forked from luck/tmp_suning_uos_patched
8a6371d84c
[ Upstream commit 552d03a223eda3df84526ab2c1f4d82e15eaee7a ] The APT compares the current time stamp with a pre-set value. The current code only considered the 4 LSB only. Yet, after reviews by mathematicians of the user space Jitter RNG version >= 3.1.0, it was concluded that the APT can be calculated on the 32 LSB of the time delta. Thi change is applied to the kernel. This fixes a bug where an AMD EPYC fails this test as its RDTSC value contains zeros in the LSB. The most appropriate fix would have been to apply a GCD calculation and divide the time stamp by the GCD. Yet, this is a significant code change that will be considered for a future update. Note, tests showed that constantly the GCD always was 32 on these systems, i.e. the 5 LSB were always zero (thus failing the APT since it only considered the 4 LSB for its calculation). Signed-off-by: Stephan Mueller <smueller@chronox.de> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> Signed-off-by: Sasha Levin <sashal@kernel.org> |
||
---|---|---|
.. | ||
asymmetric_keys | ||
async_tx | ||
842.c | ||
acompress.c | ||
adiantum.c | ||
aead.c | ||
aegis.h | ||
aegis128-core.c | ||
aegis128-neon-inner.c | ||
aegis128-neon.c | ||
aes_generic.c | ||
aes_ti.c | ||
af_alg.c | ||
ahash.c | ||
akcipher.c | ||
algapi.c | ||
algboss.c | ||
algif_aead.c | ||
algif_hash.c | ||
algif_rng.c | ||
algif_skcipher.c | ||
ansi_cprng.c | ||
anubis.c | ||
api.c | ||
arc4.c | ||
authenc.c | ||
authencesn.c | ||
blake2b_generic.c | ||
blake2s_generic.c | ||
blowfish_common.c | ||
blowfish_generic.c | ||
camellia_generic.c | ||
cast_common.c | ||
cast5_generic.c | ||
cast6_generic.c | ||
cbc.c | ||
ccm.c | ||
cfb.c | ||
chacha_generic.c | ||
chacha20poly1305.c | ||
cipher.c | ||
cmac.c | ||
compress.c | ||
crc32_generic.c | ||
crc32c_generic.c | ||
crct10dif_common.c | ||
crct10dif_generic.c | ||
cryptd.c | ||
crypto_engine.c | ||
crypto_null.c | ||
crypto_user_base.c | ||
crypto_user_stat.c | ||
ctr.c | ||
cts.c | ||
curve25519-generic.c | ||
deflate.c | ||
des_generic.c | ||
dh_helper.c | ||
dh.c | ||
drbg.c | ||
ecb.c | ||
ecc_curve_defs.h | ||
ecc.c | ||
ecc.h | ||
ecdh_helper.c | ||
ecdh.c | ||
echainiv.c | ||
ecrdsa_defs.h | ||
ecrdsa_params.asn1 | ||
ecrdsa_pub_key.asn1 | ||
ecrdsa.c | ||
essiv.c | ||
fcrypt.c | ||
fips.c | ||
gcm.c | ||
geniv.c | ||
gf128mul.c | ||
ghash-generic.c | ||
hash_info.c | ||
hmac.c | ||
internal.h | ||
jitterentropy-kcapi.c | ||
jitterentropy.c | ||
jitterentropy.h | ||
Kconfig | ||
keywrap.c | ||
khazad.c | ||
kpp.c | ||
lrw.c | ||
lz4.c | ||
lz4hc.c | ||
lzo-rle.c | ||
lzo.c | ||
Makefile | ||
md4.c | ||
md5.c | ||
memneq.c | ||
michael_mic.c | ||
nhpoly1305.c | ||
ofb.c | ||
pcbc.c | ||
pcrypt.c | ||
poly1305_generic.c | ||
proc.c | ||
ripemd.h | ||
rmd128.c | ||
rmd160.c | ||
rmd256.c | ||
rmd320.c | ||
rng.c | ||
rsa_helper.c | ||
rsa-pkcs1pad.c | ||
rsa.c | ||
rsaprivkey.asn1 | ||
rsapubkey.asn1 | ||
salsa20_generic.c | ||
scatterwalk.c | ||
scompress.c | ||
seed.c | ||
seqiv.c | ||
serpent_generic.c | ||
sha1_generic.c | ||
sha3_generic.c | ||
sha256_generic.c | ||
sha512_generic.c | ||
shash.c | ||
simd.c | ||
skcipher.c | ||
sm2.c | ||
sm2signature.asn1 | ||
sm3_generic.c | ||
sm4_generic.c | ||
streebog_generic.c | ||
tcrypt.c | ||
tcrypt.h | ||
tea.c | ||
testmgr.c | ||
testmgr.h | ||
tgr192.c | ||
twofish_common.c | ||
twofish_generic.c | ||
vmac.c | ||
wp512.c | ||
xcbc.c | ||
xor.c | ||
xts.c | ||
xxhash_generic.c | ||
zstd.c |