Re: stable request

2021-03-19 Thread Sasha Levin
On Fri, Mar 19, 2021 at 11:50:06AM +0100, Greg KH wrote: On Fri, Mar 19, 2021 at 07:35:44AM +, Thomas Backlund wrote: Den 18-03-2021 kl. 15:03, skrev Sasha Levin: > > On Tue, Mar 16, 2021 at 01:35:40PM +0100, Ard Biesheuvel wrote: >> On Tue, 16 Mar 2021 at 13:28, Thomas Bac

Re: stable request

2021-03-18 Thread Sasha Levin
On Thu, Mar 18, 2021 at 03:15:35PM +0100, Ard Biesheuvel wrote: On Thu, 18 Mar 2021 at 14:03, Sasha Levin wrote: What about anything older than 5.10? Looks like it's needed there too? Yes, 4.19 and 5.4 should probably get this too. They should apply with minimal effort, afaict. The

Re: stable request

2021-03-18 Thread Sasha Levin
On Tue, Mar 16, 2021 at 01:35:40PM +0100, Ard Biesheuvel wrote: On Tue, 16 Mar 2021 at 13:28, Thomas Backlund wrote: Den 16.3.2021 kl. 14:15, skrev Thomas Backlund: > > Den 16.3.2021 kl. 12:17, skrev Ard Biesheuvel: >> On Tue, 16 Mar 2021 at 10:21, Thomas Backlund wrote: >>> Den 16.3.2021 kl

[PATCH AUTOSEL 4.19 12/26] crypto: tcrypt - avoid signed overflow in byte count

2021-02-24 Thread Sasha Levin
-NI when benchmarked with sec=1. So switch to u64 instead. While at it, fix up a missing printk->pr_cont conversion in the AEAD benchmark. Signed-off-by: Ard Biesheuvel Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- crypto/tcrypt.c | 20 ++-- 1 file changed,

[PATCH AUTOSEL 5.4 16/40] crypto: tcrypt - avoid signed overflow in byte count

2021-02-24 Thread Sasha Levin
-NI when benchmarked with sec=1. So switch to u64 instead. While at it, fix up a missing printk->pr_cont conversion in the AEAD benchmark. Signed-off-by: Ard Biesheuvel Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- crypto/tcrypt.c | 20 ++-- 1 file changed,

[PATCH AUTOSEL 5.10 22/56] crypto: tcrypt - avoid signed overflow in byte count

2021-02-24 Thread Sasha Levin
-NI when benchmarked with sec=1. So switch to u64 instead. While at it, fix up a missing printk->pr_cont conversion in the AEAD benchmark. Signed-off-by: Ard Biesheuvel Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- crypto/tcrypt.c | 20 ++-- 1 file changed,

[PATCH AUTOSEL 5.11 28/67] crypto: tcrypt - avoid signed overflow in byte count

2021-02-24 Thread Sasha Levin
-NI when benchmarked with sec=1. So switch to u64 instead. While at it, fix up a missing printk->pr_cont conversion in the AEAD benchmark. Signed-off-by: Ard Biesheuvel Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- crypto/tcrypt.c | 20 ++-- 1 file changed,

[PATCH AUTOSEL 5.4 05/17] chtls: Fix potential resource leak

2021-02-02 Thread Sasha Levin
/20210121145738.51091-1-bianpan2...@163.com Signed-off-by: Jakub Kicinski Signed-off-by: Sasha Levin --- drivers/crypto/chelsio/chtls/chtls_cm.c | 7 +++ 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/drivers/crypto/chelsio/chtls/chtls_cm.c b/drivers/crypto/chelsio/chtls/chtls_cm.c index

[PATCH AUTOSEL 4.19 03/10] chtls: Fix potential resource leak

2021-02-02 Thread Sasha Levin
/20210121145738.51091-1-bianpan2...@163.com Signed-off-by: Jakub Kicinski Signed-off-by: Sasha Levin --- drivers/crypto/chelsio/chtls/chtls_cm.c | 7 +++ 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/drivers/crypto/chelsio/chtls/chtls_cm.c b/drivers/crypto/chelsio/chtls/chtls_cm.c index

[PATCH AUTOSEL 5.10 18/31] um: random: Register random as hwrng-core device

2020-12-30 Thread Sasha Levin
by: Anton Ivanov Signed-off-by: Richard Weinberger Signed-off-by: Sasha Levin --- arch/um/drivers/random.c | 101 - drivers/char/hw_random/Kconfig | 16 +++--- 2 files changed, 33 insertions(+), 84 deletions(-) diff --git a/arch/um/drivers/random.c b/arch

[PATCH AUTOSEL 5.10 011/217] crypto: omap-aes - fix the reference count leak of omap device

2020-12-22 Thread Sasha Levin
: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/omap-aes.c | 1 + 1 file changed, 1 insertion(+) diff --git a/drivers/crypto/omap-aes.c b/drivers/crypto/omap-aes.c index 4fd14d90cc409..70ea5784a024e 100644 --- a/drivers/crypto/omap-aes.c +++ b/drivers/crypto/omap-aes.c @@ -105,6 +105,7

[PATCH AUTOSEL 5.4 073/130] crypto: qce - Fix SHA result buffer corruption issues

2020-12-22 Thread Sasha Levin
result buffer poisoing. Fix this issue by ensuring that only the final hash value is copied into the result buffer. Reviewed-by: Bjorn Andersson Signed-off-by: Thara Gopinath Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/qce/sha.c | 2 +- 1 file changed, 1 insertion(+), 1

[PATCH AUTOSEL 5.10 057/217] s390/trng: set quality to 1024

2020-12-22 Thread Sasha Levin
: Harald Freudenberger Signed-off-by: Christian Borntraeger Signed-off-by: Heiko Carstens Signed-off-by: Sasha Levin --- drivers/char/hw_random/s390-trng.c | 7 --- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/drivers/char/hw_random/s390-trng.c b/drivers/char/hw_random

[PATCH AUTOSEL 5.4 026/130] s390/trng: set quality to 1024

2020-12-22 Thread Sasha Levin
: Harald Freudenberger Signed-off-by: Christian Borntraeger Signed-off-by: Heiko Carstens Signed-off-by: Sasha Levin --- drivers/char/hw_random/s390-trng.c | 7 --- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/drivers/char/hw_random/s390-trng.c b/drivers/char/hw_random

[PATCH AUTOSEL 4.19 52/87] crypto: qce - Fix SHA result buffer corruption issues

2020-12-22 Thread Sasha Levin
result buffer poisoing. Fix this issue by ensuring that only the final hash value is copied into the result buffer. Reviewed-by: Bjorn Andersson Signed-off-by: Thara Gopinath Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/qce/sha.c | 2 +- 1 file changed, 1 insertion(+), 1

[PATCH AUTOSEL 4.14 03/66] crypto: omap-aes - fix the reference count leak of omap device

2020-12-22 Thread Sasha Levin
: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/omap-aes.c | 1 + 1 file changed, 1 insertion(+) diff --git a/drivers/crypto/omap-aes.c b/drivers/crypto/omap-aes.c index c376a3ee7c2c3..57d4269d17f65 100644 --- a/drivers/crypto/omap-aes.c +++ b/drivers/crypto/omap-aes.c @@ -106,6 +106,7

[PATCH AUTOSEL 4.14 15/66] s390/trng: set quality to 1024

2020-12-22 Thread Sasha Levin
: Harald Freudenberger Signed-off-by: Christian Borntraeger Signed-off-by: Heiko Carstens Signed-off-by: Sasha Levin --- drivers/char/hw_random/s390-trng.c | 7 --- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/drivers/char/hw_random/s390-trng.c b/drivers/char/hw_random

[PATCH AUTOSEL 4.14 43/66] crypto: qce - Fix SHA result buffer corruption issues

2020-12-22 Thread Sasha Levin
result buffer poisoing. Fix this issue by ensuring that only the final hash value is copied into the result buffer. Reviewed-by: Bjorn Andersson Signed-off-by: Thara Gopinath Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/qce/sha.c | 2 +- 1 file changed, 1 insertion(+), 1

[PATCH AUTOSEL 4.9 03/48] crypto: omap-aes - fix the reference count leak of omap device

2020-12-22 Thread Sasha Levin
: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/omap-aes.c | 1 + 1 file changed, 1 insertion(+) diff --git a/drivers/crypto/omap-aes.c b/drivers/crypto/omap-aes.c index fe32dd95ae4ff..717cde167873a 100644 --- a/drivers/crypto/omap-aes.c +++ b/drivers/crypto/omap-aes.c @@ -251,6 +251,7

[PATCH AUTOSEL 4.9 32/48] crypto: qce - Fix SHA result buffer corruption issues

2020-12-22 Thread Sasha Levin
result buffer poisoing. Fix this issue by ensuring that only the final hash value is copied into the result buffer. Reviewed-by: Bjorn Andersson Signed-off-by: Thara Gopinath Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/qce/sha.c | 2 +- 1 file changed, 1 insertion(+), 1

[PATCH AUTOSEL 4.4 27/38] crypto: qce - Fix SHA result buffer corruption issues

2020-12-22 Thread Sasha Levin
result buffer poisoing. Fix this issue by ensuring that only the final hash value is copied into the result buffer. Reviewed-by: Bjorn Andersson Signed-off-by: Thara Gopinath Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/qce/sha.c | 2 +- 1 file changed, 1 insertion(+), 1

[PATCH AUTOSEL 4.19 18/87] s390/trng: set quality to 1024

2020-12-22 Thread Sasha Levin
: Harald Freudenberger Signed-off-by: Christian Borntraeger Signed-off-by: Heiko Carstens Signed-off-by: Sasha Levin --- drivers/char/hw_random/s390-trng.c | 7 --- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/drivers/char/hw_random/s390-trng.c b/drivers/char/hw_random

[PATCH AUTOSEL 4.19 03/87] crypto: omap-aes - fix the reference count leak of omap device

2020-12-22 Thread Sasha Levin
: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/omap-aes.c | 1 + 1 file changed, 1 insertion(+) diff --git a/drivers/crypto/omap-aes.c b/drivers/crypto/omap-aes.c index 9019f6b67986b..080c7cf077053 100644 --- a/drivers/crypto/omap-aes.c +++ b/drivers/crypto/omap-aes.c @@ -109,6 +109,7

[PATCH AUTOSEL 5.4 005/130] crypto: omap-aes - fix the reference count leak of omap device

2020-12-22 Thread Sasha Levin
: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/omap-aes.c | 1 + 1 file changed, 1 insertion(+) diff --git a/drivers/crypto/omap-aes.c b/drivers/crypto/omap-aes.c index 2f53fbb741001..2f81f347b8fe0 100644 --- a/drivers/crypto/omap-aes.c +++ b/drivers/crypto/omap-aes.c @@ -105,6 +105,7

[PATCH AUTOSEL 5.9 004/111] crypto: ccp - fix error handling

2020-10-18 Thread Sasha Levin
From: Pavel Machek [ Upstream commit e356c49c6cf0db3f00e1558749170bd56e47652d ] Fix resource leak in error handling. Signed-off-by: Pavel Machek (CIP) Acked-by: John Allen Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/ccp/ccp-ops.c | 2 +- 1 file changed, 1

[PATCH AUTOSEL 5.9 020/111] crypto: hisilicon - fixed memory allocation error

2020-10-18 Thread Sasha Levin
From: Longfang Liu [ Upstream commit 24efcec2919afa7d56f848c83a605b46c8042a53 ] 1. Fix the bug of 'mac' memory leak as allocating 'pbuf' failing. 2. Fix the bug of 'qps' leak as allocating 'qp_ctx' failing. Signed-off-by: Longfang Liu Signed-off-by

[PATCH AUTOSEL 5.8 020/101] crypto: hisilicon - fixed memory allocation error

2020-10-18 Thread Sasha Levin
From: Longfang Liu [ Upstream commit 24efcec2919afa7d56f848c83a605b46c8042a53 ] 1. Fix the bug of 'mac' memory leak as allocating 'pbuf' failing. 2. Fix the bug of 'qps' leak as allocating 'qp_ctx' failing. Signed-off-by: Longfang Liu Signed-off-by

[PATCH AUTOSEL 4.19 02/56] crypto: ccp - fix error handling

2020-10-18 Thread Sasha Levin
From: Pavel Machek [ Upstream commit e356c49c6cf0db3f00e1558749170bd56e47652d ] Fix resource leak in error handling. Signed-off-by: Pavel Machek (CIP) Acked-by: John Allen Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/ccp/ccp-ops.c | 2 +- 1 file changed, 1

[PATCH AUTOSEL 4.9 01/41] crypto: ccp - fix error handling

2020-10-18 Thread Sasha Levin
From: Pavel Machek [ Upstream commit e356c49c6cf0db3f00e1558749170bd56e47652d ] Fix resource leak in error handling. Signed-off-by: Pavel Machek (CIP) Acked-by: John Allen Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/ccp/ccp-ops.c | 2 +- 1 file changed, 1

[PATCH AUTOSEL 4.14 01/52] crypto: ccp - fix error handling

2020-10-18 Thread Sasha Levin
From: Pavel Machek [ Upstream commit e356c49c6cf0db3f00e1558749170bd56e47652d ] Fix resource leak in error handling. Signed-off-by: Pavel Machek (CIP) Acked-by: John Allen Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/ccp/ccp-ops.c | 2 +- 1 file changed, 1

[PATCH AUTOSEL 5.4 03/80] crypto: ccp - fix error handling

2020-10-18 Thread Sasha Levin
From: Pavel Machek [ Upstream commit e356c49c6cf0db3f00e1558749170bd56e47652d ] Fix resource leak in error handling. Signed-off-by: Pavel Machek (CIP) Acked-by: John Allen Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/ccp/ccp-ops.c | 2 +- 1 file changed, 1

[PATCH AUTOSEL 5.8 004/101] crypto: ccp - fix error handling

2020-10-18 Thread Sasha Levin
From: Pavel Machek [ Upstream commit e356c49c6cf0db3f00e1558749170bd56e47652d ] Fix resource leak in error handling. Signed-off-by: Pavel Machek (CIP) Acked-by: John Allen Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/ccp/ccp-ops.c | 2 +- 1 file changed, 1

Re: [PATCH 2/7] crypto: sun4i-ss: checking sg length is not sufficient

2020-09-21 Thread Sasha Levin
Hi [This is an automated email] This commit has been processed because it contains a "Fixes:" tag fixing commit: 6298e948215f ("crypto: sunxi-ss - Add Allwinner Security System crypto accelerator"). The bot has tested the following trees: v5.8.10, v5.4.66, v4.19.146, v4.14.198, v4.9.236, v4.4.

[PATCH AUTOSEL 5.4 031/330] net: silence data-races on sk_backlog.tail

2020-09-17 Thread Sasha Levin
011 Signed-off-by: Eric Dumazet Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/crypto/chelsio/chtls/chtls_io.c | 10 +- include/net/sock.h | 4 ++-- net/ipv4/tcp.c | 2 +- net/llc/af_llc.c|

[PATCH AUTOSEL 5.4 128/330] crypto: chelsio - This fixes the kernel panic which occurs during a libkcapi test

2020-09-17 Thread Sasha Levin
Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/chelsio/chcr_algo.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/drivers/crypto/chelsio/chcr_algo.c b/drivers/crypto/chelsio/chcr_algo.c index fe2eadc0ce83d..2d30ed5a2674b 100644 --- a/drivers/cryp

[PATCH AUTOSEL 4.19 017/206] net: silence data-races on sk_backlog.tail

2020-09-17 Thread Sasha Levin
011 Signed-off-by: Eric Dumazet Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/crypto/chelsio/chtls/chtls_io.c | 10 +- include/net/sock.h | 4 ++-- net/ipv4/tcp.c | 2 +- net/llc/af_llc.c|

[PATCH AUTOSEL 4.19 078/206] crypto: chelsio - This fixes the kernel panic which occurs during a libkcapi test

2020-09-17 Thread Sasha Levin
Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/chelsio/chcr_algo.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/drivers/crypto/chelsio/chcr_algo.c b/drivers/crypto/chelsio/chcr_algo.c index 9b3c259f081d3..ee5087504 100644 --- a/drivers/cryp

Re: [PATCH 5/9] crypto: caam/qi - add support for more XTS key lengths

2020-08-26 Thread Sasha Levin
Hi [This is an automated email] This commit has been processed because it contains a "Fixes:" tag fixing commit: b189817cf789 ("crypto: caam/qi - add ablkcipher and authenc algorithms"). The bot has tested the following trees: v5.8.2, v5.7.16, v5.4.59, v4.19.140, v4.14.193. v5.8.2: Failed to

Re: [PATCH 6/9] crypto: caam/qi2 - add support for more XTS key lengths

2020-08-19 Thread Sasha Levin
Hi [This is an automated email] This commit has been processed because it contains a "Fixes:" tag fixing commit: 226853ac3ebe ("crypto: caam/qi2 - add skcipher algorithms"). The bot has tested the following trees: v5.8.1, v5.7.15, v5.4.58. v5.8.1: Failed to apply! Possible dependencies: 528

Re: [PATCH RESEND 6/9] crypto: caam/qi2 - add support for more XTS key lengths

2020-08-19 Thread Sasha Levin
Hi [This is an automated email] This commit has been processed because it contains a "Fixes:" tag fixing commit: 226853ac3ebe ("crypto: caam/qi2 - add skcipher algorithms"). The bot has tested the following trees: v5.8.1, v5.7.15, v5.4.58. v5.8.1: Failed to apply! Possible dependencies: 528

Re: [PATCH RESEND 5/9] crypto: caam/qi - add support for more XTS key lengths

2020-08-19 Thread Sasha Levin
Hi [This is an automated email] This commit has been processed because it contains a "Fixes:" tag fixing commit: b189817cf789 ("crypto: caam/qi - add ablkcipher and authenc algorithms"). The bot has tested the following trees: v5.8.1, v5.7.15, v5.4.58, v4.19.139, v4.14.193. v5.8.1: Failed to

Re: [PATCH 4/9] crypto: caam/jr - add support for more XTS key lengths

2020-08-19 Thread Sasha Levin
Hi [This is an automated email] This commit has been processed because it contains a "Fixes:" tag fixing commit: c6415a6016bf ("crypto: caam - add support for acipher xts(aes)"). The bot has tested the following trees: v5.8.1, v5.7.15, v5.4.58, v4.19.139, v4.14.193, v4.9.232, v4.4.232. v5.8.1:

Re: [PATCH RESEND 3/9] crypto: caam/qi2 - add fallback for XTS with more than 8B IV

2020-08-19 Thread Sasha Levin
Hi [This is an automated email] This commit has been processed because it contains a "Fixes:" tag fixing commit: 226853ac3ebe ("crypto: caam/qi2 - add skcipher algorithms"). The bot has tested the following trees: v5.8.1, v5.7.15, v5.4.58. v5.8.1: Failed to apply! Possible dependencies: 528

Re: [PATCH RESEND 4/9] crypto: caam/jr - add support for more XTS key lengths

2020-08-19 Thread Sasha Levin
Hi [This is an automated email] This commit has been processed because it contains a "Fixes:" tag fixing commit: c6415a6016bf ("crypto: caam - add support for acipher xts(aes)"). The bot has tested the following trees: v5.8.1, v5.7.15, v5.4.58, v4.19.139, v4.14.193, v4.9.232, v4.4.232. v5.8.1:

Re: [PATCH 5/9] crypto: caam/qi - add support for more XTS key lengths

2020-08-19 Thread Sasha Levin
Hi [This is an automated email] This commit has been processed because it contains a "Fixes:" tag fixing commit: b189817cf789 ("crypto: caam/qi - add ablkcipher and authenc algorithms"). The bot has tested the following trees: v5.8.1, v5.7.15, v5.4.58, v4.19.139, v4.14.193. v5.8.1: Failed to

Re: [PATCH 2/9] crypto: caam/qi - add fallback for XTS with more than 8B IV

2020-08-19 Thread Sasha Levin
Hi [This is an automated email] This commit has been processed because it contains a "Fixes:" tag fixing commit: b189817cf789 ("crypto: caam/qi - add ablkcipher and authenc algorithms"). The bot has tested the following trees: v5.8.1, v5.7.15, v5.4.58, v4.19.139, v4.14.193. v5.8.1: Failed to

Re: [PATCH RESEND 1/9] crypto: caam/jr - add fallback for XTS with more than 8B IV

2020-08-19 Thread Sasha Levin
Hi [This is an automated email] This commit has been processed because it contains a "Fixes:" tag fixing commit: c6415a6016bf ("crypto: caam - add support for acipher xts(aes)"). The bot has tested the following trees: v5.8.1, v5.7.15, v5.4.58, v4.19.139, v4.14.193, v4.9.232, v4.4.232. v5.8.1:

Re: [PATCH 3/9] crypto: caam/qi2 - add fallback for XTS with more than 8B IV

2020-08-19 Thread Sasha Levin
Hi [This is an automated email] This commit has been processed because it contains a "Fixes:" tag fixing commit: 226853ac3ebe ("crypto: caam/qi2 - add skcipher algorithms"). The bot has tested the following trees: v5.8.1, v5.7.15, v5.4.58. v5.8.1: Failed to apply! Possible dependencies: 528

Re: [PATCH RESEND 2/9] crypto: caam/qi - add fallback for XTS with more than 8B IV

2020-08-19 Thread Sasha Levin
Hi [This is an automated email] This commit has been processed because it contains a "Fixes:" tag fixing commit: b189817cf789 ("crypto: caam/qi - add ablkcipher and authenc algorithms"). The bot has tested the following trees: v5.8.1, v5.7.15, v5.4.58, v4.19.139, v4.14.193. v5.8.1: Failed to

[PATCH AUTOSEL 5.8 11/64] crypto: aesni - Fix build with LLVM_IAS=1

2020-08-10 Thread Sasha Levin
inux" Link: https://github.com/ClangBuiltLinux/linux/issues/1050 Link: https://bugs.llvm.org/show_bug.cgi?id=24494 Signed-off-by: Sedat Dilek Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- arch/x86/crypto/aesni-intel_asm.S | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(

[PATCH AUTOSEL 5.8 63/64] crypto: caam - silence .setkey in case of bad key length

2020-08-10 Thread Sasha Levin
s up a bit. Signed-off-by: Horia Geantă Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/caam/caamalg.c | 2 +- drivers/crypto/caam/caamalg_qi.c | 2 +- drivers/crypto/caam/caamalg_qi2.c | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/drivers/c

[PATCH AUTOSEL 5.7 59/60] crypto: caam - silence .setkey in case of bad key length

2020-08-10 Thread Sasha Levin
s up a bit. Signed-off-by: Horia Geantă Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/caam/caamalg.c | 2 +- drivers/crypto/caam/caamalg_qi.c | 2 +- drivers/crypto/caam/caamalg_qi2.c | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/drivers/c

[PATCH AUTOSEL 5.4 08/45] crypto: aesni - Fix build with LLVM_IAS=1

2020-08-10 Thread Sasha Levin
inux" Link: https://github.com/ClangBuiltLinux/linux/issues/1050 Link: https://bugs.llvm.org/show_bug.cgi?id=24494 Signed-off-by: Sedat Dilek Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- arch/x86/crypto/aesni-intel_asm.S | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(

[PATCH AUTOSEL 4.19 08/31] crypto: aesni - Fix build with LLVM_IAS=1

2020-08-10 Thread Sasha Levin
inux" Link: https://github.com/ClangBuiltLinux/linux/issues/1050 Link: https://bugs.llvm.org/show_bug.cgi?id=24494 Signed-off-by: Sedat Dilek Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- arch/x86/crypto/aesni-intel_asm.S | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(

[PATCH AUTOSEL 5.7 11/60] crypto: aesni - Fix build with LLVM_IAS=1

2020-08-10 Thread Sasha Levin
inux" Link: https://github.com/ClangBuiltLinux/linux/issues/1050 Link: https://bugs.llvm.org/show_bug.cgi?id=24494 Signed-off-by: Sedat Dilek Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- arch/x86/crypto/aesni-intel_asm.S | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(

[PATCH AUTOSEL 5.8 26/72] crypto: qat - allow xts requests not multiple of block

2020-08-08 Thread Sasha Levin
igned-off-by: Giovanni Cabiddu Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/qat/qat_common/qat_algs.c | 22 -- 1 file changed, 20 insertions(+), 2 deletions(-) diff --git a/drivers/crypto/qat/qat_common/qat_algs.c b/drivers/crypto/qat/qat_common/

[PATCH AUTOSEL 5.8 19/72] crypto: ccree - fix resource leak on error path

2020-08-08 Thread Sasha Levin
Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/ccree/cc_cipher.c | 30 ++ 1 file changed, 18 insertions(+), 12 deletions(-) diff --git a/drivers/crypto/ccree/cc_cipher.c b/drivers/crypto/ccree/cc_cipher.c index 872ea3ff1c6ba..f144fe04748b0 100644 --- a/driv

[PATCH AUTOSEL 5.8 44/72] crypto: x86/crc32c - fix building with clang ias

2020-08-08 Thread Sasha Levin
ts instead, and this is what objdump prints when disassembling the file. Fixes: 6a8ce1ef3940 ("crypto: crc32c - Optimize CRC32C calculation with PCLMULQDQ instruction") Signed-off-by: Arnd Bergmann Reviewed-by: Nathan Chancellor Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin

[PATCH AUTOSEL 5.7 23/58] crypto: qat - allow xts requests not multiple of block

2020-08-08 Thread Sasha Levin
igned-off-by: Giovanni Cabiddu Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/qat/qat_common/qat_algs.c | 22 -- 1 file changed, 20 insertions(+), 2 deletions(-) diff --git a/drivers/crypto/qat/qat_common/qat_algs.c b/drivers/crypto/qat/qat_common/

[PATCH AUTOSEL 4.19 09/21] crypto: ccree - fix resource leak on error path

2020-08-08 Thread Sasha Levin
Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/ccree/cc_cipher.c | 30 ++ 1 file changed, 18 insertions(+), 12 deletions(-) diff --git a/drivers/crypto/ccree/cc_cipher.c b/drivers/crypto/ccree/cc_cipher.c index 28a5b8b38fa2f..1bcb6f0157b07 100644 --- a/driv

[PATCH AUTOSEL 5.4 11/40] crypto: ccree - fix resource leak on error path

2020-08-08 Thread Sasha Levin
Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/ccree/cc_cipher.c | 30 ++ 1 file changed, 18 insertions(+), 12 deletions(-) diff --git a/drivers/crypto/ccree/cc_cipher.c b/drivers/crypto/ccree/cc_cipher.c index cd9c60268bf8d..9bf0cce578f02 100644 --- a/driv

[PATCH AUTOSEL 5.7 16/58] crypto: ccree - fix resource leak on error path

2020-08-08 Thread Sasha Levin
Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/ccree/cc_cipher.c | 30 ++ 1 file changed, 18 insertions(+), 12 deletions(-) diff --git a/drivers/crypto/ccree/cc_cipher.c b/drivers/crypto/ccree/cc_cipher.c index a84335328f371..89f7661f0dce8 100644 --- a/driv

Re: [PATCH] crypto: ccp - Fix use of merged scatterlists

2020-06-25 Thread Sasha Levin
Hi [This is an automated email] This commit has been processed because it contains a "Fixes:" tag fixing commit: 63b945091a07 ("crypto: ccp - CCP device driver and interface support"). The bot has tested the following trees: v5.7.5, v5.4.48, v4.19.129, v4.14.185, v4.9.228, v4.4.228. v5.7.5: B

[PATCH AUTOSEL 5.7 06/28] hwrng: ks-sa - Fix runtime PM imbalance on error

2020-06-23 Thread Sasha Levin
Liu Reviewed-by: Alexander Sverdlin Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/char/hw_random/ks-sa-rng.c | 1 + 1 file changed, 1 insertion(+) diff --git a/drivers/char/hw_random/ks-sa-rng.c b/drivers/char/hw_random/ks-sa-rng.c index e2330e757f1ff..001617033d6a2 100644

[PATCH AUTOSEL 5.4 05/24] hwrng: ks-sa - Fix runtime PM imbalance on error

2020-06-23 Thread Sasha Levin
Liu Reviewed-by: Alexander Sverdlin Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/char/hw_random/ks-sa-rng.c | 1 + 1 file changed, 1 insertion(+) diff --git a/drivers/char/hw_random/ks-sa-rng.c b/drivers/char/hw_random/ks-sa-rng.c index a67430010aa68..5c7d3dfcfdd04 100644

[PATCH AUTOSEL 4.19 05/15] hwrng: ks-sa - Fix runtime PM imbalance on error

2020-06-23 Thread Sasha Levin
Liu Reviewed-by: Alexander Sverdlin Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/char/hw_random/ks-sa-rng.c | 1 + 1 file changed, 1 insertion(+) diff --git a/drivers/char/hw_random/ks-sa-rng.c b/drivers/char/hw_random/ks-sa-rng.c index 62c6696c1dbd8..b6d7db362b217 100644

[PATCH AUTOSEL 5.7 091/388] crypto: omap-sham - huge buffer access fixes

2020-06-17 Thread Sasha Levin
when closing a hash with certain data amounts. Signed-off-by: Tero Kristo Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/omap-sham.c | 11 +-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/drivers/crypto/omap-sham.c b/drivers/crypto/omap-sham.c

[PATCH AUTOSEL 5.7 332/388] crypto: omap-sham - add proper load balancing support for multicore

2020-06-17 Thread Sasha Levin
gets confused if there are two cores available. Add proper load balancing support for SHA, and also fix any bugs related to the multicore support while doing it. Signed-off-by: Tero Kristo Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/omap-sham.c | 64

[PATCH AUTOSEL 5.4 227/266] crypto: omap-sham - add proper load balancing support for multicore

2020-06-17 Thread Sasha Levin
gets confused if there are two cores available. Add proper load balancing support for SHA, and also fix any bugs related to the multicore support while doing it. Signed-off-by: Tero Kristo Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/omap-sham.c | 64

[PATCH AUTOSEL 4.19 143/172] crypto: omap-sham - add proper load balancing support for multicore

2020-06-17 Thread Sasha Levin
gets confused if there are two cores available. Add proper load balancing support for SHA, and also fix any bugs related to the multicore support while doing it. Signed-off-by: Tero Kristo Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/omap-sham.c | 64

[PATCH AUTOSEL 4.14 095/108] crypto: omap-sham - add proper load balancing support for multicore

2020-06-17 Thread Sasha Levin
gets confused if there are two cores available. Add proper load balancing support for SHA, and also fix any bugs related to the multicore support while doing it. Signed-off-by: Tero Kristo Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/omap-sham.c | 64

[PATCH AUTOSEL 4.9 74/80] crypto: omap-sham - add proper load balancing support for multicore

2020-06-17 Thread Sasha Levin
gets confused if there are two cores available. Add proper load balancing support for SHA, and also fix any bugs related to the multicore support while doing it. Signed-off-by: Tero Kristo Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/omap-sham.c | 64

[PATCH AUTOSEL 5.7 009/274] crypto: ccp -- don't "select" CONFIG_DMADEVICES

2020-06-08 Thread Sasha Levin
what we do for all other implementations of slave DMA controllers as well. Fixes: b3c2fee5d66b ("crypto: ccp - Ensure all dependencies are specified") Signed-off-by: Arnd Bergmann Acked-by: Tom Lendacky Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/ccp/Kco

[PATCH AUTOSEL 5.7 085/274] Crypto/chcr: Fixes a coccinile check error

2020-06-08 Thread Sasha Levin
67be3a5d227 ("crypto: chelsio - Use multiple txq/rxq per tfm to process the requests"). Fixes: 567be3a5d227 ("crypto: chelsio - Use multiple txq/rxq per tfm to process the requests"). V1->V2 -Modified subject. Signed-off-by: Ayush Sawal Signed-off-by: David S. Miller Sign

[PATCH AUTOSEL 5.7 166/274] Crypto/chcr: fix ctr, cbc, xts and rfc3686-ctr failed tests

2020-06-08 Thread Sasha Levin
re was wrong result observed. This occurs when chcr_cipher_fallback() is called from chcr_handle_cipher_resp(). Here also copying initial_iv in init_iv pointer for handling the fallback case correctly. Signed-off-by: Ayush Sawal Signed-off-by: Devulapally Shiva Krishna Signed-off-by: David S.

[PATCH AUTOSEL 5.7 167/274] Crypto/chcr: fix for ccm(aes) failed test

2020-06-08 Thread Sasha Levin
ing it unsigned int. Signed-off-by: Ayush Sawal Signed-off-by: Devulapally Shiva Krishna Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/crypto/chelsio/chcr_algo.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/crypto/chelsio/chcr_algo.c b/d

[PATCH AUTOSEL 5.7 205/274] crypto: blake2b - Fix clang optimization for ARMv7-M

2020-06-08 Thread Sasha Levin
Reviewed-by: Nathan Chancellor Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- crypto/blake2b_generic.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/crypto/blake2b_generic.c b/crypto/blake2b_generic.c index 1d262374fa4e..0ffd8d92e308 100644 --- a/crypto/blake2b_ge

[PATCH AUTOSEL 5.7 222/274] crypto: stm32/crc32 - fix multi-instance

2020-06-08 Thread Sasha Levin
. Fixes: b51dbe90912a ("crypto: stm32 - Support for STM32 CRC32 crypto module") Signed-off-by: Nicolas Toromanoff Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/stm32/stm32-crc32.c | 48 ++ 1 file changed, 36 insertions(+), 12 deletion

[PATCH AUTOSEL 5.7 221/274] crypto: stm32/crc32 - fix run-time self test issue.

2020-06-08 Thread Sasha Levin
init value of 0X, cra_name="crc32" expects an init value of 0. Fixes: b51dbe90912a ("crypto: stm32 - Support for STM32 CRC32 crypto module") Signed-off-by: Nicolas Toromanoff Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/stm32/stm32-crc32.c |

[PATCH AUTOSEL 5.6 017/606] gcc-10: avoid shadowing standard library 'free()' in crypto

2020-06-08 Thread Sasha Levin
From: Linus Torvalds commit 1a263ae60b04de959d9ce9caea4889385eefcc7b upstream. gcc-10 has started warning about conflicting types for a few new built-in functions, particularly 'free()'. This results in warnings like: crypto/xts.c:325:13: warning: conflicting types for built-in function ‘f

[PATCH AUTOSEL 5.4 009/175] crypto: ccp -- don't "select" CONFIG_DMADEVICES

2020-06-08 Thread Sasha Levin
what we do for all other implementations of slave DMA controllers as well. Fixes: b3c2fee5d66b ("crypto: ccp - Ensure all dependencies are specified") Signed-off-by: Arnd Bergmann Acked-by: Tom Lendacky Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/ccp/Kco

[PATCH AUTOSEL 5.4 101/175] Crypto/chcr: fix for ccm(aes) failed test

2020-06-08 Thread Sasha Levin
ing it unsigned int. Signed-off-by: Ayush Sawal Signed-off-by: Devulapally Shiva Krishna Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/crypto/chelsio/chcr_algo.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/crypto/chelsio/chcr_algo.c b/d

[PATCH AUTOSEL 5.4 135/175] crypto: stm32/crc32 - fix ext4 chksum BUG_ON()

2020-06-08 Thread Sasha Levin
odule") Signed-off-by: Nicolas Toromanoff Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/stm32/stm32-crc32.c | 98 +++--- 1 file changed, 48 insertions(+), 50 deletions(-) diff --git a/drivers/crypto/stm32/stm32-crc32.c b/drivers/crypto/s

[PATCH AUTOSEL 5.4 136/175] crypto: stm32/crc32 - fix run-time self test issue.

2020-06-08 Thread Sasha Levin
init value of 0X, cra_name="crc32" expects an init value of 0. Fixes: b51dbe90912a ("crypto: stm32 - Support for STM32 CRC32 crypto module") Signed-off-by: Nicolas Toromanoff Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/stm32/stm32-crc32.c |

[PATCH AUTOSEL 5.4 137/175] crypto: stm32/crc32 - fix multi-instance

2020-06-08 Thread Sasha Levin
. Fixes: b51dbe90912a ("crypto: stm32 - Support for STM32 CRC32 crypto module") Signed-off-by: Nicolas Toromanoff Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/stm32/stm32-crc32.c | 48 ++ 1 file changed, 36 insertions(+), 12 deletion

[PATCH AUTOSEL 4.19 004/106] crypto: ccp -- don't "select" CONFIG_DMADEVICES

2020-06-08 Thread Sasha Levin
what we do for all other implementations of slave DMA controllers as well. Fixes: b3c2fee5d66b ("crypto: ccp - Ensure all dependencies are specified") Signed-off-by: Arnd Bergmann Acked-by: Tom Lendacky Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/ccp/Kco

[PATCH AUTOSEL 4.19 057/106] Crypto/chcr: fix for ccm(aes) failed test

2020-06-08 Thread Sasha Levin
ing it unsigned int. Signed-off-by: Ayush Sawal Signed-off-by: Devulapally Shiva Krishna Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/crypto/chelsio/chcr_algo.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/crypto/chelsio/chcr_algo.c b/d

[PATCH AUTOSEL 4.19 081/106] crypto: stm32/crc32 - fix ext4 chksum BUG_ON()

2020-06-08 Thread Sasha Levin
odule") Signed-off-by: Nicolas Toromanoff Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/stm32/stm32_crc32.c | 98 +++--- 1 file changed, 48 insertions(+), 50 deletions(-) diff --git a/drivers/crypto/stm32/stm32_crc32.c b/drivers/cr

[PATCH AUTOSEL 4.14 04/72] crypto: ccp -- don't "select" CONFIG_DMADEVICES

2020-06-08 Thread Sasha Levin
what we do for all other implementations of slave DMA controllers as well. Fixes: b3c2fee5d66b ("crypto: ccp - Ensure all dependencies are specified") Signed-off-by: Arnd Bergmann Acked-by: Tom Lendacky Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/ccp/Kco

[PATCH AUTOSEL 4.14 44/72] Crypto/chcr: fix for ccm(aes) failed test

2020-06-08 Thread Sasha Levin
ing it unsigned int. Signed-off-by: Ayush Sawal Signed-off-by: Devulapally Shiva Krishna Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/crypto/chelsio/chcr_algo.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/crypto/chelsio/chcr_algo.c b/d

[PATCH AUTOSEL 4.19 082/106] crypto: stm32/crc32 - fix run-time self test issue.

2020-06-08 Thread Sasha Levin
init value of 0X, cra_name="crc32" expects an init value of 0. Fixes: b51dbe90912a ("crypto: stm32 - Support for STM32 CRC32 crypto module") Signed-off-by: Nicolas Toromanoff Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/stm32/stm32_crc32.c |

[PATCH AUTOSEL 4.19 083/106] crypto: stm32/crc32 - fix multi-instance

2020-06-08 Thread Sasha Levin
. Fixes: b51dbe90912a ("crypto: stm32 - Support for STM32 CRC32 crypto module") Signed-off-by: Nicolas Toromanoff Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/stm32/stm32_crc32.c | 48 ++ 1 file changed, 36 insertions(+), 12 deletion

[PATCH AUTOSEL 5.7 220/274] crypto: stm32/crc32 - fix ext4 chksum BUG_ON()

2020-06-08 Thread Sasha Levin
odule") Signed-off-by: Nicolas Toromanoff Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/stm32/stm32-crc32.c | 98 +++--- 1 file changed, 48 insertions(+), 50 deletions(-) diff --git a/drivers/crypto/stm32/stm32-crc32.c b/drivers/crypto/s

Re: [PATCH v3 2/3] crypto: virtio: Fix use-after-free in virtio_crypto_skcipher_finalize_req()

2020-06-05 Thread Sasha Levin
<20200123101000.GB24255@Red> References: <20200602070501.2023-3-longpe...@huawei.com> <20200123101000.GB24255@Red> Hi [This is an automated email] This commit has been processed because it contains a "Fixes:" tag fixing commit: dbaf0624ffa5 ("crypto: add virtio-crypto driver"). The bot has test

Re: [PATCH v3 3/3] crypto: virtio: Fix dest length calculation in __virtio_crypto_skcipher_do_req()

2020-06-05 Thread Sasha Levin
Hi [This is an automated email] This commit has been processed because it contains a "Fixes:" tag fixing commit: dbaf0624ffa5 ("crypto: add virtio-crypto driver"). The bot has tested the following trees: v5.6.15, v5.4.43, v4.19.125, v4.14.182. v5.6.15: Build OK! v5.4.43: Build failed! Errors:

Re: [PATCH v3 1/3] crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req()

2020-06-05 Thread Sasha Levin
<20200123101000.GB24255@Red> References: <20200602070501.2023-2-longpe...@huawei.com> <20200123101000.GB24255@Red> Hi [This is an automated email] This commit has been processed because it contains a "Fixes:" tag fixing commit: dbaf0624ffa5 ("crypto: add virtio-crypto driver"). The bot has test

Re: [PATCH v2 1/2] crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req()

2020-05-26 Thread Sasha Levin
<20200123101000.GB24255@Red> References: <20200526031956.1897-2-longpe...@huawei.com> <20200123101000.GB24255@Red> Hi [This is an automated email] This commit has been processed because it contains a "Fixes:" tag fixing commit: dbaf0624ffa5 ("crypto: add virtio-crypto driver"). The bot has test

Re: [PATCH v2 2/2] crypto: virtio: Fix use-after-free in virtio_crypto_skcipher_finalize_req()

2020-05-26 Thread Sasha Levin
<20200123101000.GB24255@Red> References: <20200526031956.1897-3-longpe...@huawei.com> <20200123101000.GB24255@Red> Hi [This is an automated email] This commit has been processed because it contains a "Fixes:" tag fixing commit: dbaf0624ffa5 ("crypto: add virtio-crypto driver"). The bot has test

Re: [stable-4.19 1/3] padata: Replace delayed timer with immediate workqueue in padata_reorder

2020-05-21 Thread Sasha Levin
On Thu, May 21, 2020 at 04:40:49PM -0400, Daniel Jordan wrote: From: Herbert Xu [ Upstream commit 6fc4dbcf0276279d488c5fbbfabe94734134f4fa ] I've queued this and the 4.14, 4.9, and 4.4 series. Thanks you! -- Thanks, Sasha

Re: [PATCH AUTOSEL 4.14 39/39] crypto: xts - simplify error handling in ->create()

2020-05-14 Thread Sasha Levin
On Thu, May 14, 2020 at 12:08:43PM -0700, Eric Biggers wrote: On Thu, May 14, 2020 at 02:54:56PM -0400, Sasha Levin wrote: From: Eric Biggers [ Upstream commit 732e540953477083082e999ff553622c59cffd5f ] Simplify the error handling in the XTS template's ->create() function by taking a

  1   2   3   >