All of lore.kernel.org
 help / color / mirror / Atom feed
* [next:master 284/380] cpu_pm.c:undefined reference to `crypto_alloc_shash'
@ 2014-07-03  8:40 kbuild test robot
  2014-07-07 19:04 ` Andrew Morton
  0 siblings, 1 reply; 3+ messages in thread
From: kbuild test robot @ 2014-07-03  8:40 UTC (permalink / raw)
  To: Vivek Goyal; +Cc: Linux Memory Management List, Andrew Morton, kbuild-all

tree:   git://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master
head:   0e9ce823ad7bc6b85c279223ae6638d47089461e
commit: ba0dc4038c9fec5fa2f94756065f02b8011f270b [284/380] kexec: load and relocate purgatory at kernel load time
config: make ARCH=arm nuc950_defconfig

All error/warnings:

   kernel/built-in.o: In function `sys_kexec_file_load':
>> cpu_pm.c:(.text+0x4a580): undefined reference to `crypto_alloc_shash'
>> cpu_pm.c:(.text+0x4a654): undefined reference to `crypto_shash_update'
>> cpu_pm.c:(.text+0x4a698): undefined reference to `crypto_shash_update'
>> cpu_pm.c:(.text+0x4a778): undefined reference to `crypto_shash_final'

---
0-DAY kernel build testing backend              Open Source Technology Center
http://lists.01.org/mailman/listinfo/kbuild                 Intel Corporation

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [next:master 284/380] cpu_pm.c:undefined reference to `crypto_alloc_shash'
  2014-07-03  8:40 [next:master 284/380] cpu_pm.c:undefined reference to `crypto_alloc_shash' kbuild test robot
@ 2014-07-07 19:04 ` Andrew Morton
  2014-07-08 20:27   ` Vivek Goyal
  0 siblings, 1 reply; 3+ messages in thread
From: Andrew Morton @ 2014-07-07 19:04 UTC (permalink / raw)
  To: kbuild test robot; +Cc: Vivek Goyal, Linux Memory Management List, kbuild-all

On Thu, 03 Jul 2014 16:40:04 +0800 kbuild test robot <fengguang.wu@intel.com> wrote:

> tree:   git://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master
> head:   0e9ce823ad7bc6b85c279223ae6638d47089461e
> commit: ba0dc4038c9fec5fa2f94756065f02b8011f270b [284/380] kexec: load and relocate purgatory at kernel load time
> config: make ARCH=arm nuc950_defconfig
> 
> All error/warnings:
> 
>    kernel/built-in.o: In function `sys_kexec_file_load':
> >> cpu_pm.c:(.text+0x4a580): undefined reference to `crypto_alloc_shash'
> >> cpu_pm.c:(.text+0x4a654): undefined reference to `crypto_shash_update'
> >> cpu_pm.c:(.text+0x4a698): undefined reference to `crypto_shash_update'
> >> cpu_pm.c:(.text+0x4a778): undefined reference to `crypto_shash_final'

yup, kexec now requires crypto but the patch only fixes x86's Kconfig.

Was selecting crypto the correct decision?  Is there no case for using
kexec without this signing capability?

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [next:master 284/380] cpu_pm.c:undefined reference to `crypto_alloc_shash'
  2014-07-07 19:04 ` Andrew Morton
@ 2014-07-08 20:27   ` Vivek Goyal
  0 siblings, 0 replies; 3+ messages in thread
From: Vivek Goyal @ 2014-07-08 20:27 UTC (permalink / raw)
  To: Andrew Morton; +Cc: kbuild test robot, Linux Memory Management List, kbuild-all

On Mon, Jul 07, 2014 at 12:04:14PM -0700, Andrew Morton wrote:
> On Thu, 03 Jul 2014 16:40:04 +0800 kbuild test robot <fengguang.wu@intel.com> wrote:
> 
> > tree:   git://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master
> > head:   0e9ce823ad7bc6b85c279223ae6638d47089461e
> > commit: ba0dc4038c9fec5fa2f94756065f02b8011f270b [284/380] kexec: load and relocate purgatory at kernel load time
> > config: make ARCH=arm nuc950_defconfig
> > 
> > All error/warnings:
> > 
> >    kernel/built-in.o: In function `sys_kexec_file_load':
> > >> cpu_pm.c:(.text+0x4a580): undefined reference to `crypto_alloc_shash'
> > >> cpu_pm.c:(.text+0x4a654): undefined reference to `crypto_shash_update'
> > >> cpu_pm.c:(.text+0x4a698): undefined reference to `crypto_shash_update'
> > >> cpu_pm.c:(.text+0x4a778): undefined reference to `crypto_shash_final'
> 
> yup, kexec now requires crypto but the patch only fixes x86's Kconfig.
> 
> Was selecting crypto the correct decision?  Is there no case for using
> kexec without this signing capability?

Hi Andrew,

CRYPTO is required even without signing capability. kexec caculates the
sha256 hashes of loaded segments and just before jumping to next kernel
is recalculates the digests and matches with the stored ones to make
sure there is no data corruption.

So far user space used to do it and now we have moved that functionality in
kernel space hence kexec functionality becomes dependent on crypto.

Admittedly that this dependency is required only for new syscall and not
the old one. I did not create a config option for new syscall. So as a 
side affect old syscall also becomes dependent on crypto.

Creating more config option soon becomes cumbersome and anyway plan is
that in long term old syscall will give way to new syscall. So I felt it
is better not to create a config option for new syscall (until and unless
it becomes clear that a separate config option is a good idea).

Thanks
Vivek

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2014-07-08 20:27 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2014-07-03  8:40 [next:master 284/380] cpu_pm.c:undefined reference to `crypto_alloc_shash' kbuild test robot
2014-07-07 19:04 ` Andrew Morton
2014-07-08 20:27   ` Vivek Goyal

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.