Skip to content
Snippets Groups Projects
  1. Jan 28, 2019
  2. Jan 24, 2019
  3. Jan 18, 2019
  4. Jan 16, 2019
  5. Jan 11, 2019
  6. Jan 09, 2019
  7. Jan 08, 2019
  8. Jan 07, 2019
  9. Jan 06, 2019
    • John Pittman's avatar
      null_blk: add zoned config support information · 373282e7
      John Pittman authored
      
      If the kernel is built without CONFIG_BLK_DEV_ZONED, a modprobe
      of the null_blk driver with zoned=1 fails with 'Invalid argument'.
      This can be confusing to users, prompting a search as to why the
      parameter is invalid. To assist in that search, add a bit more
      information to the failure, additionally adding to the documentation
      that CONFIG_BLK_DEV_ZONED is needed for zoned=1.
      
      Reviewed-by: default avatarBart Van Assche <bvanassche@acm.org>
      Signed-off-by: default avatarJohn Pittman <jpittman@redhat.com>
      
      Added null_blk prefix to error message.
      
      Signed-off-by: default avatarJens Axboe <axboe@kernel.dk>
      373282e7
    • Eric Biggers's avatar
      fscrypt: add Adiantum support · 8094c3ce
      Eric Biggers authored
      Add support for the Adiantum encryption mode to fscrypt.  Adiantum is a
      tweakable, length-preserving encryption mode with security provably
      reducible to that of XChaCha12 and AES-256, subject to a security bound.
      It's also a true wide-block mode, unlike XTS.  See the paper
      "Adiantum: length-preserving encryption for entry-level processors"
      (https://eprint.iacr.org/2018/720.pdf
      
      ) for more details.  Also see
      commit 059c2a4d ("crypto: adiantum - add Adiantum support").
      
      On sufficiently long messages, Adiantum's bottlenecks are XChaCha12 and
      the NH hash function.  These algorithms are fast even on processors
      without dedicated crypto instructions.  Adiantum makes it feasible to
      enable storage encryption on low-end mobile devices that lack AES
      instructions; currently such devices are unencrypted.  On ARM Cortex-A7,
      on 4096-byte messages Adiantum encryption is about 4 times faster than
      AES-256-XTS encryption; decryption is about 5 times faster.
      
      In fscrypt, Adiantum is suitable for encrypting both file contents and
      names.  With filenames, it fixes a known weakness: when two filenames in
      a directory share a common prefix of >= 16 bytes, with CTS-CBC their
      encrypted filenames share a common prefix too, leaking information.
      Adiantum does not have this problem.
      
      Since Adiantum also accepts long tweaks (IVs), it's also safe to use the
      master key directly for Adiantum encryption rather than deriving
      per-file keys, provided that the per-file nonce is included in the IVs
      and the master key isn't used for any other encryption mode.  This
      configuration saves memory and improves performance.  A new fscrypt
      policy flag is added to allow users to opt-in to this configuration.
      
      Signed-off-by: default avatarEric Biggers <ebiggers@google.com>
      Signed-off-by: default avatarTheodore Ts'o <tytso@mit.edu>
      8094c3ce
    • Masahiro Yamada's avatar
      kbuild: generate asm-generic wrappers if mandatory headers are missing · 91998731
      Masahiro Yamada authored
      Some time ago, Sam pointed out a certain degree of overwrap between
      generic-y and mandatory-y. (https://lkml.org/lkml/2017/7/10/121
      
      )
      
      I tweaked the meaning of mandatory-y a little bit; now it defines the
      minimum set of ASM headers that all architectures must have.
      
      If arch does not have specific implementation of a mandatory header,
      Kbuild will let it fallback to the asm-generic one by automatically
      generating a wrapper. This will allow to drop lots of redundant
      generic-y defines.
      
      Previously, "mandatory" was used in the context of UAPI, but I guess
      this can be extended to kernel space ASM headers.
      
      Suggested-by: default avatarSam Ravnborg <sam@ravnborg.org>
      Signed-off-by: default avatarMasahiro Yamada <yamada.masahiro@socionext.com>
      Acked-by: default avatarSam Ravnborg <sam@ravnborg.org>
      91998731
  10. Jan 05, 2019
  11. Jan 04, 2019
  12. Jan 03, 2019
  13. Jan 02, 2019
Loading