Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp975832ybi; Wed, 3 Jul 2019 07:28:45 -0700 (PDT) X-Google-Smtp-Source: APXvYqwnwJtessVm9jpUUHlyW6Rs2QlzhXYkT0BtAVyF3C4evCaj+eeoEdBdLJDTOqjcd4KV1flb X-Received: by 2002:a17:90b:d8b:: with SMTP id bg11mr13202429pjb.30.1562164125704; Wed, 03 Jul 2019 07:28:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562164125; cv=none; d=google.com; s=arc-20160816; b=SbwGfIncuM36L3CYPrnSiF1Ormo64BSNkrJLPdu9DtKMs3D5h/k2ERrC9TAZSnbrC8 rEwEVNcqc4Iq6TY7mboMudRDBbev7U/qxbMudxmWPkIsbchJwmYilTYbjQ6ERIbE+fLO qikL8dty1AYYLxk7PoGPKgCAF2mbqKQ7rzB4MJ4pGrKASmdaayXBDht2zHyPYi326dKe G81sBYNADoX6VOkeDtnLRwK2VfImKiSkuWRCkCxb07vAmekzFiDNMwYWppw515emgCAr taTKQwDRZzhXmvKKuuDpkZFZYho8iKg6HIEPR35nL0XQL+yGUNL8N8aaR+rEX7wE4Lan JKOg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=02je5vhE3KOqlejWdpYsyXQk2VNiEhYoj0oPpQdLRvc=; b=AujL4wJBVBNAfniWpfEjLsJsNP/VO/b+ZJa9jRtnwHSRYVC4cCsSZKANyupi0fiGVl SU73+HRVIPB96lCAZFquADDOsPO3uKueswiK1CpRZS5npkzxAI0gJPRBbbYqap9XSun+ zSUQvj61M7Upgh7sQq72um2qDYFQTdW7aOJ9bR5bmtZ7GCMEb1i1pAiaaO6CAvjrwL/F 5c378Til42XE+Og434WJ0mF+VNWr1ZbsJH39hfTYxSVfdAFXV0vq8nQrEyBOaJhDLA8E aKltkDCqWNd2hP9QI9frtYFsfMgcj0bodE2QRpvkPl+aEaEe5EQ6hHc9BvyKn1+MuGkf uhNw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x9si2533191pfi.211.2019.07.03.07.28.31; Wed, 03 Jul 2019 07:28:45 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726997AbfGCO1e (ORCPT + 99 others); Wed, 3 Jul 2019 10:27:34 -0400 Received: from helcar.hmeau.com ([216.24.177.18]:52124 "EHLO deadmen.hmeau.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726675AbfGCO1e (ORCPT ); Wed, 3 Jul 2019 10:27:34 -0400 Received: from gondobar.mordor.me.apana.org.au ([192.168.128.4] helo=gondobar) by deadmen.hmeau.com with esmtps (Exim 4.89 #2 (Debian)) id 1higEJ-0000cD-5e; Wed, 03 Jul 2019 22:27:27 +0800 Received: from herbert by gondobar with local (Exim 4.89) (envelope-from ) id 1higEF-0000UZ-Ar; Wed, 03 Jul 2019 22:27:23 +0800 Date: Wed, 3 Jul 2019 22:27:23 +0800 From: Herbert Xu To: Christophe Leroy Cc: "David S. Miller" , horia.geanta@nxp.com, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org Subject: Re: [PATCH v5 0/4] *** SUBJECT HERE *** Message-ID: <20190703142723.zueylnlwzajpdtvs@gondor.apana.org.au> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Mon, Jun 24, 2019 at 07:20:13AM +0000, Christophe Leroy wrote: > This series is the last set of fixes for the Talitos driver. > > We now get a fully clean boot on both SEC1 (SEC1.2 on mpc885) and > SEC2 (SEC2.2 on mpc8321E) with CONFIG_CRYPTO_MANAGER_EXTRA_TESTS: > > [ 3.385197] bus: 'platform': really_probe: probing driver talitos with device ff020000.crypto > [ 3.450982] random: fast init done > [ 12.252548] alg: No test for authenc(hmac(md5),cbc(aes)) (authenc-hmac-md5-cbc-aes-talitos-hsna) > [ 12.262226] alg: No test for authenc(hmac(md5),cbc(des3_ede)) (authenc-hmac-md5-cbc-3des-talitos-hsna) > [ 43.310737] Bug in SEC1, padding ourself > [ 45.603318] random: crng init done > [ 54.612333] talitos ff020000.crypto: fsl,sec1.2 algorithms registered in /proc/crypto > [ 54.620232] driver: 'talitos': driver_bound: bound to device 'ff020000.crypto' > > [ 1.193721] bus: 'platform': really_probe: probing driver talitos with device b0030000.crypto > [ 1.229197] random: fast init done > [ 2.714920] alg: No test for authenc(hmac(sha224),cbc(aes)) (authenc-hmac-sha224-cbc-aes-talitos) > [ 2.724312] alg: No test for authenc(hmac(sha224),cbc(aes)) (authenc-hmac-sha224-cbc-aes-talitos-hsna) > [ 4.482045] alg: No test for authenc(hmac(md5),cbc(aes)) (authenc-hmac-md5-cbc-aes-talitos) > [ 4.490940] alg: No test for authenc(hmac(md5),cbc(aes)) (authenc-hmac-md5-cbc-aes-talitos-hsna) > [ 4.500280] alg: No test for authenc(hmac(md5),cbc(des3_ede)) (authenc-hmac-md5-cbc-3des-talitos) > [ 4.509727] alg: No test for authenc(hmac(md5),cbc(des3_ede)) (authenc-hmac-md5-cbc-3des-talitos-hsna) > [ 6.631781] random: crng init done > [ 11.521795] talitos b0030000.crypto: fsl,sec2.2 algorithms registered in /proc/crypto > [ 11.529803] driver: 'talitos': driver_bound: bound to device 'b0030000.crypto' > > v2: dropped patch 1 which was irrelevant due to a rebase weirdness. Added Cc to stable on the 2 first patches. > > v3: > - removed stable reference in patch 1 > - reworded patch 1 to include name of patch 2 for the dependency. > - mentionned this dependency in patch 2 as well. > - corrected the Fixes: sha1 in patch 4 > > v4: > - using scatterwalk_ffwd() instead of opencodying SG list forwarding. > - Added a patch to fix sg_copy_to_buffer() when sg->offset() is greater than PAGE_SIZE, > otherwise sg_copy_to_buffer() fails when the list has been forwarded with scatterwalk_ffwd(). > - taken the patch "crypto: talitos - eliminate unneeded 'done' functions at build time" > out of the series because it is independent. > - added a helper to find the header field associated to a request in flush_channe() > > v5: > - Replacing the while loop by a direct shift/mask operation, as suggested by Herbert in patch 1. > > Christophe Leroy (4): > lib/scatterlist: Fix mapping iterator when sg->offset is greater than > PAGE_SIZE > crypto: talitos - move struct talitos_edesc into talitos.h > crypto: talitos - fix hash on SEC1. > crypto: talitos - drop icv_ool > > drivers/crypto/talitos.c | 102 +++++++++++++++++++---------------------------- > drivers/crypto/talitos.h | 28 +++++++++++++ > lib/scatterlist.c | 9 +++-- > 3 files changed, 74 insertions(+), 65 deletions(-) All applied. Thanks. -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt