To meet FIPS 140 requirements, add support for building a kernel module
"fips140.ko" that contains various cryptographic algorithms built from
existing kernel source files. At load time, the module checks its own
integrity and self-tests its algorithms, then registers the algorithms
with the crypto API to supersede the original algorithms provided by the
kernel itself.
[ebiggers: this commit originated from "ANDROID: crypto: fips140 -
perform load time integrity check", but I've folded many later commits
into it to make forward porting easier. See below]
Original commits from android12-5.10:
* 6be141eb36fe ("ANDROID: crypto: fips140 - perform load time integrity check")
* 868be244bbed ("ANDROID: inject correct HMAC digest into fips140.ko at build time")
* 091338cb398e ("ANDROID: fips140: add missing static keyword to fips140_init()")
* c799c6644b52 ("ANDROID: fips140: adjust some log messages")
* 92de53472e68 ("ANDROID: fips140: log already-live algorithms")
* 0af06624eadc ("ANDROID: fips140: check for errors from initcalls")
* 634445a640a4 ("ANDROID: fips140: fix deadlock in unregister_existing_fips140_algos()")
* e886dd4c339e ("ANDROID: fips140: unregister existing DRBG algorithms")
* b7397e89db29 ("ANDROID: fips140: add power-up cryptographic self-tests")
* 50661975be74 ("ANDROID: fips140: add/update module help text")
* b397a0387cb2 ("ANDROID: fips140: test all implementations")
* 17ccefe14021 ("ANDROID: fips140: use full 16-byte IV")
* 1be58af0776a ("ANDROID: fips140: remove non-prediction-resistant DRBG test")
* 2b5843ae2d90 ("ANDROID: fips140: add AES-CBC-CTS")
* 2ee56aad318c ("ANDROID: fips140: add AES-CMAC")
* 960ebb2b565b ("ANDROID: fips140: add jitterentropy to fips140 module")
* e5b14396f9d2 ("ANDROID: fips140: take into account AES-GCM not being approvable")
* 52b70d491bd4 ("ANDROID: fips140: use FIPS140_CFLAGS when compiling fips140-selftests.c")
* 6b995f5a5403 ("ANDROID: fips140: preserve RELA sections without relying on the module loader")
* e45108ecff64 ("ANDROID: fips140: block crypto operations until tests complete")
* ecf9341134d1 ("ANDROID: fips140: remove in-place updating of live algorithms")
* 482b0323cf29 ("ANDROID: fips140: zeroize temporary values from integrity check")
* 64d769e53f20 ("ANDROID: fips140: add service indicators")
* 8d7f609cdaa4 ("ANDROID: fips140: add name and version, and a function to retrieve them")
* 6b7c37f6c449 ("ANDROID: fips140: use UTS_RELEASE as FIPS version")
* 903e97a0ca6d ("ANDROID: fips140: refactor evaluation testing support")
* 97fb2104fe22 ("ANDROID: fips140: add support for injecting integrity error")
* 109f31ac23f5 ("ANDROID: fips140: add userspace interface for evaluation testing")
Bug: 153614920
Bug: 188620248
Test: tested that the module builds and can be loaded on raven.
Change-Id: I3fde49dbc3d16b149b072a27ba5b4c6219015c94
Signed-off-by: Ard Biesheuvel <ardb@google.com>
Signed-off-by: Eric Biggers <ebiggers@google.com>
35 lines
1.0 KiB
ArmAsm
35 lines
1.0 KiB
ArmAsm
/* SPDX-License-Identifier: GPL-2.0-only */
|
|
/*
|
|
* Copyright 2021 Google LLC
|
|
* Author: Ard Biesheuvel <ardb@google.com>
|
|
*
|
|
* This file contains the variable definitions that will be used by the FIPS140
|
|
* s/w module to access the RELA sections in the ELF image. These are used to
|
|
* apply the relocations applied by the module loader in reverse, so that we
|
|
* can reconstruct the image that was used to derive the HMAC used by the
|
|
* integrity check.
|
|
*
|
|
* The first .long of each entry will be populated by the module loader based
|
|
* on the actual placement of the respective RELA section in memory. The second
|
|
* .long carries the RELA entry count, and is populated by the host tool that
|
|
* also generates the HMAC of the contents of .text and .rodata.
|
|
*/
|
|
|
|
#include <linux/linkage.h>
|
|
#include <asm/assembler.h>
|
|
|
|
.section ".init.rodata", "a"
|
|
|
|
.align 2
|
|
.globl fips140_rela_text
|
|
fips140_rela_text:
|
|
.weak __sec_rela_text
|
|
.long __sec_rela_text - .
|
|
.long 0
|
|
|
|
.globl fips140_rela_rodata
|
|
fips140_rela_rodata:
|
|
.weak __sec_rela_rodata
|
|
.long __sec_rela_rodata - .
|
|
.long 0
|