From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.linuxfoundation.org ([140.211.169.12]:59876 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1161246AbdAIPDy (ORCPT ); Mon, 9 Jan 2017 10:03:54 -0500 Subject: Patch "crypto: arm64/ghash-ce - fix for big endian" has been added to the 4.4-stable tree To: ard.biesheuvel@linaro.org, gregkh@linuxfoundation.org, herbert@gondor.apana.org.au Cc: , From: Date: Mon, 09 Jan 2017 16:03:59 +0100 Message-ID: <1483974239188195@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=ANSI_X3.4-1968 Content-Transfer-Encoding: 8bit Sender: stable-owner@vger.kernel.org List-ID: This is a note to let you know that I've just added the patch titled crypto: arm64/ghash-ce - fix for big endian to the 4.4-stable tree which can be found at: http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary The filename of the patch is: crypto-arm64-ghash-ce-fix-for-big-endian.patch and it can be found in the queue-4.4 subdirectory. If you, or anyone else, feels it should not be added to the stable tree, please let know about it. >>From 9c433ad5083fd4a4a3c721d86cbfbd0b2a2326a5 Mon Sep 17 00:00:00 2001 From: Ard Biesheuvel Date: Tue, 11 Oct 2016 19:15:14 +0100 Subject: crypto: arm64/ghash-ce - fix for big endian From: Ard Biesheuvel commit 9c433ad5083fd4a4a3c721d86cbfbd0b2a2326a5 upstream. The GHASH key and digest are both pairs of 64-bit quantities, but the GHASH code does not always refer to them as such, causing failures when built for big endian. So replace the 16x1 loads and stores with 2x8 ones. Fixes: b913a6404ce2 ("arm64/crypto: improve performance of GHASH algorithm") Signed-off-by: Ard Biesheuvel Signed-off-by: Herbert Xu Signed-off-by: Greg Kroah-Hartman --- arch/arm64/crypto/ghash-ce-core.S | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) --- a/arch/arm64/crypto/ghash-ce-core.S +++ b/arch/arm64/crypto/ghash-ce-core.S @@ -29,8 +29,8 @@ * struct ghash_key const *k, const char *head) */ ENTRY(pmull_ghash_update) - ld1 {SHASH.16b}, [x3] - ld1 {XL.16b}, [x1] + ld1 {SHASH.2d}, [x3] + ld1 {XL.2d}, [x1] movi MASK.16b, #0xe1 ext SHASH2.16b, SHASH.16b, SHASH.16b, #8 shl MASK.2d, MASK.2d, #57 @@ -74,6 +74,6 @@ CPU_LE( rev64 T1.16b, T1.16b ) cbnz w0, 0b - st1 {XL.16b}, [x1] + st1 {XL.2d}, [x1] ret ENDPROC(pmull_ghash_update) Patches currently in stable-queue which might be from ard.biesheuvel@linaro.org are queue-4.4/crypto-arm64-aes-neon-fix-for-big-endian.patch queue-4.4/crypto-arm64-ghash-ce-fix-for-big-endian.patch queue-4.4/crypto-arm64-aes-ce-fix-for-big-endian.patch queue-4.4/crypto-arm64-aes-xts-ce-fix-for-big-endian.patch queue-4.4/crypto-arm-aes-ce-fix-for-big-endian.patch queue-4.4/crypto-arm64-aes-ccm-ce-fix-for-big-endian.patch queue-4.4/crypto-arm64-sha2-ce-fix-for-big-endian.patch queue-4.4/crypto-arm64-sha1-ce-fix-for-big-endian.patch