#ifndef __TRIGGER_H_ #define __TRIGGER_H_ 1 #include "util/debug.h" #include "asm/bug.h" /* * Use trigger to model operations which need to be executed when * an event (a signal, for example) is observed. * * States and transits: * * * OFF--(on)--> READY --(hit)--> HIT * ^ | * | (ready) * | | * \_____________/ * * is_hit and is_ready are two key functions to query the state of * a trigger. is_hit means the event already happen; is_ready means the * trigger is waiting for the event. */ struct trigger { volatile enum { TRIGGER_ERROR = -2, TRIGGER_OFF = -1, TRIGGER_READY = 0, TRIGGER_HIT = 1, } state; const char *name; }; #define TRIGGER_WARN_ONCE(t, exp) \ WARN_ONCE(t->state != exp, "trigger '%s' state transist error: %d in %s()\n", \ t->name, t->state, __func__) static inline bool trigger_is_available(struct trigger *t) { return t->state >= 0; } static inline bool trigger_is_error(struct trigger *t) { return t->state <= TRIGGER_ERROR; } static inline void trigger_on(struct trigger *t) { TRIGGER_WARN_ONCE(t, TRIGGER_OFF); t->state = TRIGGER_READY; } static inline void trigger_ready(struct trigger *t) { if (!trigger_is_available(t)) return; t->state = TRIGGER_READY; } static inline void trigger_hit(struct trigger *t) { if (!trigger_is_available(t)) return; TRIGGER_WARN_ONCE(t, TRIGGER_READY); t->state = TRIGGER_HIT; } static inline void trigger_off(struct trigger *t) { if (!trigger_is_available(t)) return; t->state = TRIGGER_OFF; } static inline void trigger_error(struct trigger *t) { t->state = TRIGGER_ERROR; } static inline bool trigger_is_ready(struct trigger *t) { return t->state == TRIGGER_READY; } static inline bool trigger_is_hit(struct trigger *t) { return t->state == TRIGGER_HIT; } #define DEFINE_TRIGGER(n) \ struct trigger n = {.state = TRIGGER_OFF, .name = #n} #endif 282efe9d4a354153e99d86a16af08'>treecommitdiff
path: root/kernel/Kconfig.locks
diff options
context:
space:
mode:
authorArd Biesheuvel <ard.biesheuvel@linaro.org>2017-01-17 13:46:29 +0000
committerHerbert Xu <herbert@gondor.apana.org.au>2017-01-23 22:41:33 +0800
commit11e3b725cfc282efe9d4a354153e99d86a16af08 (patch)
tree8b5b9e0e1bcae1ab98ee652ffb7b13b05c209bd6 /kernel/Kconfig.locks
parentd6040764adcb5cb6de1489422411d701c158bb69 (diff)
crypto: arm64/aes-blk - honour iv_out requirement in CBC and CTR modes
Update the ARMv8 Crypto Extensions and the plain NEON AES implementations in CBC and CTR modes to return the next IV back to the skcipher API client. This is necessary for chaining to work correctly. Note that for CTR, this is only done if the request is a round multiple of the block size, since otherwise, chaining is impossible anyway. Cc: <stable@vger.kernel.org> # v3.16+ Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'kernel/Kconfig.locks')