17 Mar, 2011
1 commit
-
* 'devicetree/next' of git://git.secretlab.ca/git/linux-2.6: (21 commits)
tty: serial: altera_jtaguart: Add device tree support
tty: serial: altera_uart: Add devicetree support
dt: eliminate of_platform_driver shim code
dt: Eliminate of_platform_{,un}register_driver
dt/serial: Eliminate users of of_platform_{,un}register_driver
dt/usb: Eliminate users of of_platform_{,un}register_driver
dt/video: Eliminate users of of_platform_{,un}register_driver
dt/net: Eliminate users of of_platform_{,un}register_driver
dt/sound: Eliminate users of of_platform_{,un}register_driver
dt/spi: Eliminate users of of_platform_{,un}register_driver
dt: uartlite: merge platform and of_platform driver bindings
dt: xilinx_hwicap: merge platform and of_platform driver bindings
ipmi: convert OF driver to platform driver
leds/leds-gpio: merge platform_driver with of_platform_driver
dt/sparc: Eliminate users of of_platform_{,un}register_driver
dt/powerpc: Eliminate users of of_platform_{,un}register_driver
dt/powerpc: move of_bus_type infrastructure to ibmebus
drivercore/dt: add a match table pointer to struct device
dt: Typo fix.
altera_ps2: Add devicetree support
...
01 Mar, 2011
1 commit
-
Final step to eliminate of_platform_bus_type. They're all just
platform drivers now.v2: fix type in pasemi_nand.c (thanks to Stephen Rothwell)
Signed-off-by: Grant Likely
28 Feb, 2011
2 commits
-
Get rid of old users of of_platform_driver in arch/sparc. Most
of_platform_driver users can be converted to use the platform_bus
directly.Signed-off-by: Grant Likely
-
Get rid of old users of of_platform_driver in arch/powerpc. Most
of_platform_driver users can be converted to use the platform_bus
directly.Signed-off-by: Grant Likely
21 Feb, 2011
1 commit
-
Picochip picoXcell devices have two crypto engines, one targeted
at IPSEC offload and the other at WCDMA layer 2 ciphering.Signed-off-by: Jamie Iles
Signed-off-by: Herbert Xu
29 Jan, 2011
2 commits
-
clk_get() returns a struct clk cookie to the driver and some platforms
may return NULL if they only support a single clock. clk_get() has only
failed if it returns a ERR_PTR() encoded pointer.Signed-off-by: Jamie Iles
Reviewed-by: Aaro Koskinen
Reviewed-by: Dmitry Kasatkin
Signed-off-by: Herbert Xu -
clk_get() returns a struct clk cookie to the driver and some platforms
may return NULL if they only support a single clock. clk_get() has only
failed if it returns a ERR_PTR() encoded pointer.Signed-off-by: Jamie Iles
Reviewed-and-tested-by: Tobias Karnat
Signed-off-by: Herbert Xu
14 Jan, 2011
1 commit
-
* git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6: (46 commits)
hwrng: via_rng - Fix memory scribbling on some CPUs
crypto: padlock - Move padlock.h into include/crypto
hwrng: via_rng - Fix asm constraints
crypto: n2 - use __devexit not __exit in n2_unregister_algs
crypto: mark crypto workqueues CPU_INTENSIVE
crypto: mv_cesa - dont return PTR_ERR() of wrong pointer
crypto: ripemd - Set module author and update email address
crypto: omap-sham - backlog handling fix
crypto: gf128mul - Remove experimental tag
crypto: af_alg - fix af_alg memory_allocated data type
crypto: aesni-intel - Fixed build with binutils 2.16
crypto: af_alg - Make sure sk_security is initialized on accept()ed sockets
net: Add missing lockdep class names for af_alg
include: Install linux/if_alg.h for user-space crypto API
crypto: omap-aes - checkpatch --file warning fixes
crypto: omap-aes - initialize aes module once per request
crypto: omap-aes - unnecessary code removed
crypto: omap-aes - error handling implementation improved
crypto: omap-aes - redundant locking is removed
crypto: omap-aes - DMA initialization fixes for OMAP off mode
...
07 Jan, 2011
1 commit
-
This patch moves padlock.h from drivers/crypto into include/crypto
so that it may be used by the via-rng driver.Signed-off-by: Herbert Xu
06 Jan, 2011
1 commit
-
fixes fedora sparc build failure, thanks to kylem for helping with debugging
Signed-off-by: Dennis Gilmore
Acked-by: David S. Miller
Signed-off-by: Herbert Xu
04 Jan, 2011
1 commit
-
Fix a PTR_ERR() return of the wrong pointer
Signed-off-by: Roel Kluin
Signed-off-by: Herbert Xu
29 Dec, 2010
1 commit
-
Previous commit "removed redundant locking" introduced
a bug in handling backlog.
In certain cases, when async request complete callback will
call complete() on -EINPROGRESS code, it will cause uncompleted requests.
It does not happen in implementation similar to crypto test manager,
but it will happen in implementation similar to dm-crypt.
Backlog needs to be checked before dequeuing next request.Signed-off-by: Dmitry Kasatkin
Signed-off-by: Herbert Xu
02 Dec, 2010
6 commits
-
Signed-off-by: Dmitry Kasatkin
Signed-off-by: Herbert Xu -
AES module was initialized for every DMA transaction.
That is redundant.
Now it is initialized once per request.Signed-off-by: Dmitry Kasatkin
Signed-off-by: Herbert Xu -
Key and IV should always be set before AES operation.
So no need to check if it has changed or not.Signed-off-by: Dmitry Kasatkin
Signed-off-by: Herbert Xu -
Previous version had not error handling.
Request could remain uncompleted.Also in the case of DMA error, FLAGS_INIT is unset
and accelerator will be initialized again.Buffer size allignment is checked.
Signed-off-by: Dmitry Kasatkin
Signed-off-by: Herbert Xu -
Submitting request involved double locking for enqueuing and
dequeuing. Now it is done under the same lock.FLAGS_BUSY is now handled under the same lock.
Signed-off-by: Dmitry Kasatkin
Signed-off-by: Herbert Xu -
DMA parameters for constant data were initialized during driver probe().
It seems that those settings sometimes are lost when devices goes to off mode.
This patch makes DMA initialization just before use.
It solves off mode problems.Signed-off-by: Dmitry Kasatkin
Signed-off-by: Herbert Xu
27 Nov, 2010
8 commits
-
If scatterlist have more than one entry, current driver uses
aligned buffer to copy data to to accelerator to tackle possible
issues with DMA and SHA buffer alignment.This commit adds more intelligence to verify SG alignment and
possibility to use DMA directly on the data without using copy
buffer.Signed-off-by: Dmitry Kasatkin
Signed-off-by: Herbert Xu -
bufcnt is 0 if it was no update requests before,
which is exact meaning of FLAGS_FIRST.Signed-off-by: Dmitry Kasatkin
Signed-off-by: Herbert Xu -
Hash-in-progress is now stored in hw format.
Only on final call, hash is converted to correct format.
Speedup copy procedure and will allow to use OMAP burst mode.Signed-off-by: Dmitry Kasatkin
Signed-off-by: Herbert Xu -
According to the Herbert Xu, client may not always call
crypto_ahash_final().In the case of error in hash calculation resources will be
automatically cleaned up.But if no hash calculation error happens and client will not call
crypto_ahash_final() at all, then internal buffer will not be freed,
and clocks will not be disabled.This patch provides support for atomic crypto_ahash_update() call.
Clocks are now enabled and disabled per update request.Data buffer is now allocated as a part of request context.
Client is obligated to free it with crypto_free_ahash().Signed-off-by: Dmitry Kasatkin
Signed-off-by: Herbert Xu -
Locking for queuing and dequeuing is combined.
test_and_set_bit() is also replaced with checking under dd->lock.Signed-off-by: Dmitry Kasatkin
Signed-off-by: Herbert Xu -
Introduces DMA error handling.
DMA error is returned as a result code of the hash request.
Clients needs to handle error codes and may repeat hash calculation attempt.Also in the case of DMA error, SHAM module is set to be re-initialized again.
It significantly improves stability against possible HW failures.Signed-off-by: Dmitry Kasatkin
Signed-off-by: Herbert Xu -
DMA parameters for constant data were initialized during driver probe().
It seems that those settings sometimes are lost when devices goes to off mode.
This patch makes DMA initialization just before use.
It solves off mode problems.Fixes: NB#202786 - Aegis & SHA1 block off mode changes
Signed-off-by: Dmitry Kasatkin
Signed-off-by: Herbert Xu -
Currently driver storred digest results in req->results
provided by the client. But some clients do not set it
until final() call. It leads to crash.
Changed to use internal buffer to store temporary digest results.Signed-off-by: Dmitry Kasatkin
Signed-off-by: Herbert Xu
14 Nov, 2010
1 commit
-
* git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6:
crypto: padlock - Fix AES-CBC handling on odd-block-sized input
crypto: n2 - dubious error check
05 Nov, 2010
1 commit
-
On certain VIA chipsets AES-CBC requires the input/output to be
a multiple of 64 bytes. We had a workaround for this but it was
buggy as it sent the whole input for processing when it is meant
to only send the initial number of blocks which makes the rest
a multiple of 64 bytes.As expected this causes memory corruption whenever the workaround
kicks in.Reported-by: Phil Sutter
Signed-off-by: Herbert Xu
27 Oct, 2010
1 commit
-
Use the new {max,min}3 macros to save some cycles and bytes on the stack.
This patch substitutes trivial nested macros with their counterpart.Signed-off-by: Hagen Paul Pfeifer
Cc: Joe Perches
Cc: Ingo Molnar
Cc: Hartley Sweeten
Cc: Russell King
Cc: Benjamin Herrenschmidt
Cc: Thomas Gleixner
Cc: Herbert Xu
Cc: Roland Dreier
Cc: Sean Hefty
Cc: Pekka Enberg
Signed-off-by: Andrew Morton
Signed-off-by: Linus Torvalds
26 Oct, 2010
1 commit
-
Looks like a copy-and-paste problem to me.
Signed-off-by: Nicolas Kaiser
Acked-by: David S. Miller
Signed-off-by: Herbert Xu
25 Oct, 2010
1 commit
-
* git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6:
crypto: Makefile - replace the use of -objs with -y
crypto: hifn_795x - use cancel_delayed_work_sync()
crypto: talitos - sparse check endian fixes
crypto: talitos - fix checkpatch warning
crypto: talitos - fix warning: 'alg' may be used uninitialized in this function
crypto: cryptd - Adding the AEAD interface type support to cryptd
crypto: n2_crypto - Niagara2 driver needs to depend upon CRYPTO_DES
crypto: Kconfig - update broken web addresses
crypto: omap-sham - Adjust DMA parameters
crypto: fips - FIPS requires algorithm self-tests
crypto: omap-aes - OMAP2/3 AES hw accelerator driver
crypto: updates to enable omap aes
padata: add missing __percpu markup in include/linux/padata.h
MAINTAINERS: Add maintainer entries for padata/pcrypt
19 Oct, 2010
2 commits
-
Changed -objs to -y in Makefile.
Signed-off-by: Tracey Dent
Signed-off-by: Herbert Xu -
Make hifn_795x::hifn_remove() call cancel_delayed_work_sync() instead
of calling cancel_delayed_work() followed by flush_scheduled_work().This is to prepare for the deprecation and removal of
flush_scheduled_work().Signed-off-by: Tejun Heo
Signed-off-by: Herbert Xu
23 Sep, 2010
3 commits
-
Signed-off-by: Kim Phillips
Signed-off-by: Herbert Xu -
WARNING: kfree(NULL) is safe this check is probably not required
+ if (priv->chan[i].fifo)
+ kfree(priv->chan[i].fifo);Signed-off-by: Kim Phillips
Signed-off-by: Herbert Xu -
drivers/crypto/talitos.c: In function 'talitos_probe':
drivers/crypto/talitos.c:2363: warning: 'alg' may be used uninitialized in this function
drivers/crypto/talitos.c:2363: note: 'alg' was declared hereSigned-off-by: Kim Phillips
Signed-off-by: Herbert Xu
12 Sep, 2010
1 commit
-
Reported-by: Dennis Gilmore
Signed-off-by: David S. Miller
Signed-off-by: Herbert Xu
03 Sep, 2010
2 commits
-
DMA is set to use burst mode also for source channel. It should
descrease memory bandwidth needs.DMA synchronization is set to use prefetch mechanism. SHAM block is behind
L4 bus and it doesn't have fifo. SHAM block is stalling as long as the new
data is available. It takes time to fetch data from memory and transfer it
via L4 bus. With prefetch enabled, data is waiting in DMA fifo and SHAM block
receives new data block faster.
This increases SHA processing speed up to 30 percent depending on the
bus / memory load.Signed-off-by: Samu Onkalo
Signed-off-by: Dmitry Kasatkin
Signed-off-by: Herbert Xu -
Signed-off-by: Dmitry Kasatkin
Signed-off-by: Herbert Xu
13 Aug, 2010
1 commit
-
warning: (ZCRYPT && CRYPTO && CRYPTO_HW && S390 && ZCRYPT=y) selects
ZCRYPT_MONOLITHIC which has unmet direct dependencies (ZCRYPT=m)ZCRYPT_MONOLITHIC should not depend on ZCRYPT="m" when it gets
selected if ZCRYPT="y".Signed-off-by: Heiko Carstens
Signed-off-by: Martin Schwidefsky