Re: [GIT PULL] Asymmetric keys and module signing

2012-09-28 Thread Rusty Russell
David Howells writes: > Rusty Russell wrote: > >> And after those three fixes, I still get all fail: >> >> [3.361036] Request for unknown module key 'Magrathea: Glacier signing >> key: 6 >> e03943da0f3b015ba6ed7f5e0cac4fe48680994' err -11 > > Can you look back further in your kernel output,

[PATCH] crypto: caam - Pages pinned with get_user_pages requires kmap

2012-09-28 Thread Yashpal Dutta
Following crash occur if user pinned pages are send to SEC driver for digest creation: Unable to handle kernel paging request for data at address 0x0f48 Faulting instruction address: 0xc0017f1c Oops: Kernel access of bad area, sig: 11 [#1] SMP NR_CPUS=8 P4080 DS Modules linked in: qoriq_dbg NI

Re: aesni intel and kernel crashes.

2012-09-28 Thread Jussi Kivilinna
Quoting Gurucharan Shetty : Hello All, I have been seeing a bunch of kernel crashes while using aesni_intel module and IPSEC. *snip* #6 [880c0fc63998] cryptd_enqueue_request at a02d9106 [cryptd] #7 [880c0fc639c8] cryptd_aead_decrypt_enqueue at a02d92c0 [cryptd]

Re: [GIT PULL] Asymmetric keys and module signing

2012-09-28 Thread David Howells
Hi Rusty, I've pushed two additional patches. The first makes the X.509 cert signature use the same hash algorithm as the signatures on the modules - which should fix the problem you're seeing, I think. The second makes elements of the names use UTF8 strings, just in case someone wants to use a

Re: [GIT PULL] Asymmetric keys and module signing

2012-09-28 Thread David Howells
Rusty Russell wrote: > [3.361036] Request for unknown module key 'Magrathea: Glacier signing > key: 6 > e03943da0f3b015ba6ed7f5e0cac4fe48680994' err -11 Okay, it turns out that my attempts to remove SHA1 by editing it out of the .config file were doomed to failure because a couple of IPv6

Re: [GIT PULL] Asymmetric keys and module signing

2012-09-28 Thread David Howells
Rusty Russell wrote: > warning: (MODULE_SIG) selects ASYMMETRIC_KEY_TYPE which has unmet direct > dependencies (CRYPTO && KEYS) > > Ah, I see: > > + select CONFIG_KEYS > + select CONFIG_CRYPTO > > I fixed this commit, rather than go around again. Thanks. select is irritatingly broke

Re: [PATCH 1/2] modsign: don't use bashism in sh scripts.

2012-09-28 Thread David Howells
Rusty Russell wrote: > -source ./.config > +. ./.config Does that make a difference? -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH 2/2] modules: don't call eu-strip if it doesn't exist.

2012-09-28 Thread David Howells
Rusty Russell wrote: > Signed-off-by: Rusty Russell Acked-by: David Howells -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [GIT PULL] Asymmetric keys and module signing

2012-09-28 Thread David Howells
Rusty Russell wrote: > And after those three fixes, I still get all fail: > > [3.361036] Request for unknown module key 'Magrathea: Glacier signing > key: 6 > e03943da0f3b015ba6ed7f5e0cac4fe48680994' err -11 Can you look back further in your kernel output, see if you can spot the bit wher

Re: [GIT PULL] Asymmetric keys and module signing

2012-09-28 Thread David Howells
Geert Uytterhoeven wrote: > Just wondering, what's the advantage of doing panic over just > rejecting the module? > Panic is a DoS? FIPS mode is strange like that. David -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majord...@vger.kernel.