From: Alan Cox Subject: Re: [PULL] modules Date: Sun, 14 Oct 2012 22:27:54 +0100 Message-ID: <20121014222754.0f11b609@pyramind.ukuu.org.uk> References: <87fw5m7ipz.fsf@rustcorp.com.au> Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Cc: Rusty Russell , LKML , Alex Lyashkov , Arnd Bergmann , Dan Carpenter , David Howells , "David S. Miller" , Dmitry Kasatkin , Herbert Xu , Josh Boyer , linux-crypto@vger.kernel.org, Lucas De Marchi , Matthew Garrett , Milan Broz , Ralf Baechle , Randy Dunlap , Sam Ravnborg To: Linus Torvalds Return-path: Received: from lxorguk.ukuu.org.uk ([81.2.110.251]:38894 "EHLO lxorguk.ukuu.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751611Ab2JNVXw (ORCPT ); Sun, 14 Oct 2012 17:23:52 -0400 In-Reply-To: Sender: linux-crypto-owner@vger.kernel.org List-ID: > I realize that fips_enabled is only for crazy people, but it's exactly > code like this that limits it to only crazy people. Is there some > *reason* for this? Presumably its so a typical server with reboot on panic will reboot so the attacker can hide the attempt better ;-) Alan