From: Stephan Mueller Subject: Re: [PATCH v2] crypto/fips: only panic on bad/missing crypto mod signatures Date: Thu, 03 Jul 2014 16:10:07 +0200 Message-ID: <2891603.xs6W2pOOfS@tauon> References: <1403896374-62781-1-git-send-email-jarod@redhat.com> <1404329850-35509-1-git-send-email-jarod@redhat.com> <20140703111806.GE9748@hmsreliant.think-freely.org> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7Bit Cc: Jarod Wilson , linux-kernel@vger.kernel.org, Herbert Xu , "David S. Miller" , Rusty Russell , linux-crypto@vger.kernel.org To: Neil Horman Return-path: In-Reply-To: <20140703111806.GE9748@hmsreliant.think-freely.org> Sender: linux-kernel-owner@vger.kernel.org List-Id: linux-crypto.vger.kernel.org Am Donnerstag, 3. Juli 2014, 07:18:06 schrieb Neil Horman: >On Wed, Jul 02, 2014 at 03:37:30PM -0400, Jarod Wilson wrote: >> Per further discussion with NIST, the requirements for FIPS state >> that >> we only need to panic the system on failed kernel module signature >> checks for crypto subsystem modules. This moves the fips-mode-only >> module signature check out of the generic module loading code, into >> the crypto subsystem, at points where we can catch both algorithm >> module loads and mode module loads. At the same time, make >> CONFIG_CRYPTO_FIPS dependent on CONFIG_MODULE_SIG, as this is >> entirely necessary for FIPS mode. >> >> v2: remove extraneous blank line, perform checks in static inline >> function, drop no longer necessary fips.h include. >> >> CC: Herbert Xu >> CC: "David S. Miller" >> CC: Rusty Russell >> CC: Stephan Mueller >> CC: linux-crypto@vger.kernel.org >> Signed-off-by: Jarod Wilson > >Acked-by: Neil Horman Acked-by: Stephan Mueller