kernel_optimize_test/arch/s390/crypto
Jan Glauber c708c57e24 [S390] prng: prevent access beyond end of stack
While initializing the state of the prng only the first 8 bytes of
random data where used, the second 8 bytes were read from the memory
after the stack. If only 64 bytes of the kernel stack are used and
CONFIG_DEBUG_PAGEALLOC is enabled a kernel panic may occur because of
the invalid page access. Use the correct multiplicator to stay within
the random data buffer.

Signed-off-by: Jan Glauber <jang@linux.vnet.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
2011-04-20 10:15:43 +02:00
..
aes_s390.c
crypt_s390.h
crypto_des.h
des_check_key.c
des_s390.c
Makefile
prng.c
sha_common.c
sha.h
sha1_s390.c
sha256_s390.c
sha512_s390.c