lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 6 Mar 2015 10:34:40 +0800 From: <yanjiang.jin@...driver.com> To: <horia.geanta@...escale.com>, <herbert@...dor.apana.org.au>, <davem@...emloft.net>, <kim.phillips@...escale.com> CC: <ruchika.gupta@...escale.com>, <cristian.stoica@...escale.com>, <NiteshNarayanLal@...escale.com>, <linux-crypto@...r.kernel.org>, <linux-kernel@...r.kernel.org>, <jinyanjiang@...il.com> Subject: [V3 PATCH 0/2] fix some CAAM warnings. From: Yanjiang Jin <yanjiang.jin@...driver.com> Hi, This patch series fix some CAAM compile and runtime warnings. I have tested this on fsl-p5020ds board using upstream 4.0.0-rc2 with the below configs: CONFIG_DMA_API_DEBUG=y # CONFIG_CRYPTO_MANAGER_DISABLE_TESTS is not set Change log: v3: 0001-crypto-caamhash-fix-uninitialized-edesc-sec4_sg_byte.patch is same as before. For 0002-crypto-caam_rng-fix-rng_unmap_ctx-s-DMA_UNMAP-size-p.patch 1. Fix an alignment issue; 2. update DESC_RNG_LEN to (4 * CAAM_CMD_SZ). Abandon the v2 patch 0001-crypto-caam-fix-some-compile-warnings.patch. Yanjiang Jin (2): crypto: caamhash: - fix uninitialized edesc->sec4_sg_bytes field crypto: caam_rng: fix rng_unmap_ctx's DMA_UNMAP size problem drivers/crypto/caam/caamhash.c | 1 + drivers/crypto/caam/caamrng.c | 6 +++--- 2 files changed, 4 insertions(+), 3 deletions(-) -- 1.9.1 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists