 +++
2 files changed, 6 insertions(+)
diff --git a/crypto
Shawn,
Am Freitag, 29. November 2013, 06:47:04 schrieb Hannes Frederic Sowa:
On Sun, Nov 24, 2013 at 10:36:28PM -0800, Shawn Landden wrote:
Commit 35f9c09fe (tcp: tcp_sendpages() should call tcp_push() once)
added an internal flag MSG_SENDPAGE_NOTLAST, similar to
MSG_MORE.
algif_hash,
Not every arch has io memory.
So, unbreak the build by fixing the dependencies.
Signed-off-by: Richard Weinberger <rich...@nod.at>
---
drivers/char/hw_random/Kconfig | 1 +
1 file changed, 1 insertion(+)
diff --git a/drivers/char/hw_random/Kconfig b/drivers/char/hw_random/Kconfig
index d
On Tue, Jun 28, 2016 at 4:49 PM, Jason A. Donenfeld wrote:
> WireGuard acts as a virtual interface, doing layer 3 IP tunneling,
> addable with "ip link add dev wg0 type wireguard". You can set the
> interface's local IP and routes using the usual ip-address and
So every logical
Jason,
Am 01.07.2016 um 16:25 schrieb Jason A. Donenfeld:
> Hi Richard,
>
> On Fri, Jul 1, 2016 at 1:42 PM, Richard Weinberger
> <richard.weinber...@gmail.com> wrote:
>> So every logical tunnel will allocate a new net device?
>> Doesn't this scale badly? I have i
her_encrypt(req);
> if (res == -EINPROGRESS || res == -EBUSY) {
> + /* Request is being completed asynchronously; wait for it */
> wait_for_completion();
> res = ecr.res;
> }
> - kfree(alloc_buf);
> skcipher_request_free
rypt_info, NULL, crypt_info) != NULL) {
> put_crypt_info(crypt_info);
> goto retry;
> @@ -287,7 +297,7 @@ int get_crypt_info(struct inode *inode)
> if (res == -ENOKEY)
> res = 0;
> put_crypt_info(crypt_info);
> - memzero_ex
Dave,
On Wed, Jun 14, 2017 at 8:36 PM, Dave Watson wrote:
> Documentation/networking/tls.txt | 135 +++
> MAINTAINERS| 10 +
> include/linux/socket.h | 1 +
> include/net/inet_connection_sock.h | 4 +
> include/net/tcp.h
15 matches
Mail list logo