Re: [PATCH] crypto: padlock-aes - convert to skcipher API

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Eric Biggers wrote:
> From: Eric Biggers <ebiggers@xxxxxxxxxx>
> 
> Convert the VIA PadLock implementations of AES-ECB and AES-CBC from the
> deprecated "blkcipher" API to the "skcipher" API.  This is needed in
> order for the blkcipher API to be removed.
> 
> Signed-off-by: Eric Biggers <ebiggers@xxxxxxxxxx>
> ---
> 
> This is compile-tested only, as I don't have this hardware.
> If anyone has this hardware, please test it with
> CONFIG_CRYPTO_MANAGER_EXTRA_TESTS=y.

Well I gave it a spin on my Esther system against 5.3.6 but results
were somewhat obscured by the fact I seem to have other problems with
modern kernels (I'd been running Greg's 4.19 series on this system
which doesn't have the extra tests you wanted) on this hardware to the
tune of (from an unpatched 5.3.6):

 Loading compiled-in X.509 certificates
 ------------[ cut here ]------------
 WARNING: CPU: 0 PID: 1 at crypto/rsa-pkcs1pad.c:539 pkcs1pad_verify+0x2d/0xf4
 Modules linked in:
 CPU: 0 PID: 1 Comm: swapper Tainted: G                T 5.3.6 #2
 Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./To be filled by O.E.M., BIOS 080014  06/01/2009
 EIP: pkcs1pad_verify+0x2d/0xf4
 Code: 57 56 53 89 c3 83 7b 1c 00 74 0e 68 c8 7a 46 c1 e8 48 43 ec ff 0f 0b eb 13 8b 53 24 85 d2 75 17 68 c8 7a 46 c1 e8 33 43 ec ff <0f> 0b 59 b8 ea ff ff ff e9 b2 00 00 00 8b 73 10 b8 ea ff ff ff 8b
 EAX: 00000024 EBX: f124a3c0 ECX: 00000100 EDX: c14fab54
 ESI: 00000000 EDI: f124a3c0 EBP: f106bd58 ESP: f106bd48
 DS: 007b ES: 007b FS: 0000 GS: 00e0 SS: 0068 EFLAGS: 00010246
 CR0: 80050033 CR2: 00000000 CR3: 0158c000 CR4: 000006b0
 Call Trace:
  public_key_verify_signature+0x1ff/0x26b
  x509_check_for_self_signed+0x9f/0xb8
  x509_cert_parse+0x149/0x179
  x509_key_preparse+0x1a/0x16d
  ? __down_read+0x26/0x29
  asymmetric_key_preparse+0x35/0x56
  key_create_or_update+0x121/0x330
  load_system_certificate_list+0x77/0xc5
  ? system_trusted_keyring_init+0x4f/0x4f
  do_one_initcall+0x7b/0x158
  kernel_init_freeable+0xd7/0x156
  ? rest_init+0x6d/0x6d
  kernel_init+0x8/0xd0
  ret_from_fork+0x33/0x40
 ---[ end trace 1ec5d41c10bd49a3 ]---
 Problem loading in-kernel X.509 certificate (-22)

That said, I get this issue with or without your patch, so I assume
it's unrelated, and probably something with c7381b01287240ab that
introduced that WARN_ON.  Anyways, I'll have to run a real bisection
on that when I have the time.

I built a patched 5.3.6 with none of the crypto bits modularized and
you can find that dmesg and config at:

http://audible.transient.net/~jamie/k/skcipher.config-5.3.6
http://audible.transient.net/~jamie/k/skcipher.dmesg

Hope that helps.

-- 
Jamie Heilman                     http://audible.transient.net/~jamie/



[Index of Archives]     [Kernel]     [Gnu Classpath]     [Gnu Crypto]     [DM Crypt]     [Netfilter]     [Bugtraq]

  Powered by Linux