18 Jun, 2009

2 commits


15 Jun, 2009

1 commit

  • * 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jikos/trivial: (31 commits)
    trivial: remove the trivial patch monkey's name from SubmittingPatches
    trivial: Fix a typo in comment of addrconf_dad_start()
    trivial: usb: fix missing space typo in doc
    trivial: pci hotplug: adding __init/__exit macros to sgi_hotplug
    trivial: Remove the hyphen from git commands
    trivial: fix ETIMEOUT -> ETIMEDOUT typos
    trivial: Kconfig: .ko is normally not included in module names
    trivial: SubmittingPatches: fix typo
    trivial: Documentation/dell_rbu.txt: fix typos
    trivial: Fix Pavel's address in MAINTAINERS
    trivial: ftrace:fix description of trace directory
    trivial: unnecessary (void*) cast removal in sound/oss/msnd.c
    trivial: input/misc: Fix typo in Kconfig
    trivial: fix grammo in bus_for_each_dev() kerneldoc
    trivial: rbtree.txt: fix rb_entry() parameters in sample code
    trivial: spelling fix in ppc code comments
    trivial: fix typo in bio_alloc kernel doc
    trivial: Documentation/rbtree.txt: cleanup kerneldoc of rbtree.txt
    trivial: Miscellaneous documentation typo fixes
    trivial: fix typo milisecond/millisecond for documentation and source comments.
    ...

    Linus Torvalds
     

13 Jun, 2009

1 commit


02 Jun, 2009

8 commits


18 May, 2009

1 commit


21 Apr, 2009

1 commit


12 Apr, 2009

1 commit

  • - the loaded firmware may not support crypto at all or
    only support DES and 3DES but not AES or
    support DES, 3DES and AES.

    - in case of no crypto support of the firmware, the module load will fail.
    - in case of missing AES support, the AES algorithms are not registered
    and a warning is printed during module load.

    Signed-off-by: Christian Hohnstaedt
    Signed-off-by: Herbert Xu

    Christian Hohnstaedt
     

07 Apr, 2009

1 commit


04 Apr, 2009

1 commit


03 Apr, 2009

1 commit

  • It is a fairly common operation to have a pointer to a work and to need a
    pointer to the delayed work it is contained in. In particular, all
    delayed works which want to rearm themselves will have to do that. So it
    would seem fair to offer a helper function for this operation.

    [akpm@linux-foundation.org: coding-style fixes]
    Signed-off-by: Jean Delvare
    Acked-by: Ingo Molnar
    Cc: "David S. Miller"
    Cc: Herbert Xu
    Cc: Benjamin Herrenschmidt
    Cc: Martin Schwidefsky
    Cc: Greg KH
    Cc: Pekka Enberg
    Signed-off-by: Andrew Morton
    Signed-off-by: Linus Torvalds

    Jean Delvare
     

27 Mar, 2009

2 commits

  • - keep dma functions away from chained scatterlists.
    Use the existing scatterlist iteration inside the driver
    to call dma_map_single() for each chunk and avoid dma_map_sg().

    Signed-off-by: Christian Hohnstaedt
    Tested-By: Karl Hiramoto
    Signed-off-by: Herbert Xu

    Christian Hohnstaedt
     
  • * git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6: (29 commits)
    crypto: sha512-s390 - Add missing block size
    hwrng: timeriomem - Breaks an allyesconfig build on s390:
    nlattr: Fix build error with NET off
    crypto: testmgr - add zlib test
    crypto: zlib - New zlib crypto module, using pcomp
    crypto: testmgr - Add support for the pcomp interface
    crypto: compress - Add pcomp interface
    netlink: Move netlink attribute parsing support to lib
    crypto: Fix dead links
    hwrng: timeriomem - New driver
    crypto: chainiv - Use kcrypto_wq instead of keventd_wq
    crypto: cryptd - Per-CPU thread implementation based on kcrypto_wq
    crypto: api - Use dedicated workqueue for crypto subsystem
    crypto: testmgr - Test skciphers with no IVs
    crypto: aead - Avoid infinite loop when nivaead fails selftest
    crypto: skcipher - Avoid infinite loop when cipher fails selftest
    crypto: api - Fix crypto_alloc_tfm/create_create_tfm return convention
    crypto: api - crypto_alg_mod_lookup either tested or untested
    crypto: amcc - Add crypt4xx driver
    crypto: ansi_cprng - Add maintainer
    ...

    Linus Torvalds
     

04 Mar, 2009

1 commit


26 Feb, 2009

1 commit

  • With the mandatory algorithm testing at registration, we have
    now created a deadlock with algorithms requiring fallbacks.
    This can happen if the module containing the algorithm requiring
    fallback is loaded first, without the fallback module being loaded
    first. The system will then try to test the new algorithm, find
    that it needs to load a fallback, and then try to load that.

    As both algorithms share the same module alias, it can attempt
    to load the original algorithm again and block indefinitely.

    As algorithms requiring fallbacks are a special case, we can fix
    this by giving them a different module alias than the rest. Then
    it's just a matter of using the right aliases according to what
    algorithms we're trying to find.

    Signed-off-by: Herbert Xu

    Herbert Xu
     

18 Feb, 2009

2 commits


25 Dec, 2008

15 commits

  • Previous commit for interrupt mitigation moved the done interrupt
    acknowlegement from the isr to the talitos_done tasklet.
    This patch moves the done interrupt acknowledgement back
    into the isr so that done interrupts will always be acknowledged.
    This covers the case for acknowledging interrupts for channel done processing
    that has actually already been completed by the tasklet prior to fielding
    a pending interrupt.

    Signed-off-by: Lee Nipper
    Signed-off-by: Kim Phillips
    Signed-off-by: Herbert Xu

    Lee Nipper
     
  • Base versions handle constant folding just fine.

    Signed-off-by: Harvey Harrison
    Signed-off-by: Herbert Xu

    Harvey Harrison
     
  • Use KM_SOFTIRQ instead of KM_IRQ in tasklet context.
    Added bug_on on input no-page condition.

    Signed-off-by: Evgeniy Polyakov
    Signed-off-by: Herbert Xu

    Evgeniy Polyakov
     
  • Fix queue management. Change ring size and perform its check not
    one after another descriptor, but using stored pointers to the last
    checked descriptors.

    Signed-off-by: Evgeniy Polyakov
    Signed-off-by: Herbert Xu

    Evgeniy Polyakov
     
  • Signed-off-by: Patrick McHardy
    Signed-off-by: Evgeniy Polyakov
    Signed-off-by: Herbert Xu

    Patrick McHardy
     
  • Signed-off-by: Patrick McHardy
    Signed-off-by: Evgeniy Polyakov
    Signed-off-by: Herbert Xu

    Patrick McHardy
     
  • HIFN uses the transform context to store per-request data, which breaks
    when more than one request is outstanding. Move per request members from
    struct hifn_context to a new struct hifn_request_context and convert
    the code to use this.

    Signed-off-by: Patrick McHardy
    Signed-off-by: Evgeniy Polyakov
    Signed-off-by: Herbert Xu

    Patrick McHardy
     
  • Signed-off-by: Patrick McHardy
    Signed-off-by: Evgeniy Polyakov
    Signed-off-by: Herbert Xu

    Patrick McHardy
     
  • Signed-off-by: Patrick McHardy
    Signed-off-by: Evgeniy Polyakov
    Signed-off-by: Herbert Xu

    Patrick McHardy
     
  • Resetting the control word is quite expensive. Fortunately this
    isn't an issue for the common operations such as CBC and ECB as
    the whole operation is done through a single call. However, modes
    such as LRW and XTS have to call padlock over and over again for
    one operation which really hurts if each call resets the control
    word.

    This patch uses an idea by Sebastian Siewior to store the last
    control word used on a CPU and only reset the control word if
    that changes.

    Note that any task switch automatically resets the control word
    so we only need to be accurate with regard to the stored control
    word when no task switches occur.

    Signed-off-by: Herbert Xu

    Herbert Xu
     
  • In commit ec6644d6325b5a38525f1d5b20fd4bf7db05cf2a "crypto: talitos - Preempt
    overflow interrupts", the test in atomic_inc_not_zero was interpreted by the
    author to be applied after the increment operation (not before). This off-by-one
    fix prevents overflow error interrupts from occurring when requests are frequent
    and large enough to do so.

    Signed-off-by: Vishnu Suresh
    Signed-off-by: Kim Phillips
    Signed-off-by: Herbert Xu

    Vishnu Suresh
     
  • SEC version 2.1 and above adds the capability to do the IPSec ICV
    memcmp in h/w. Results of the cmp are written back in the descriptor
    header, along with the done status. A new callback is added that
    checks these ICCR bits instead of performing the memcmp on the core,
    and is enabled by h/w capability.

    Signed-off-by: Kim Phillips

    After testing on different parts, another condition was added
    before using h/w auth check because different
    SEC revisions require different handling.

    The SEC 3.0 allows a more flexible link table where
    the auth data can span separate link table entries.
    The SEC 2.4/2.1 does not support this case.
    So a test was added in the decrypt routine
    for a fragmented case; the h/w auth check is disallowed for
    revisions not having the extent in the link table;
    in this case the hw auth check is done by software.

    A portion of a previous change for SEC 3.0 link table handling
    was removed since it became dead code with the hw auth check supported.

    This seems to be the best compromise for using hw auth check
    on supporting SEC revisions; it keeps the link table logic
    simpler for the fragmented cases.

    Signed-off-by: Lee Nipper
    Signed-off-by: Herbert Xu

    Kim Phillips
     
  • In talitos_interrupt, upon one done interrupt, mask further done interrupts,
    and ack only any error interrupt.
    In talitos_done, unmask done interrupts after completing processing.
    In flush_channel, ack each done channel processed.
    Keep done overflow interrupts masked because even though each pkt
    is ack'ed, a few done overflows still occur.

    Signed-off-by: Lee Nipper
    Signed-off-by: Kim Phillips
    Signed-off-by: Herbert Xu

    Lee Nipper
     
  • Since we ack early, the re-read interrupt status in talitos_error
    may be already updated with a new value. Pass the error ISR value
    directly in order to report and handle the error based on the correct
    error status.

    Also remove unused error tasklet.

    Signed-off-by: Kim Phillips
    Signed-off-by: Lee Nipper
    Signed-off-by: Herbert Xu

    Kim Phillips
     
  • On Tue, Sep 23, 2008 at 08:06:32PM +0200, Dimitri Puzin (max@psycast.de) wrote:
    > With this patch applied it still doesn't work as expected. The overflow
    > messages are gone however syslog shows
    > [ 120.924266] hifn0: abort: c: 0, s: 1, d: 0, r: 0.
    > when doing cryptsetup luksFormat as in original e-mail. At this point
    > cryptsetup hangs and can't be killed with -SIGKILL. I've attached
    > SysRq-t dump of this condition.

    Yes, I was wrong with the patch: HIFN does not support 64-bit addresses
    afaics.

    Attached patch should not allow HIFN to be registered on 64-bit arch, so
    crypto layer will fallback to the software algorithms.

    Signed-off-by: Evgeniy Polyakov
    Signed-off-by: Herbert Xu

    Evgeniy Polyakov
     

01 Dec, 2008

1 commit

  • talitos_remove() can be called from talitos_probe() on failure
    exit path, so it can't be __devexit.

    Signed-off-by: Al Viro
    Signed-off-by: Linus Torvalds

    Al Viro