mirror of
				git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
				synced 2025-10-31 16:54:21 +00:00 
			
		
		
		
	 9552389c46
			
		
	
	
		9552389c46
		
	
	
	
	
		
			
			Crypto test failures in FIPS mode cause an immediate panic, but on some system the cryptographic boundary extends beyond just the Linux controlled domain. Add a simple atomic notification chain to allow interested parties to register to receive notification prior to us kicking the bucket. Signed-off-by: Gilad Ben-Yossef <gilad@benyossef.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
		
			
				
	
	
		
			84 lines
		
	
	
	
		
			1.7 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			84 lines
		
	
	
	
		
			1.7 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| // SPDX-License-Identifier: GPL-2.0-or-later
 | |
| /*
 | |
|  * FIPS 200 support.
 | |
|  *
 | |
|  * Copyright (c) 2008 Neil Horman <nhorman@tuxdriver.com>
 | |
|  */
 | |
| 
 | |
| #include <linux/export.h>
 | |
| #include <linux/fips.h>
 | |
| #include <linux/init.h>
 | |
| #include <linux/module.h>
 | |
| #include <linux/kernel.h>
 | |
| #include <linux/sysctl.h>
 | |
| #include <linux/notifier.h>
 | |
| 
 | |
| int fips_enabled;
 | |
| EXPORT_SYMBOL_GPL(fips_enabled);
 | |
| 
 | |
| ATOMIC_NOTIFIER_HEAD(fips_fail_notif_chain);
 | |
| EXPORT_SYMBOL_GPL(fips_fail_notif_chain);
 | |
| 
 | |
| /* Process kernel command-line parameter at boot time. fips=0 or fips=1 */
 | |
| static int fips_enable(char *str)
 | |
| {
 | |
| 	fips_enabled = !!simple_strtol(str, NULL, 0);
 | |
| 	printk(KERN_INFO "fips mode: %s\n",
 | |
| 		fips_enabled ? "enabled" : "disabled");
 | |
| 	return 1;
 | |
| }
 | |
| 
 | |
| __setup("fips=", fips_enable);
 | |
| 
 | |
| static struct ctl_table crypto_sysctl_table[] = {
 | |
| 	{
 | |
| 		.procname       = "fips_enabled",
 | |
| 		.data           = &fips_enabled,
 | |
| 		.maxlen         = sizeof(int),
 | |
| 		.mode           = 0444,
 | |
| 		.proc_handler   = proc_dointvec
 | |
| 	},
 | |
| 	{}
 | |
| };
 | |
| 
 | |
| static struct ctl_table crypto_dir_table[] = {
 | |
| 	{
 | |
| 		.procname       = "crypto",
 | |
| 		.mode           = 0555,
 | |
| 		.child          = crypto_sysctl_table
 | |
| 	},
 | |
| 	{}
 | |
| };
 | |
| 
 | |
| static struct ctl_table_header *crypto_sysctls;
 | |
| 
 | |
| static void crypto_proc_fips_init(void)
 | |
| {
 | |
| 	crypto_sysctls = register_sysctl_table(crypto_dir_table);
 | |
| }
 | |
| 
 | |
| static void crypto_proc_fips_exit(void)
 | |
| {
 | |
| 	unregister_sysctl_table(crypto_sysctls);
 | |
| }
 | |
| 
 | |
| void fips_fail_notify(void)
 | |
| {
 | |
| 	if (fips_enabled)
 | |
| 		atomic_notifier_call_chain(&fips_fail_notif_chain, 0, NULL);
 | |
| }
 | |
| EXPORT_SYMBOL_GPL(fips_fail_notify);
 | |
| 
 | |
| static int __init fips_init(void)
 | |
| {
 | |
| 	crypto_proc_fips_init();
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static void __exit fips_exit(void)
 | |
| {
 | |
| 	crypto_proc_fips_exit();
 | |
| }
 | |
| 
 | |
| subsys_initcall(fips_init);
 | |
| module_exit(fips_exit);
 |