From: kbuild test robot <lkp@intel.com> To: "Jason A. Donenfeld" <Jason@zx2c4.com> Cc: kbuild-all@01.org, Netdev <netdev@vger.kernel.org>, kernel-hardening@lists.openwall.com, LKML <linux-kernel@vger.kernel.org>, linux-crypto@vger.kernel.org, "Jason A. Donenfeld" <Jason@zx2c4.com>, Jean-Philippe Aumasson <jeanphilippe.aumasson@gmail.com>, "Daniel J . Bernstein" <djb@cr.yp.to>, Linus Torvalds <torvalds@linux-foundation.org>, Eric Biggers <ebiggers3@gmail.com>, David Laight <David.Laight@aculab.com> Subject: Re: [PATCH v4 1/4] siphash: add cryptographically secure hashtable function Date: Thu, 15 Dec 2016 12:23:25 +0800 [thread overview] Message-ID: <201612151212.QLO9EKFd%fengguang.wu@intel.com> (raw) In-Reply-To: <20161215014649.20068-1-Jason@zx2c4.com> [-- Attachment #1: Type: text/plain, Size: 6410 bytes --] Hi Jason, [auto build test ERROR on linus/master] [also build test ERROR on v4.9 next-20161215] [if your patch is applied to the wrong git tree, please drop us a note to help improve the system] url: https://github.com/0day-ci/linux/commits/Jason-A-Donenfeld/siphash-add-cryptographically-secure-hashtable-function/20161215-095213 config: ia64-allmodconfig (attached as .config) compiler: ia64-linux-gcc (GCC) 6.2.0 reproduce: wget https://git.kernel.org/cgit/linux/kernel/git/wfg/lkp-tests.git/plain/sbin/make.cross -O ~/bin/make.cross chmod +x ~/bin/make.cross # save the attached .config to linux build tree make.cross ARCH=ia64 Note: the linux-review/Jason-A-Donenfeld/siphash-add-cryptographically-secure-hashtable-function/20161215-095213 HEAD 3e343f4316f94cded0d1384cf35957fd51dbbc28 builds fine. It only hurts bisectibility. All error/warnings (new ones prefixed by >>): In file included from include/linux/linkage.h:6:0, from include/linux/kernel.h:6, from lib/siphash.c:12: >> lib/siphash.c:152:15: error: 'siphash24_unaligned' undeclared here (not in a function) EXPORT_SYMBOL(siphash24_unaligned); ^ include/linux/export.h:58:16: note: in definition of macro '___EXPORT_SYMBOL' extern typeof(sym) sym; \ ^~~ >> lib/siphash.c:152:1: note: in expansion of macro 'EXPORT_SYMBOL' EXPORT_SYMBOL(siphash24_unaligned); ^~~~~~~~~~~~~ vim +/siphash24_unaligned +152 lib/siphash.c 6 * https://131002.net/siphash/ 7 * 8 * This implementation is specifically for SipHash2-4. 9 */ 10 11 #include <linux/siphash.h> > 12 #include <linux/kernel.h> 13 #include <asm/unaligned.h> 14 15 #if defined(CONFIG_DCACHE_WORD_ACCESS) && BITS_PER_LONG == 64 16 #include <linux/dcache.h> 17 #include <asm/word-at-a-time.h> 18 #endif 19 20 static inline u16 le16_to_cpuvp(const void *p) 21 { 22 return le16_to_cpup(p); 23 } 24 static inline u32 le32_to_cpuvp(const void *p) 25 { 26 return le32_to_cpup(p); 27 } 28 static inline u64 le64_to_cpuvp(const void *p) 29 { 30 return le64_to_cpup(p); 31 } 32 33 #define SIPROUND \ 34 do { \ 35 v0 += v1; v1 = rol64(v1, 13); v1 ^= v0; v0 = rol64(v0, 32); \ 36 v2 += v3; v3 = rol64(v3, 16); v3 ^= v2; \ 37 v0 += v3; v3 = rol64(v3, 21); v3 ^= v0; \ 38 v2 += v1; v1 = rol64(v1, 17); v1 ^= v2; v2 = rol64(v2, 32); \ 39 } while(0) 40 41 /** 42 * siphash - compute 64-bit siphash PRF value 43 * @data: buffer to hash, must be aligned to SIPHASH_ALIGNMENT 44 * @size: size of @data 45 * @key: key buffer of size SIPHASH_KEY_LEN, must be aligned to SIPHASH_ALIGNMENT 46 */ 47 u64 siphash(const u8 *data, size_t len, const u8 key[SIPHASH_KEY_LEN]) 48 { 49 u64 v0 = 0x736f6d6570736575ULL; 50 u64 v1 = 0x646f72616e646f6dULL; 51 u64 v2 = 0x6c7967656e657261ULL; 52 u64 v3 = 0x7465646279746573ULL; 53 u64 b = ((u64)len) << 56; 54 u64 k0 = le64_to_cpuvp(key); 55 u64 k1 = le64_to_cpuvp(key + sizeof(u64)); 56 u64 m; 57 const u8 *end = data + len - (len % sizeof(u64)); 58 const u8 left = len & (sizeof(u64) - 1); 59 v3 ^= k1; 60 v2 ^= k0; 61 v1 ^= k1; 62 v0 ^= k0; 63 for (; data != end; data += sizeof(u64)) { 64 m = le64_to_cpuvp(data); 65 v3 ^= m; 66 SIPROUND; 67 SIPROUND; 68 v0 ^= m; 69 } 70 #if defined(CONFIG_DCACHE_WORD_ACCESS) && BITS_PER_LONG == 64 71 if (left) 72 b |= le64_to_cpu((__force __le64)(load_unaligned_zeropad(data) & bytemask_from_count(left))); 73 #else 74 switch (left) { 75 case 7: b |= ((u64)data[6]) << 48; 76 case 6: b |= ((u64)data[5]) << 40; 77 case 5: b |= ((u64)data[4]) << 32; 78 case 4: b |= le32_to_cpuvp(data); break; 79 case 3: b |= ((u64)data[2]) << 16; 80 case 2: b |= le16_to_cpuvp(data); break; 81 case 1: b |= data[0]; 82 } 83 #endif 84 v3 ^= b; 85 SIPROUND; 86 SIPROUND; 87 v0 ^= b; 88 v2 ^= 0xff; 89 SIPROUND; 90 SIPROUND; 91 SIPROUND; 92 SIPROUND; 93 return (v0 ^ v1) ^ (v2 ^ v3); 94 } 95 EXPORT_SYMBOL(siphash); 96 97 #ifndef CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS 98 /** 99 * siphash - compute 64-bit siphash PRF value, without alignment requirements 100 * @data: buffer to hash 101 * @size: size of @data 102 * @key: key buffer of size SIPHASH_KEY_LEN, must be aligned to SIPHASH_ALIGNMENT 103 */ 104 u64 siphash_unaligned(const u8 *data, size_t len, const u8 key[SIPHASH_KEY_LEN]) 105 { 106 u64 v0 = 0x736f6d6570736575ULL; 107 u64 v1 = 0x646f72616e646f6dULL; 108 u64 v2 = 0x6c7967656e657261ULL; 109 u64 v3 = 0x7465646279746573ULL; 110 u64 b = ((u64)len) << 56; 111 u64 k0 = le64_to_cpuvp(key); 112 u64 k1 = le64_to_cpuvp(key + sizeof(u64)); 113 u64 m; 114 const u8 *end = data + len - (len % sizeof(u64)); 115 const u8 left = len & (sizeof(u64) - 1); 116 v3 ^= k1; 117 v2 ^= k0; 118 v1 ^= k1; 119 v0 ^= k0; 120 for (; data != end; data += sizeof(u64)) { 121 m = get_unaligned_le64(data); 122 v3 ^= m; 123 SIPROUND; 124 SIPROUND; 125 v0 ^= m; 126 } 127 #if defined(CONFIG_DCACHE_WORD_ACCESS) && BITS_PER_LONG == 64 128 if (left) 129 b |= le64_to_cpu((__force __le64)(load_unaligned_zeropad(data) & bytemask_from_count(left))); 130 #else 131 switch (left) { 132 case 7: b |= ((u64)data[6]) << 48; 133 case 6: b |= ((u64)data[5]) << 40; 134 case 5: b |= ((u64)data[4]) << 32; 135 case 4: b |= get_unaligned_le32(data); break; 136 case 3: b |= ((u64)data[2]) << 16; 137 case 2: b |= get_unaligned_le16(data); break; 138 case 1: b |= data[0]; 139 } 140 #endif 141 v3 ^= b; 142 SIPROUND; 143 SIPROUND; 144 v0 ^= b; 145 v2 ^= 0xff; 146 SIPROUND; 147 SIPROUND; 148 SIPROUND; 149 SIPROUND; 150 return (v0 ^ v1) ^ (v2 ^ v3); 151 } > 152 EXPORT_SYMBOL(siphash24_unaligned); 153 #endif --- 0-DAY kernel test infrastructure Open Source Technology Center https://lists.01.org/pipermail/kbuild-all Intel Corporation [-- Attachment #2: .config.gz --] [-- Type: application/gzip, Size: 45649 bytes --]
WARNING: multiple messages have this Message-ID (diff)
From: kbuild test robot <lkp@intel.com> To: "Jason A. Donenfeld" <Jason@zx2c4.com> Cc: kbuild-all@01.org, Netdev <netdev@vger.kernel.org>, kernel-hardening@lists.openwall.com, LKML <linux-kernel@vger.kernel.org>, linux-crypto@vger.kernel.org, Jean-Philippe Aumasson <jeanphilippe.aumasson@gmail.com>, "Daniel J . Bernstein" <djb@cr.yp.to>, Linus Torvalds <torvalds@linux-foundation.org>, Eric Biggers <ebiggers3@gmail.com>, David Laight <David.Laight@aculab.com> Subject: [kernel-hardening] Re: [PATCH v4 1/4] siphash: add cryptographically secure hashtable function Date: Thu, 15 Dec 2016 12:23:25 +0800 [thread overview] Message-ID: <201612151212.QLO9EKFd%fengguang.wu@intel.com> (raw) In-Reply-To: <20161215014649.20068-1-Jason@zx2c4.com> [-- Attachment #1: Type: text/plain, Size: 6410 bytes --] Hi Jason, [auto build test ERROR on linus/master] [also build test ERROR on v4.9 next-20161215] [if your patch is applied to the wrong git tree, please drop us a note to help improve the system] url: https://github.com/0day-ci/linux/commits/Jason-A-Donenfeld/siphash-add-cryptographically-secure-hashtable-function/20161215-095213 config: ia64-allmodconfig (attached as .config) compiler: ia64-linux-gcc (GCC) 6.2.0 reproduce: wget https://git.kernel.org/cgit/linux/kernel/git/wfg/lkp-tests.git/plain/sbin/make.cross -O ~/bin/make.cross chmod +x ~/bin/make.cross # save the attached .config to linux build tree make.cross ARCH=ia64 Note: the linux-review/Jason-A-Donenfeld/siphash-add-cryptographically-secure-hashtable-function/20161215-095213 HEAD 3e343f4316f94cded0d1384cf35957fd51dbbc28 builds fine. It only hurts bisectibility. All error/warnings (new ones prefixed by >>): In file included from include/linux/linkage.h:6:0, from include/linux/kernel.h:6, from lib/siphash.c:12: >> lib/siphash.c:152:15: error: 'siphash24_unaligned' undeclared here (not in a function) EXPORT_SYMBOL(siphash24_unaligned); ^ include/linux/export.h:58:16: note: in definition of macro '___EXPORT_SYMBOL' extern typeof(sym) sym; \ ^~~ >> lib/siphash.c:152:1: note: in expansion of macro 'EXPORT_SYMBOL' EXPORT_SYMBOL(siphash24_unaligned); ^~~~~~~~~~~~~ vim +/siphash24_unaligned +152 lib/siphash.c 6 * https://131002.net/siphash/ 7 * 8 * This implementation is specifically for SipHash2-4. 9 */ 10 11 #include <linux/siphash.h> > 12 #include <linux/kernel.h> 13 #include <asm/unaligned.h> 14 15 #if defined(CONFIG_DCACHE_WORD_ACCESS) && BITS_PER_LONG == 64 16 #include <linux/dcache.h> 17 #include <asm/word-at-a-time.h> 18 #endif 19 20 static inline u16 le16_to_cpuvp(const void *p) 21 { 22 return le16_to_cpup(p); 23 } 24 static inline u32 le32_to_cpuvp(const void *p) 25 { 26 return le32_to_cpup(p); 27 } 28 static inline u64 le64_to_cpuvp(const void *p) 29 { 30 return le64_to_cpup(p); 31 } 32 33 #define SIPROUND \ 34 do { \ 35 v0 += v1; v1 = rol64(v1, 13); v1 ^= v0; v0 = rol64(v0, 32); \ 36 v2 += v3; v3 = rol64(v3, 16); v3 ^= v2; \ 37 v0 += v3; v3 = rol64(v3, 21); v3 ^= v0; \ 38 v2 += v1; v1 = rol64(v1, 17); v1 ^= v2; v2 = rol64(v2, 32); \ 39 } while(0) 40 41 /** 42 * siphash - compute 64-bit siphash PRF value 43 * @data: buffer to hash, must be aligned to SIPHASH_ALIGNMENT 44 * @size: size of @data 45 * @key: key buffer of size SIPHASH_KEY_LEN, must be aligned to SIPHASH_ALIGNMENT 46 */ 47 u64 siphash(const u8 *data, size_t len, const u8 key[SIPHASH_KEY_LEN]) 48 { 49 u64 v0 = 0x736f6d6570736575ULL; 50 u64 v1 = 0x646f72616e646f6dULL; 51 u64 v2 = 0x6c7967656e657261ULL; 52 u64 v3 = 0x7465646279746573ULL; 53 u64 b = ((u64)len) << 56; 54 u64 k0 = le64_to_cpuvp(key); 55 u64 k1 = le64_to_cpuvp(key + sizeof(u64)); 56 u64 m; 57 const u8 *end = data + len - (len % sizeof(u64)); 58 const u8 left = len & (sizeof(u64) - 1); 59 v3 ^= k1; 60 v2 ^= k0; 61 v1 ^= k1; 62 v0 ^= k0; 63 for (; data != end; data += sizeof(u64)) { 64 m = le64_to_cpuvp(data); 65 v3 ^= m; 66 SIPROUND; 67 SIPROUND; 68 v0 ^= m; 69 } 70 #if defined(CONFIG_DCACHE_WORD_ACCESS) && BITS_PER_LONG == 64 71 if (left) 72 b |= le64_to_cpu((__force __le64)(load_unaligned_zeropad(data) & bytemask_from_count(left))); 73 #else 74 switch (left) { 75 case 7: b |= ((u64)data[6]) << 48; 76 case 6: b |= ((u64)data[5]) << 40; 77 case 5: b |= ((u64)data[4]) << 32; 78 case 4: b |= le32_to_cpuvp(data); break; 79 case 3: b |= ((u64)data[2]) << 16; 80 case 2: b |= le16_to_cpuvp(data); break; 81 case 1: b |= data[0]; 82 } 83 #endif 84 v3 ^= b; 85 SIPROUND; 86 SIPROUND; 87 v0 ^= b; 88 v2 ^= 0xff; 89 SIPROUND; 90 SIPROUND; 91 SIPROUND; 92 SIPROUND; 93 return (v0 ^ v1) ^ (v2 ^ v3); 94 } 95 EXPORT_SYMBOL(siphash); 96 97 #ifndef CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS 98 /** 99 * siphash - compute 64-bit siphash PRF value, without alignment requirements 100 * @data: buffer to hash 101 * @size: size of @data 102 * @key: key buffer of size SIPHASH_KEY_LEN, must be aligned to SIPHASH_ALIGNMENT 103 */ 104 u64 siphash_unaligned(const u8 *data, size_t len, const u8 key[SIPHASH_KEY_LEN]) 105 { 106 u64 v0 = 0x736f6d6570736575ULL; 107 u64 v1 = 0x646f72616e646f6dULL; 108 u64 v2 = 0x6c7967656e657261ULL; 109 u64 v3 = 0x7465646279746573ULL; 110 u64 b = ((u64)len) << 56; 111 u64 k0 = le64_to_cpuvp(key); 112 u64 k1 = le64_to_cpuvp(key + sizeof(u64)); 113 u64 m; 114 const u8 *end = data + len - (len % sizeof(u64)); 115 const u8 left = len & (sizeof(u64) - 1); 116 v3 ^= k1; 117 v2 ^= k0; 118 v1 ^= k1; 119 v0 ^= k0; 120 for (; data != end; data += sizeof(u64)) { 121 m = get_unaligned_le64(data); 122 v3 ^= m; 123 SIPROUND; 124 SIPROUND; 125 v0 ^= m; 126 } 127 #if defined(CONFIG_DCACHE_WORD_ACCESS) && BITS_PER_LONG == 64 128 if (left) 129 b |= le64_to_cpu((__force __le64)(load_unaligned_zeropad(data) & bytemask_from_count(left))); 130 #else 131 switch (left) { 132 case 7: b |= ((u64)data[6]) << 48; 133 case 6: b |= ((u64)data[5]) << 40; 134 case 5: b |= ((u64)data[4]) << 32; 135 case 4: b |= get_unaligned_le32(data); break; 136 case 3: b |= ((u64)data[2]) << 16; 137 case 2: b |= get_unaligned_le16(data); break; 138 case 1: b |= data[0]; 139 } 140 #endif 141 v3 ^= b; 142 SIPROUND; 143 SIPROUND; 144 v0 ^= b; 145 v2 ^= 0xff; 146 SIPROUND; 147 SIPROUND; 148 SIPROUND; 149 SIPROUND; 150 return (v0 ^ v1) ^ (v2 ^ v3); 151 } > 152 EXPORT_SYMBOL(siphash24_unaligned); 153 #endif --- 0-DAY kernel test infrastructure Open Source Technology Center https://lists.01.org/pipermail/kbuild-all Intel Corporation [-- Attachment #2: .config.gz --] [-- Type: application/gzip, Size: 45649 bytes --]
next prev parent reply other threads:[~2016-12-15 4:24 UTC|newest] Thread overview: 161+ messages / expand[flat|nested] mbox.gz Atom feed top 2016-12-14 3:59 [PATCH v2 1/4] siphash: add cryptographically secure hashtable function Jason A. Donenfeld 2016-12-14 3:59 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-14 3:59 ` [PATCH v2 2/4] siphash: add convenience functions for jhash converts Jason A. Donenfeld 2016-12-14 3:59 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-14 3:59 ` [PATCH v2 3/4] secure_seq: use siphash24 instead of md5_transform Jason A. Donenfeld 2016-12-14 3:59 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-14 12:53 ` Jason A. Donenfeld 2016-12-14 12:53 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-14 13:16 ` Hannes Frederic Sowa 2016-12-14 13:16 ` [kernel-hardening] " Hannes Frederic Sowa 2016-12-14 13:44 ` Jason A. Donenfeld 2016-12-14 13:44 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-14 14:47 ` David Laight 2016-12-14 14:47 ` [kernel-hardening] " David Laight 2016-12-14 14:47 ` David Laight 2016-12-14 17:49 ` Jason A. Donenfeld 2016-12-14 17:49 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-14 17:49 ` Jason A. Donenfeld 2016-12-14 17:56 ` David Miller 2016-12-14 17:56 ` [kernel-hardening] " David Miller 2016-12-14 18:06 ` Jason A. Donenfeld 2016-12-14 18:06 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-14 19:22 ` Hannes Frederic Sowa 2016-12-14 19:22 ` [kernel-hardening] " Hannes Frederic Sowa 2016-12-14 19:38 ` Jason A. Donenfeld 2016-12-14 19:38 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-14 20:27 ` Hannes Frederic Sowa 2016-12-14 20:27 ` [kernel-hardening] " Hannes Frederic Sowa 2016-12-14 20:12 ` Tom Herbert 2016-12-14 20:12 ` [kernel-hardening] " Tom Herbert 2016-12-14 21:01 ` Jason A. Donenfeld 2016-12-14 21:01 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-14 3:59 ` [PATCH v2 4/4] random: use siphash24 instead of md5 for get_random_int/long Jason A. Donenfeld 2016-12-14 3:59 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-14 11:21 ` [PATCH v2 1/4] siphash: add cryptographically secure hashtable function Hannes Frederic Sowa 2016-12-14 11:21 ` [kernel-hardening] " Hannes Frederic Sowa 2016-12-14 13:10 ` Jason A. Donenfeld 2016-12-14 13:10 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-14 15:09 ` Hannes Frederic Sowa 2016-12-14 15:09 ` [kernel-hardening] " Hannes Frederic Sowa 2016-12-14 19:47 ` Jason A. Donenfeld 2016-12-14 19:47 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-15 7:57 ` Herbert Xu 2016-12-15 7:57 ` [kernel-hardening] " Herbert Xu 2016-12-15 8:15 ` Daniel Micay 2016-12-14 12:46 ` Jason A. Donenfeld 2016-12-14 12:46 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-14 22:03 ` Hannes Frederic Sowa 2016-12-14 22:03 ` [kernel-hardening] " Hannes Frederic Sowa 2016-12-14 23:29 ` Jason A. Donenfeld 2016-12-14 23:29 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-15 8:31 ` Hannes Frederic Sowa 2016-12-15 8:31 ` [kernel-hardening] " Hannes Frederic Sowa 2016-12-15 11:04 ` David Laight 2016-12-15 11:04 ` [kernel-hardening] " David Laight 2016-12-15 11:04 ` David Laight 2016-12-15 12:23 ` Hannes Frederic Sowa 2016-12-15 12:23 ` [kernel-hardening] " Hannes Frederic Sowa 2016-12-15 12:23 ` Hannes Frederic Sowa 2016-12-15 12:28 ` David Laight 2016-12-15 12:28 ` [kernel-hardening] " David Laight 2016-12-15 12:28 ` David Laight 2016-12-15 12:50 ` Hannes Frederic Sowa 2016-12-15 12:50 ` [kernel-hardening] " Hannes Frederic Sowa 2016-12-15 12:50 ` Hannes Frederic Sowa 2016-12-15 13:56 ` David Laight 2016-12-15 13:56 ` [kernel-hardening] " David Laight 2016-12-15 13:56 ` David Laight 2016-12-15 14:56 ` Hannes Frederic Sowa 2016-12-15 14:56 ` [kernel-hardening] " Hannes Frederic Sowa 2016-12-15 14:56 ` Hannes Frederic Sowa 2016-12-15 15:41 ` David Laight 2016-12-15 15:41 ` [kernel-hardening] " David Laight 2016-12-15 15:41 ` David Laight 2016-12-15 15:53 ` Hannes Frederic Sowa 2016-12-15 15:53 ` [kernel-hardening] " Hannes Frederic Sowa 2016-12-15 15:53 ` Hannes Frederic Sowa 2016-12-15 18:50 ` Jason A. Donenfeld 2016-12-15 18:50 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-15 18:50 ` Jason A. Donenfeld 2016-12-15 20:31 ` Hannes Frederic Sowa 2016-12-15 20:31 ` [kernel-hardening] " Hannes Frederic Sowa 2016-12-15 20:31 ` Hannes Frederic Sowa 2016-12-15 20:43 ` Jason A. Donenfeld 2016-12-15 20:43 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-15 20:43 ` Jason A. Donenfeld 2016-12-15 21:04 ` Peter Zijlstra 2016-12-15 21:04 ` [kernel-hardening] " Peter Zijlstra 2016-12-15 21:04 ` Peter Zijlstra 2016-12-15 21:09 ` Hannes Frederic Sowa 2016-12-15 21:09 ` [kernel-hardening] " Hannes Frederic Sowa 2016-12-15 21:09 ` Hannes Frederic Sowa 2016-12-15 21:17 ` Hannes Frederic Sowa 2016-12-15 21:17 ` [kernel-hardening] " Hannes Frederic Sowa 2016-12-15 21:17 ` Hannes Frederic Sowa 2016-12-15 21:09 ` Peter Zijlstra 2016-12-15 21:09 ` [kernel-hardening] " Peter Zijlstra 2016-12-15 21:09 ` Peter Zijlstra 2016-12-15 21:11 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-15 21:14 ` Linus Torvalds 2016-12-15 21:14 ` Linus Torvalds 2016-12-14 18:46 ` [PATCH v3 1/3] " Jason A. Donenfeld 2016-12-14 18:46 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-14 18:46 ` [PATCH v3 2/3] secure_seq: use siphash24 instead of md5_transform Jason A. Donenfeld 2016-12-14 18:46 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-14 21:44 ` kbuild test robot 2016-12-14 21:44 ` [kernel-hardening] " kbuild test robot 2016-12-14 18:46 ` [PATCH v3 3/3] random: use siphash24 instead of md5 for get_random_int/long Jason A. Donenfeld 2016-12-14 18:46 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-14 21:56 ` kbuild test robot 2016-12-14 21:56 ` [kernel-hardening] " kbuild test robot 2016-12-14 21:57 ` kbuild test robot 2016-12-14 21:57 ` [kernel-hardening] " kbuild test robot 2016-12-15 10:14 ` David Laight 2016-12-15 10:14 ` [kernel-hardening] " David Laight 2016-12-15 10:14 ` David Laight 2016-12-15 18:51 ` Jason A. Donenfeld 2016-12-15 18:51 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-15 18:51 ` Jason A. Donenfeld 2016-12-14 19:18 ` [PATCH v3 1/3] siphash: add cryptographically secure hashtable function Tom Herbert 2016-12-14 19:18 ` [kernel-hardening] " Tom Herbert 2016-12-14 19:35 ` Jason A. Donenfeld 2016-12-14 19:35 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-14 20:55 ` Jason A. Donenfeld 2016-12-14 20:55 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-14 21:35 ` Tom Herbert 2016-12-14 21:35 ` [kernel-hardening] " Tom Herbert 2016-12-14 22:56 ` Jason A. Donenfeld 2016-12-14 22:56 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-14 23:14 ` Tom Herbert 2016-12-14 23:14 ` [kernel-hardening] " Tom Herbert 2016-12-14 23:17 ` Jason A. Donenfeld 2016-12-14 23:17 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-18 0:06 ` Christian Kujau 2016-12-18 0:06 ` [kernel-hardening] " Christian Kujau 2016-12-14 23:30 ` Linus Torvalds 2016-12-14 23:30 ` [kernel-hardening] " Linus Torvalds 2016-12-14 23:30 ` Linus Torvalds 2016-12-14 23:34 ` Jason A. Donenfeld 2016-12-14 23:34 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-14 23:34 ` Jason A. Donenfeld 2016-12-15 0:10 ` Linus Torvalds 2016-12-15 0:10 ` [kernel-hardening] " Linus Torvalds 2016-12-15 0:10 ` Linus Torvalds 2016-12-15 10:22 ` David Laight 2016-12-15 10:22 ` [kernel-hardening] " David Laight 2016-12-15 10:22 ` David Laight 2016-12-14 21:15 ` kbuild test robot 2016-12-14 21:15 ` [kernel-hardening] " kbuild test robot 2016-12-14 21:21 ` Jason A. Donenfeld 2016-12-14 21:21 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-15 1:46 ` [PATCH v4 1/4] " Jason A. Donenfeld 2016-12-15 1:46 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-15 1:46 ` [PATCH v4 2/4] siphash: add N[qd]word helpers Jason A. Donenfeld 2016-12-15 1:46 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-15 1:46 ` [PATCH v4 3/4] secure_seq: use siphash instead of md5_transform Jason A. Donenfeld 2016-12-15 1:46 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-15 1:46 ` [PATCH v4 4/4] random: use siphash instead of MD5 for get_random_int/long Jason A. Donenfeld 2016-12-15 1:46 ` [kernel-hardening] " Jason A. Donenfeld 2016-12-15 4:23 ` kbuild test robot [this message] 2016-12-15 4:23 ` [kernel-hardening] Re: [PATCH v4 1/4] siphash: add cryptographically secure hashtable function kbuild test robot
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=201612151212.QLO9EKFd%fengguang.wu@intel.com \ --to=lkp@intel.com \ --cc=David.Laight@aculab.com \ --cc=Jason@zx2c4.com \ --cc=djb@cr.yp.to \ --cc=ebiggers3@gmail.com \ --cc=jeanphilippe.aumasson@gmail.com \ --cc=kbuild-all@01.org \ --cc=kernel-hardening@lists.openwall.com \ --cc=linux-crypto@vger.kernel.org \ --cc=linux-kernel@vger.kernel.org \ --cc=netdev@vger.kernel.org \ --cc=torvalds@linux-foundation.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.