Re: [PATCH resend 4.9] hw_random: Don't use a stack buffer in add_early_randomness()

2016-10-18 Thread Herbert Xu
On Mon, Oct 17, 2016 at 10:06:27AM -0700, Andy Lutomirski wrote: > hw_random carefully avoids using a stack buffer except in > add_early_randomness(). This causes a crash in virtio_rng if > CONFIG_VMAP_STACK=y. > > Reported-by: Matt Mullins > Tested-by: Matt Mullins

[PATCH 2/5] crypto: arm/aes-ce - enable module autoloading based on CPU feature bits

2016-10-18 Thread Ard Biesheuvel
Make the module autoloadable by tying it to the CPU feature bit that describes whether the optional instructions it relies on are implemented by the current CPU. Signed-off-by: Ard Biesheuvel --- arch/arm/crypto/aes-ce-glue.c | 5 ++--- 1 file changed, 2

[PATCH 0/5] ARM: add module autoloading support for crypto modules

2016-10-18 Thread Ard Biesheuvel
This series wires up the crypto modules that use the ARM 32-bit versions of the ARMv8 Crypto Extensions to udev autoloading, by exposing the HWCAP2 feature bits via the CPU modalias. This is very similar to the arm64 implementation, with the notable exception that ARM has its CPU feature

[PATCH 3/5] crypto: arm/ghash-ce - enable module autoloading based on CPU feature bits

2016-10-18 Thread Ard Biesheuvel
Make the module autoloadable by tying it to the CPU feature bit that describes whether the optional instructions it relies on are implemented by the current CPU. Signed-off-by: Ard Biesheuvel --- arch/arm/crypto/ghash-ce-glue.c | 6 ++ 1 file changed, 2

[PATCH 1/5] ARM: wire up HWCAP2 feature bits to the CPU modalias

2016-10-18 Thread Ard Biesheuvel
Wire up the generic support for exposing CPU feature bits via the modalias in /sys/device/system/cpu. This allows udev to automatically load modules for things like crypto algorithms that are implemented using optional instructions. Signed-off-by: Ard Biesheuvel ---

Re: [PATCH v2 0/8] crypto: ARM/arm64 - big endian fixes

2016-10-18 Thread Ard Biesheuvel
On 11 October 2016 at 19:15, Ard Biesheuvel wrote: > As it turns out, none of the accelerated crypto routines under > arch/arm64/crypto > currently work, or have ever worked correctly when built for big endian. So > this > series fixes all of them. This v2 now

[PATCH 5/5] crypto: arm/sha2-ce - enable module autoloading based on CPU feature bits

2016-10-18 Thread Ard Biesheuvel
Make the module autoloadable by tying it to the CPU feature bit that describes whether the optional instructions it relies on are implemented by the current CPU. Signed-off-by: Ard Biesheuvel --- arch/arm/crypto/sha2-ce-glue.c | 5 ++--- 1 file changed, 2

[PATCH 4/5] crypto: arm/sha1-ce - enable module autoloading based on CPU feature bits

2016-10-18 Thread Ard Biesheuvel
Make the module autoloadable by tying it to the CPU feature bit that describes whether the optional instructions it relies on are implemented by the current CPU. Signed-off-by: Ard Biesheuvel --- arch/arm/crypto/sha1-ce-glue.c | 5 ++--- 1 file changed, 2

Re: [PATCH v2 0/8] crypto: ARM/arm64 - big endian fixes

2016-10-18 Thread Catalin Marinas
On Tue, Oct 11, 2016 at 07:15:12PM +0100, Ard Biesheuvel wrote: > As it turns out, none of the accelerated crypto routines under > arch/arm64/crypto > currently work, or have ever worked correctly when built for big endian. So > this > series fixes all of them. This v2 now includes a similar fix

Re: [PATCH v2 0/8] crypto: ARM/arm64 - big endian fixes

2016-10-18 Thread Ard Biesheuvel
On 18 October 2016 at 12:49, Catalin Marinas wrote: > On Tue, Oct 11, 2016 at 07:15:12PM +0100, Ard Biesheuvel wrote: >> As it turns out, none of the accelerated crypto routines under >> arch/arm64/crypto >> currently work, or have ever worked correctly when built for

[PATCH] crypto: sun4i-ss: support the Security System PRNG

2016-10-18 Thread Corentin Labbe
From: LABBE Corentin The Security System have a PRNG. This patch add support for it as an hwrng. Signed-off-by: Corentin Labbe --- drivers/crypto/Kconfig | 8 drivers/crypto/sunxi-ss/Makefile | 1 +

Re: [PATCH -next] crypto: ccp - Fix non static symbol warning

2016-10-18 Thread Gary R Hook
On 10/17/2016 10:08 AM, Wei Yongjun wrote: From: Wei Yongjun Fixes the following sparse warning: drivers/crypto/ccp/ccp-dev.c:44:6: warning: symbol 'ccp_error_codes' was not declared. Should it be static? Signed-off-by: Wei Yongjun

Re: [PATCH -next] crypto: ccp - Fix non static symbol warning

2016-10-18 Thread Hook, Gary
On 10/17/2016 10:08 AM, Wei Yongjun wrote: > From: Wei Yongjun > > Fixes the following sparse warning: > > drivers/crypto/ccp/ccp-dev.c:44:6: warning: > symbol 'ccp_error_codes' was not declared. Should it be static? > > Signed-off-by: Wei Yongjun

[PATCH] crypto: ccp - Clean up the LSB slot allocation code

2016-10-18 Thread Gary R Hook
Fix a few problems revealed by testing: verify consistent units, especially in public slot allocation. Percolate some common initialization code up to a common routine. Add some comments. Signed-off-by: Gary R Hook --- drivers/crypto/ccp/ccp-dev-v3.c |4

Re: [PATCH v2 0/8] crypto: ARM/arm64 - big endian fixes

2016-10-18 Thread Herbert Xu
On Tue, Oct 18, 2016 at 01:14:38PM +0100, Ard Biesheuvel wrote: > On 18 October 2016 at 12:49, Catalin Marinas wrote: > > On Tue, Oct 11, 2016 at 07:15:12PM +0100, Ard Biesheuvel wrote: > >> As it turns out, none of the accelerated crypto routines under > >>

[PATCH] crypto: ccp - change bitfield type to unsigned ints

2016-10-18 Thread Gary R Hook
Bit fields are not sensitive to endianness, so use a transparent standard data type Signed-off-by: Gary R Hook --- drivers/crypto/ccp/ccp-dev.h | 42 +- 1 file changed, 21 insertions(+), 21 deletions(-) diff --git

[PATCH] crypto: ccp - remove unneeded code

2016-10-18 Thread Gary R Hook
Clean up patch for an unneeded structure member. Signed-off-by: Gary R Hook --- drivers/crypto/ccp/ccp-dev.h |1 - 1 file changed, 1 deletion(-) diff --git a/drivers/crypto/ccp/ccp-dev.h b/drivers/crypto/ccp/ccp-dev.h index 0d996fe..b96d788 100644 ---