Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 553C0C433F5 for ; Mon, 10 Jan 2022 20:05:15 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243611AbiAJUFN (ORCPT ); Mon, 10 Jan 2022 15:05:13 -0500 Received: from ams.source.kernel.org ([145.40.68.75]:54680 "EHLO ams.source.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S243553AbiAJUFN (ORCPT ); Mon, 10 Jan 2022 15:05:13 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 29740B817D2; Mon, 10 Jan 2022 20:05:12 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id D0641C36AE9; Mon, 10 Jan 2022 20:05:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1641845110; bh=5UEoJ7LADym/lTJ6UBzOx14TlXiB1WSHgVxNCt8uJaY=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=VHNydo81TYOGXNPN05R9ogZ/ri3VFhOQ9PvkHgeD0RJ5OsUOhlFUUFKjDoCso/KM2 OGZoj+PMuGGC2MyuIGt3FSYfdHcBl5qBypGBtd476RyWiy+IL0CWQgNTlbg3mxZn6E 3pm6IcgZMWqJa0y3eSnTFIeAEXs8MHbdn9dwW3QlUDL++/AfZLVoNVqWaplS6PJjf4 fS9JL2KwJL0xKVa/Wu6W3uLYms9yIRr4guRlaOXRQX8f3r2XVyAcBjJ9sAyvOClqHg sp/PntthmERkaDv2fpLdYITPVA0v9Bd7Q+lXO/3QIzYDEbK7nouW+QwsJ2aAIftNar MGfEu99SsZkBA== Date: Mon, 10 Jan 2022 12:05:08 -0800 From: Eric Biggers To: Simo Sorce Cc: "Jason A. Donenfeld" , Marcelo Henrique Cerri , Theodore Ts'o , Greg Kroah-Hartman , Jeffrey Walton , Stephan Mueller , Linux Crypto Mailing List , Willy Tarreau , Nicolai Stange , LKML , Arnd Bergmann , "Eric W. Biederman" , "Alexander E. Patrakov" , "Ahmed S. Darwish" , Matthew Garrett , Vito Caputo , Andreas Dilger , Jan Kara , Ray Strode , William Jon McCann , zhangjs , Andy Lutomirski , Florian Weimer , Lennart Poettering , Peter Matthias , Randy Dunlap , Julia Lawall , Dan Carpenter , Andy Lavr , Petr Tesarik , John Haxby , Alexander Lobakin , Jirka Hladky Subject: Re: [PATCH v43 01/15] Linux Random Number Generator Message-ID: References: <20211210014337.xmin2lu5rhhe3b3t@valinor> <20220110132349.siplwka7yhe2tmwc@valinor> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Mon, Jan 10, 2022 at 02:41:33PM -0500, Simo Sorce wrote: > On Mon, 2022-01-10 at 19:44 +0100, Jason A. Donenfeld wrote: > > On Mon, Jan 10, 2022 at 4:08 PM Marcelo Henrique Cerri > > wrote: > > > > Just to confirm, this little patch here gives you FIPS certification? > > > It does > > > > On Mon, Jan 10, 2022 at 7:29 PM Eric Biggers wrote: > > > Now, the idea of certifying the whole kernel as a FIPS cryptographic module is > > > stupid > > Not that it is not the whole kernel, but a "module boundary" is drawn > around the crypto API and vicinity. > It would be really nice if this whole "boundary" could be built as a > single binary module to be loaded in the kernel in fips mode. That way > we could update the rest of the kernel w/o rebuilding the module, but > we are not there. FWIW, the "FIPS module as a loadable kernel module" approach was implemented in the Android kernel; grep for "fips140" in branch "android13-5.10" of https://android.googlesource.com/kernel/common. It's a lot of work for nothing IMO, but the FIPS certification lab being used is happy with the approach. Note that random.c is outside of the FIPS module with this approach. - Eric