123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830 |
- /* module_hooks.c -- module load/unload hooks for libwolfssl.ko
- *
- * Copyright (C) 2006-2024 wolfSSL Inc.
- *
- * This file is part of wolfSSL.
- *
- * wolfSSL is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * wolfSSL is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
- */
- #ifndef WOLFSSL_LICENSE
- #ifdef WOLFSSL_COMMERCIAL_LICENSE
- #define WOLFSSL_LICENSE "wolfSSL Commercial"
- #else
- #define WOLFSSL_LICENSE "GPL v2"
- #endif
- #endif
- #define FIPS_NO_WRAPPERS
- #define WOLFSSL_NEED_LINUX_CURRENT
- #ifdef HAVE_CONFIG_H
- #include <config.h>
- #endif
- #include <wolfssl/wolfcrypt/settings.h>
- #include <wolfssl/wolfcrypt/error-crypt.h>
- #ifdef WOLFCRYPT_ONLY
- #include <wolfssl/version.h>
- #else
- #include <wolfssl/ssl.h>
- #endif
- #ifdef HAVE_FIPS
- #include <wolfssl/wolfcrypt/fips_test.h>
- #endif
- #ifndef NO_CRYPT_TEST
- #include <wolfcrypt/test/test.h>
- #endif
- static int libwolfssl_cleanup(void) {
- int ret;
- #ifdef WOLFCRYPT_ONLY
- ret = wolfCrypt_Cleanup();
- if (ret != 0)
- pr_err("wolfCrypt_Cleanup() failed: %s\n", wc_GetErrorString(ret));
- else
- pr_info("wolfCrypt " LIBWOLFSSL_VERSION_STRING " cleanup complete.\n");
- #else
- ret = wolfSSL_Cleanup();
- if (ret != WOLFSSL_SUCCESS)
- pr_err("wolfSSL_Cleanup() failed: %s\n", wc_GetErrorString(ret));
- else
- pr_info("wolfSSL " LIBWOLFSSL_VERSION_STRING " cleanup complete.\n");
- #endif
- return ret;
- }
- #ifdef HAVE_LINUXKM_PIE_SUPPORT
- #ifdef DEBUG_LINUXKM_PIE_SUPPORT
- extern int wolfCrypt_PIE_first_function(void);
- extern int wolfCrypt_PIE_last_function(void);
- extern const unsigned int wolfCrypt_PIE_rodata_start[];
- extern const unsigned int wolfCrypt_PIE_rodata_end[];
- /* cheap portable ad-hoc hash function to confirm bitwise stability of the PIE
- * binary image.
- */
- static unsigned int hash_span(char *start, char *end) {
- unsigned int sum = 1;
- while (start < end) {
- unsigned int rotate_by;
- sum ^= *start++;
- rotate_by = (sum ^ (sum >> 5)) & 31;
- sum = (sum << rotate_by) | (sum >> (32 - rotate_by));
- }
- return sum;
- }
- #endif /* DEBUG_LINUXKM_PIE_SUPPORT */
- #ifdef USE_WOLFSSL_LINUXKM_PIE_REDIRECT_TABLE
- extern struct wolfssl_linuxkm_pie_redirect_table wolfssl_linuxkm_pie_redirect_table;
- static int set_up_wolfssl_linuxkm_pie_redirect_table(void);
- #endif /* USE_WOLFSSL_LINUXKM_PIE_REDIRECT_TABLE */
- #endif /* HAVE_LINUXKM_PIE_SUPPORT */
- #ifdef HAVE_FIPS
- static void lkmFipsCb(int ok, int err, const char* hash)
- {
- if ((! ok) || (err != 0))
- pr_err("libwolfssl FIPS error: %s\n", wc_GetErrorString(err));
- if (err == WC_NO_ERR_TRACE(IN_CORE_FIPS_E)) {
- pr_err("In-core integrity hash check failure.\n"
- "Update verifyCore[] in fips_test.c with new hash \"%s\" and rebuild.\n",
- hash ? hash : "<null>");
- }
- }
- #endif
- #ifdef WOLFCRYPT_FIPS_CORE_DYNAMIC_HASH_VALUE
- #ifndef CONFIG_MODULE_SIG
- #error WOLFCRYPT_FIPS_CORE_DYNAMIC_HASH_VALUE requires a CONFIG_MODULE_SIG kernel.
- #endif
- static int updateFipsHash(void);
- #endif
- #ifdef WOLFSSL_LINUXKM_BENCHMARKS
- extern int wolfcrypt_benchmark_main(int argc, char** argv);
- #endif /* WOLFSSL_LINUXKM_BENCHMARKS */
- #ifdef LINUXKM_LKCAPI_REGISTER
- #include "linuxkm/lkcapi_glue.c"
- #endif
- #if defined(WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS) && defined(CONFIG_X86)
- #include "linuxkm/x86_vector_register_glue.c"
- #endif
- #if LINUX_VERSION_CODE >= KERNEL_VERSION(5, 0, 0)
- static int __init wolfssl_init(void)
- #else
- static int wolfssl_init(void)
- #endif
- {
- int ret;
- #ifdef WOLFCRYPT_FIPS_CORE_DYNAMIC_HASH_VALUE
- if (THIS_MODULE->sig_ok == false) {
- pr_err("wolfSSL module load aborted -- bad or missing module signature with FIPS dynamic hash.\n");
- return -ECANCELED;
- }
- ret = updateFipsHash();
- if (ret < 0) {
- pr_err("wolfSSL module load aborted -- updateFipsHash: %s\n",wc_GetErrorString(ret));
- return -ECANCELED;
- }
- #endif
- #ifdef USE_WOLFSSL_LINUXKM_PIE_REDIRECT_TABLE
- ret = set_up_wolfssl_linuxkm_pie_redirect_table();
- if (ret < 0)
- return ret;
- #endif
- #if defined(HAVE_LINUXKM_PIE_SUPPORT) && defined(DEBUG_LINUXKM_PIE_SUPPORT)
- #if LINUX_VERSION_CODE >= KERNEL_VERSION(6, 4, 0)
- /* see linux commit ac3b432839 */
- #define THIS_MODULE_TEXT_BASE (THIS_MODULE->mem[MOD_TEXT].base)
- #define THIS_MODULE_TEXT_SIZE (THIS_MODULE->mem[MOD_TEXT].size)
- #define THIS_MODULE_RO_BASE (THIS_MODULE->mem[MOD_RODATA].base)
- #define THIS_MODULE_RO_SIZE (THIS_MODULE->mem[MOD_RODATA].size)
- #elif LINUX_VERSION_CODE >= KERNEL_VERSION(4, 5, 0)
- #define THIS_MODULE_TEXT_BASE (THIS_MODULE->core_layout.base)
- #define THIS_MODULE_TEXT_SIZE (THIS_MODULE->core_layout.text_size)
- #define THIS_MODULE_RO_BASE ((char *)THIS_MODULE->core_layout.base + THIS_MODULE->core_layout.text_size)
- #define THIS_MODULE_RO_SIZE (THIS_MODULE->core_layout.ro_size)
- #else
- #define THIS_MODULE_TEXT_BASE (THIS_MODULE->module_core)
- #define THIS_MODULE_TEXT_SIZE (THIS_MODULE->core_text_size)
- #define THIS_MODULE_RO_BASE ((char *)THIS_MODULE->module_core + THIS_MODULE->core_ro_size)
- #define THIS_MODULE_RO_SIZE (THIS_MODULE->core_ro_size)
- #endif
- {
- char *pie_text_start = (char *)wolfCrypt_PIE_first_function;
- char *pie_text_end = (char *)wolfCrypt_PIE_last_function;
- char *pie_rodata_start = (char *)wolfCrypt_PIE_rodata_start;
- char *pie_rodata_end = (char *)wolfCrypt_PIE_rodata_end;
- unsigned int text_hash, rodata_hash;
- if ((pie_text_start < pie_text_end) &&
- (pie_text_start >= (char *)THIS_MODULE_TEXT_BASE) &&
- (pie_text_end - (char *)THIS_MODULE_TEXT_BASE <= THIS_MODULE_TEXT_SIZE))
- {
- text_hash = hash_span(pie_text_start, pie_text_end);
- } else {
- pr_info("out-of-bounds PIE fenceposts! pie_text_start=%px pie_text_end=%px (span=%lu)"
- " core_layout.base=%px text_end=%px\n",
- pie_text_start,
- pie_text_end,
- pie_text_end-pie_text_start,
- THIS_MODULE_TEXT_BASE,
- (char *)THIS_MODULE_TEXT_BASE + THIS_MODULE_TEXT_SIZE);
- text_hash = 0;
- }
- if ((pie_rodata_start < pie_rodata_end) && // cppcheck-suppress comparePointers
- (pie_rodata_start >= (char *)THIS_MODULE_RO_BASE) &&
- (pie_rodata_end - (char *)THIS_MODULE_RO_BASE <= THIS_MODULE_RO_SIZE))
- {
- rodata_hash = hash_span(pie_rodata_start, pie_rodata_end);
- } else {
- pr_info("out-of-bounds PIE fenceposts! pie_rodata_start=%px pie_rodata_end=%px (span=%lu)"
- " core_layout.base+core_layout.text_size=%px rodata_end=%px\n",
- pie_rodata_start,
- pie_rodata_end,
- pie_rodata_end-pie_rodata_start,
- (char *)THIS_MODULE_RO_BASE,
- (char *)THIS_MODULE_RO_BASE + THIS_MODULE_RO_SIZE);
- rodata_hash = 0;
- }
- /* note, "%pK" conceals the actual layout information. "%px" exposes
- * the true module start address, which is potentially useful to an
- * attacker.
- */
- pr_info("wolfCrypt container hashes (spans): text 0x%x (%lu), rodata 0x%x (%lu)\n",
- text_hash, pie_text_end-pie_text_start,
- rodata_hash, pie_rodata_end-pie_rodata_start);
- }
- #endif /* HAVE_LINUXKM_PIE_SUPPORT && DEBUG_LINUXKM_PIE_SUPPORT */
- #ifdef HAVE_FIPS
- ret = wolfCrypt_SetCb_fips(lkmFipsCb);
- if (ret != 0) {
- pr_err("wolfCrypt_SetCb_fips() failed: %s\n", wc_GetErrorString(ret));
- return -ECANCELED;
- }
- fipsEntry();
- ret = wolfCrypt_GetStatus_fips();
- if (ret != 0) {
- pr_err("wolfCrypt_GetStatus_fips() failed with code %d: %s\n", ret, wc_GetErrorString(ret));
- if (ret == WC_NO_ERR_TRACE(IN_CORE_FIPS_E)) {
- const char *newhash = wolfCrypt_GetCoreHash_fips();
- pr_err("Update verifyCore[] in fips_test.c with new hash \"%s\" and rebuild.\n",
- newhash ? newhash : "<null>");
- }
- return -ECANCELED;
- }
- pr_info("FIPS 140-3 wolfCrypt-fips v%d.%d.%d%s%s startup "
- "self-test succeeded.\n",
- #ifdef HAVE_FIPS_VERSION_MAJOR
- HAVE_FIPS_VERSION_MAJOR,
- #else
- HAVE_FIPS_VERSION,
- #endif
- #ifdef HAVE_FIPS_VERSION_MINOR
- HAVE_FIPS_VERSION_MINOR,
- #else
- 0,
- #endif
- #ifdef HAVE_FIPS_VERSION_PATCH
- HAVE_FIPS_VERSION_PATCH,
- #else
- 0,
- #endif
- #ifdef HAVE_FIPS_VERSION_PORT
- "-",
- HAVE_FIPS_VERSION_PORT
- #else
- "",
- ""
- #endif
- );
- #endif /* HAVE_FIPS */
- #ifdef WC_RNG_SEED_CB
- ret = wc_SetSeed_Cb(wc_GenerateSeed);
- if (ret < 0) {
- pr_err("wc_SetSeed_Cb() failed with return code %d.\n", ret);
- (void)libwolfssl_cleanup();
- msleep(10);
- return -ECANCELED;
- }
- #endif
- #ifdef WOLFCRYPT_ONLY
- ret = wolfCrypt_Init();
- if (ret != 0) {
- pr_err("wolfCrypt_Init() failed: %s\n", wc_GetErrorString(ret));
- return -ECANCELED;
- }
- #else
- ret = wolfSSL_Init();
- if (ret != WOLFSSL_SUCCESS) {
- pr_err("wolfSSL_Init() failed: %s\n", wc_GetErrorString(ret));
- return -ECANCELED;
- }
- #endif
- #ifndef NO_CRYPT_TEST
- ret = wolfcrypt_test(NULL);
- if (ret < 0) {
- pr_err("wolfcrypt self-test failed with return code %d.\n", ret);
- (void)libwolfssl_cleanup();
- msleep(10);
- return -ECANCELED;
- }
- pr_info("wolfCrypt self-test passed.\n");
- #else
- pr_info("skipping full wolfcrypt_test() "
- "(configure with --enable-crypttests to enable).\n");
- #endif
- #ifdef LINUXKM_LKCAPI_REGISTER
- ret = linuxkm_lkcapi_register();
- if (ret) {
- pr_err("linuxkm_lkcapi_register() failed with return code %d.\n", ret);
- linuxkm_lkcapi_unregister();
- (void)libwolfssl_cleanup();
- msleep(10);
- return -ECANCELED;
- }
- #endif
- #ifdef WOLFSSL_LINUXKM_BENCHMARKS
- wolfcrypt_benchmark_main(0, (char**)NULL);
- #endif
- #ifdef WOLFCRYPT_ONLY
- pr_info("wolfCrypt " LIBWOLFSSL_VERSION_STRING " loaded%s"
- ".\nSee https://www.wolfssl.com/ for more information.\n"
- "wolfCrypt Copyright (C) 2006-present wolfSSL Inc. Licensed under " WOLFSSL_LICENSE ".\n",
- #ifdef CONFIG_MODULE_SIG
- THIS_MODULE->sig_ok ? " with valid module signature" : " without valid module signature"
- #else
- ""
- #endif
- );
- #else
- pr_info("wolfSSL " LIBWOLFSSL_VERSION_STRING " loaded%s"
- ".\nSee https://www.wolfssl.com/ for more information.\n"
- "wolfSSL Copyright (C) 2006-present wolfSSL Inc. Licensed under " WOLFSSL_LICENSE ".\n",
- #ifdef CONFIG_MODULE_SIG
- THIS_MODULE->sig_ok ? " with valid module signature" : " without valid module signature"
- #else
- ""
- #endif
- );
- #endif
- return 0;
- }
- module_init(wolfssl_init);
- #if LINUX_VERSION_CODE >= KERNEL_VERSION(5, 0, 0)
- static void __exit wolfssl_exit(void)
- #else
- static void wolfssl_exit(void)
- #endif
- {
- #ifdef LINUXKM_LKCAPI_REGISTER
- linuxkm_lkcapi_unregister();
- #endif
- (void)libwolfssl_cleanup();
- return;
- }
- module_exit(wolfssl_exit);
- MODULE_LICENSE(WOLFSSL_LICENSE);
- MODULE_AUTHOR("https://www.wolfssl.com/");
- MODULE_DESCRIPTION("libwolfssl cryptographic and protocol facilities");
- MODULE_VERSION(LIBWOLFSSL_VERSION_STRING);
- #ifdef USE_WOLFSSL_LINUXKM_PIE_REDIRECT_TABLE
- /* get_current() is an inline or macro, depending on the target -- sidestep the whole issue with a wrapper func. */
- static struct task_struct *my_get_current_thread(void) {
- return get_current();
- }
- #if defined(WOLFSSL_LINUXKM_SIMD_X86) && defined(WOLFSSL_COMMERCIAL_LICENSE)
- /* ditto for fpregs_lock/fpregs_unlock */
- #ifdef WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS
- static void my_fpregs_lock(void) {
- fpregs_lock();
- }
- static void my_fpregs_unlock(void) {
- fpregs_unlock();
- }
- #endif /* WOLFSSL_LINUXKM_SIMD_X86 && WOLFSSL_COMMERCIAL_LICENSE */
- #endif /* USE_WOLFSSL_LINUXKM_PIE_REDIRECT_TABLE */
- static int set_up_wolfssl_linuxkm_pie_redirect_table(void) {
- memset(
- &wolfssl_linuxkm_pie_redirect_table,
- 0,
- sizeof wolfssl_linuxkm_pie_redirect_table);
- #ifndef __ARCH_MEMCMP_NO_REDIRECT
- wolfssl_linuxkm_pie_redirect_table.memcmp = memcmp;
- #endif
- #ifndef CONFIG_FORTIFY_SOURCE
- #ifndef __ARCH_MEMCPY_NO_REDIRECT
- wolfssl_linuxkm_pie_redirect_table.memcpy = memcpy;
- #endif
- #ifndef __ARCH_MEMSET_NO_REDIRECT
- wolfssl_linuxkm_pie_redirect_table.memset = memset;
- #endif
- #ifndef __ARCH_MEMMOVE_NO_REDIRECT
- wolfssl_linuxkm_pie_redirect_table.memmove = memmove;
- #endif
- #endif /* !CONFIG_FORTIFY_SOURCE */
- #ifndef __ARCH_STRCMP_NO_REDIRECT
- wolfssl_linuxkm_pie_redirect_table.strcmp = strcmp;
- #endif
- #ifndef __ARCH_STRNCMP_NO_REDIRECT
- wolfssl_linuxkm_pie_redirect_table.strncmp = strncmp;
- #endif
- #ifndef __ARCH_STRCASECMP_NO_REDIRECT
- wolfssl_linuxkm_pie_redirect_table.strcasecmp = strcasecmp;
- #endif
- #ifndef __ARCH_STRNCASECMP_NO_REDIRECT
- wolfssl_linuxkm_pie_redirect_table.strncasecmp = strncasecmp;
- #endif
- #ifndef __ARCH_STRLEN_NO_REDIRECT
- wolfssl_linuxkm_pie_redirect_table.strlen = strlen;
- #endif
- #ifndef __ARCH_STRSTR_NO_REDIRECT
- wolfssl_linuxkm_pie_redirect_table.strstr = strstr;
- #endif
- #ifndef __ARCH_STRNCPY_NO_REDIRECT
- wolfssl_linuxkm_pie_redirect_table.strncpy = strncpy;
- #endif
- #ifndef __ARCH_STRNCAT_NO_REDIRECT
- wolfssl_linuxkm_pie_redirect_table.strncat = strncat;
- #endif
- wolfssl_linuxkm_pie_redirect_table.kstrtoll = kstrtoll;
- #if LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0)
- wolfssl_linuxkm_pie_redirect_table._printk = _printk;
- #else
- wolfssl_linuxkm_pie_redirect_table.printk = printk;
- #endif
- #ifdef CONFIG_FORTIFY_SOURCE
- wolfssl_linuxkm_pie_redirect_table.__warn_printk = __warn_printk;
- #endif
- wolfssl_linuxkm_pie_redirect_table.snprintf = snprintf;
- wolfssl_linuxkm_pie_redirect_table._ctype = _ctype;
- #if LINUX_VERSION_CODE >= KERNEL_VERSION(6, 11, 0)
- wolfssl_linuxkm_pie_redirect_table.kmalloc_noprof = kmalloc_noprof;
- wolfssl_linuxkm_pie_redirect_table.krealloc_noprof = krealloc_noprof;
- wolfssl_linuxkm_pie_redirect_table.kzalloc_noprof = kzalloc_noprof;
- wolfssl_linuxkm_pie_redirect_table.__kvmalloc_node_noprof = __kvmalloc_node_noprof;
- wolfssl_linuxkm_pie_redirect_table.__kmalloc_cache_noprof = __kmalloc_cache_noprof;
- #elif LINUX_VERSION_CODE >= KERNEL_VERSION(6, 10, 0)
- wolfssl_linuxkm_pie_redirect_table.kmalloc_noprof = kmalloc_noprof;
- wolfssl_linuxkm_pie_redirect_table.krealloc_noprof = krealloc_noprof;
- wolfssl_linuxkm_pie_redirect_table.kzalloc_noprof = kzalloc_noprof;
- wolfssl_linuxkm_pie_redirect_table.kvmalloc_node_noprof = kvmalloc_node_noprof;
- wolfssl_linuxkm_pie_redirect_table.kmalloc_trace_noprof = kmalloc_trace_noprof;
- #else
- wolfssl_linuxkm_pie_redirect_table.kmalloc = kmalloc;
- wolfssl_linuxkm_pie_redirect_table.krealloc = krealloc;
- #ifdef HAVE_KVMALLOC
- wolfssl_linuxkm_pie_redirect_table.kvmalloc_node = kvmalloc_node;
- #endif
- #if LINUX_VERSION_CODE >= KERNEL_VERSION(6, 1, 0)
- wolfssl_linuxkm_pie_redirect_table.kmalloc_trace =
- kmalloc_trace;
- #else
- wolfssl_linuxkm_pie_redirect_table.kmem_cache_alloc_trace =
- kmem_cache_alloc_trace;
- wolfssl_linuxkm_pie_redirect_table.kmalloc_order_trace =
- kmalloc_order_trace;
- #endif
- #endif
- wolfssl_linuxkm_pie_redirect_table.kfree = kfree;
- wolfssl_linuxkm_pie_redirect_table.ksize = ksize;
- #ifdef HAVE_KVMALLOC
- wolfssl_linuxkm_pie_redirect_table.kvfree = kvfree;
- #endif
- wolfssl_linuxkm_pie_redirect_table.is_vmalloc_addr = is_vmalloc_addr;
- wolfssl_linuxkm_pie_redirect_table.get_random_bytes = get_random_bytes;
- #if LINUX_VERSION_CODE < KERNEL_VERSION(4, 0, 0)
- wolfssl_linuxkm_pie_redirect_table.getnstimeofday =
- getnstimeofday;
- #elif LINUX_VERSION_CODE < KERNEL_VERSION(5, 0, 0)
- wolfssl_linuxkm_pie_redirect_table.current_kernel_time64 =
- current_kernel_time64;
- #else
- wolfssl_linuxkm_pie_redirect_table.ktime_get_coarse_real_ts64 =
- ktime_get_coarse_real_ts64;
- #endif
- wolfssl_linuxkm_pie_redirect_table.get_current = my_get_current_thread;
- #if defined(WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS) && defined(CONFIG_X86)
- wolfssl_linuxkm_pie_redirect_table.allocate_wolfcrypt_linuxkm_fpu_states = allocate_wolfcrypt_linuxkm_fpu_states;
- wolfssl_linuxkm_pie_redirect_table.can_save_vector_registers_x86 = can_save_vector_registers_x86;
- wolfssl_linuxkm_pie_redirect_table.free_wolfcrypt_linuxkm_fpu_states = free_wolfcrypt_linuxkm_fpu_states;
- wolfssl_linuxkm_pie_redirect_table.restore_vector_registers_x86 = restore_vector_registers_x86;
- wolfssl_linuxkm_pie_redirect_table.save_vector_registers_x86 = save_vector_registers_x86;
- #elif defined(WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS)
- #error WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS is set for an unsupported architecture.
- #endif /* WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS */
- wolfssl_linuxkm_pie_redirect_table.__mutex_init = __mutex_init;
- #if LINUX_VERSION_CODE < KERNEL_VERSION(4, 0, 0)
- wolfssl_linuxkm_pie_redirect_table.mutex_lock_nested = mutex_lock_nested;
- #else
- wolfssl_linuxkm_pie_redirect_table.mutex_lock = mutex_lock;
- #endif
- wolfssl_linuxkm_pie_redirect_table.mutex_unlock = mutex_unlock;
- #if LINUX_VERSION_CODE < KERNEL_VERSION(4, 0, 0)
- wolfssl_linuxkm_pie_redirect_table.mutex_destroy = mutex_destroy;
- #endif
- #ifdef HAVE_FIPS
- wolfssl_linuxkm_pie_redirect_table.wolfCrypt_FIPS_first =
- wolfCrypt_FIPS_first;
- wolfssl_linuxkm_pie_redirect_table.wolfCrypt_FIPS_last =
- wolfCrypt_FIPS_last;
- #if FIPS_VERSION3_GE(6,0,0)
- wolfssl_linuxkm_pie_redirect_table.wolfCrypt_FIPS_AES_sanity =
- wolfCrypt_FIPS_AES_sanity;
- wolfssl_linuxkm_pie_redirect_table.wolfCrypt_FIPS_CMAC_sanity =
- wolfCrypt_FIPS_CMAC_sanity;
- wolfssl_linuxkm_pie_redirect_table.wolfCrypt_FIPS_DH_sanity =
- wolfCrypt_FIPS_DH_sanity;
- wolfssl_linuxkm_pie_redirect_table.wolfCrypt_FIPS_ECC_sanity =
- wolfCrypt_FIPS_ECC_sanity;
- wolfssl_linuxkm_pie_redirect_table.wolfCrypt_FIPS_ED25519_sanity =
- wolfCrypt_FIPS_ED25519_sanity;
- wolfssl_linuxkm_pie_redirect_table.wolfCrypt_FIPS_ED448_sanity =
- wolfCrypt_FIPS_ED448_sanity;
- wolfssl_linuxkm_pie_redirect_table.wolfCrypt_FIPS_HMAC_sanity =
- wolfCrypt_FIPS_HMAC_sanity;
- wolfssl_linuxkm_pie_redirect_table.wolfCrypt_FIPS_KDF_sanity =
- wolfCrypt_FIPS_KDF_sanity;
- wolfssl_linuxkm_pie_redirect_table.wolfCrypt_FIPS_PBKDF_sanity =
- wolfCrypt_FIPS_PBKDF_sanity;
- wolfssl_linuxkm_pie_redirect_table.wolfCrypt_FIPS_DRBG_sanity =
- wolfCrypt_FIPS_DRBG_sanity;
- wolfssl_linuxkm_pie_redirect_table.wolfCrypt_FIPS_RSA_sanity =
- wolfCrypt_FIPS_RSA_sanity;
- wolfssl_linuxkm_pie_redirect_table.wolfCrypt_FIPS_SHA_sanity =
- wolfCrypt_FIPS_SHA_sanity;
- wolfssl_linuxkm_pie_redirect_table.wolfCrypt_FIPS_SHA256_sanity =
- wolfCrypt_FIPS_SHA256_sanity;
- wolfssl_linuxkm_pie_redirect_table.wolfCrypt_FIPS_SHA512_sanity =
- wolfCrypt_FIPS_SHA512_sanity;
- wolfssl_linuxkm_pie_redirect_table.wolfCrypt_FIPS_SHA3_sanity =
- wolfCrypt_FIPS_SHA3_sanity;
- wolfssl_linuxkm_pie_redirect_table.wolfCrypt_FIPS_FT_sanity =
- wolfCrypt_FIPS_FT_sanity;
- wolfssl_linuxkm_pie_redirect_table.wc_RunAllCast_fips =
- wc_RunAllCast_fips;
- #endif
- #endif
- #if !defined(WOLFCRYPT_ONLY) && !defined(NO_CERTS)
- wolfssl_linuxkm_pie_redirect_table.GetCA = GetCA;
- #ifndef NO_SKID
- wolfssl_linuxkm_pie_redirect_table.GetCAByName = GetCAByName;
- #ifdef HAVE_OCSP
- wolfssl_linuxkm_pie_redirect_table.GetCAByKeyHash = GetCAByKeyHash;
- #endif /* HAVE_OCSP */
- #endif /* NO_SKID */
- #ifdef WOLFSSL_AKID_NAME
- wolfssl_linuxkm_pie_redirect_table.GetCAByAKID = GetCAByAKID;
- #endif /* WOLFSSL_AKID_NAME */
- #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
- wolfssl_linuxkm_pie_redirect_table.wolfSSL_X509_NAME_add_entry_by_NID = wolfSSL_X509_NAME_add_entry_by_NID;
- wolfssl_linuxkm_pie_redirect_table.wolfSSL_X509_NAME_free = wolfSSL_X509_NAME_free;
- wolfssl_linuxkm_pie_redirect_table.wolfSSL_X509_NAME_new_ex = wolfSSL_X509_NAME_new_ex;
- #endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
- #endif /* !WOLFCRYPT_ONLY && !NO_CERTS */
- #ifdef WOLFSSL_DEBUG_BACKTRACE_ERROR_CODES
- wolfssl_linuxkm_pie_redirect_table.dump_stack = dump_stack;
- #endif
- /* runtime assert that the table has no null slots after initialization. */
- {
- unsigned long *i;
- static_assert(sizeof(unsigned long) == sizeof(void *),
- "unexpected pointer size");
- for (i = (unsigned long *)&wolfssl_linuxkm_pie_redirect_table;
- i < (unsigned long *)&wolfssl_linuxkm_pie_redirect_table._last_slot;
- ++i)
- if (*i == 0) {
- pr_err("wolfCrypt container redirect table initialization was "
- "incomplete [%lu].\n",
- i-(unsigned long *)&wolfssl_linuxkm_pie_redirect_table);
- return -EFAULT;
- }
- }
- return 0;
- }
- #endif /* USE_WOLFSSL_LINUXKM_PIE_REDIRECT_TABLE */
- #ifdef WOLFCRYPT_FIPS_CORE_DYNAMIC_HASH_VALUE
- #include <wolfssl/wolfcrypt/coding.h>
- PRAGMA_GCC_DIAG_PUSH
- PRAGMA_GCC("GCC diagnostic ignored \"-Wnested-externs\"")
- PRAGMA_GCC("GCC diagnostic ignored \"-Wpointer-arith\"")
- #include <crypto/hash.h>
- PRAGMA_GCC_DIAG_POP
- extern char verifyCore[WC_SHA256_DIGEST_SIZE*2 + 1];
- extern const char coreKey[WC_SHA256_DIGEST_SIZE*2 + 1];
- extern const unsigned int wolfCrypt_FIPS_ro_start[];
- extern const unsigned int wolfCrypt_FIPS_ro_end[];
- #define FIPS_IN_CORE_KEY_SZ 32
- #define FIPS_IN_CORE_VERIFY_SZ FIPS_IN_CORE_KEY_SZ
- typedef int (*fips_address_function)(void);
- #define MAX_FIPS_DATA_SZ 100000
- #define MAX_FIPS_CODE_SZ 1000000
- extern int GenBase16_Hash(const byte* in, int length, char* out, int outSz);
- static int updateFipsHash(void)
- {
- struct crypto_shash *tfm = NULL;
- struct shash_desc *desc = NULL;
- word32 verifySz = FIPS_IN_CORE_VERIFY_SZ;
- word32 binCoreSz = FIPS_IN_CORE_KEY_SZ;
- int ret;
- byte *hash = NULL;
- char *base16_hash = NULL;
- byte *binCoreKey = NULL;
- byte *binVerify = NULL;
- fips_address_function first = wolfCrypt_FIPS_first;
- fips_address_function last = wolfCrypt_FIPS_last;
- char* start = (char*)wolfCrypt_FIPS_ro_start;
- char* end = (char*)wolfCrypt_FIPS_ro_end;
- unsigned long code_sz = (unsigned long)last - (unsigned long)first;
- unsigned long data_sz = (unsigned long)end - (unsigned long)start;
- if (data_sz == 0 || data_sz > MAX_FIPS_DATA_SZ)
- return BAD_FUNC_ARG; /* bad fips data size */
- if (code_sz == 0 || code_sz > MAX_FIPS_CODE_SZ)
- return BAD_FUNC_ARG; /* bad fips code size */
- hash = XMALLOC(WC_SHA256_DIGEST_SIZE, 0, DYNAMIC_TYPE_TMP_BUFFER);
- if (hash == NULL) {
- ret = MEMORY_E;
- goto out;
- }
- base16_hash = XMALLOC(WC_SHA256_DIGEST_SIZE*2 + 1, 0, DYNAMIC_TYPE_TMP_BUFFER);
- if (base16_hash == NULL) {
- ret = MEMORY_E;
- goto out;
- }
- binCoreKey = XMALLOC(binCoreSz, 0, DYNAMIC_TYPE_TMP_BUFFER);
- if (binCoreKey == NULL) {
- ret = MEMORY_E;
- goto out;
- }
- binVerify = XMALLOC(verifySz, 0, DYNAMIC_TYPE_TMP_BUFFER);
- if (binVerify == NULL) {
- ret = MEMORY_E;
- goto out;
- }
- {
- word32 base16_out_len = binCoreSz;
- ret = Base16_Decode((const byte *)coreKey, sizeof coreKey - 1, binCoreKey, &base16_out_len);
- if (ret != 0) {
- pr_err("Base16_Decode for coreKey: %s\n", wc_GetErrorString(ret));
- goto out;
- }
- if (base16_out_len != binCoreSz) {
- pr_err("unexpected output length %u for coreKey from Base16_Decode.\n",base16_out_len);
- ret = BAD_STATE_E;
- goto out;
- }
- }
- tfm = crypto_alloc_shash("hmac(sha256)", 0, 0);
- if (IS_ERR(tfm)) {
- if (PTR_ERR(tfm) == -ENOMEM) {
- pr_err("crypto_alloc_shash failed: out of memory\n");
- ret = MEMORY_E;
- } else if (PTR_ERR(tfm) == -ENOENT) {
- pr_err("crypto_alloc_shash failed: kernel is missing hmac(sha256) implementation\n");
- pr_err("check for CONFIG_CRYPTO_SHA256 and CONFIG_CRYPTO_HMAC.\n");
- ret = NOT_COMPILED_IN;
- } else {
- pr_err("crypto_alloc_shash failed with ret %ld\n",PTR_ERR(tfm));
- ret = HASH_TYPE_E;
- }
- tfm = NULL;
- goto out;
- }
- {
- size_t desc_size = crypto_shash_descsize(tfm) + sizeof *desc;
- desc = XMALLOC(desc_size, NULL, DYNAMIC_TYPE_TMP_BUFFER);
- if (desc == NULL) {
- pr_err("failed allocating desc.");
- ret = MEMORY_E;
- goto out;
- }
- XMEMSET(desc, 0, desc_size);
- }
- ret = crypto_shash_setkey(tfm, binCoreKey, binCoreSz);
- if (ret) {
- pr_err("crypto_ahash_setkey failed: err %d\n", ret);
- ret = BAD_STATE_E;
- goto out;
- }
- desc->tfm = tfm;
- ret = crypto_shash_init(desc);
- if (ret) {
- pr_err("crypto_shash_init failed: err %d\n", ret);
- ret = BAD_STATE_E;
- goto out;
- }
- ret = crypto_shash_update(desc, (byte *)(wc_ptr_t)first, (word32)code_sz);
- if (ret) {
- pr_err("crypto_shash_update failed: err %d\n", ret);
- ret = BAD_STATE_E;
- goto out;
- }
- /* don't hash verifyCore or changing verifyCore will change hash */
- if (verifyCore >= start && verifyCore < end) {
- data_sz = (unsigned long)verifyCore - (unsigned long)start;
- ret = crypto_shash_update(desc, (byte*)start, (word32)data_sz);
- if (ret) {
- pr_err("crypto_shash_update failed: err %d\n", ret);
- ret = BAD_STATE_E;
- goto out;
- }
- start = (char*)verifyCore + sizeof(verifyCore);
- data_sz = (unsigned long)end - (unsigned long)start;
- }
- ret = crypto_shash_update(desc, (byte*)start, (word32)data_sz);
- if (ret) {
- pr_err("crypto_shash_update failed: err %d\n", ret);
- ret = BAD_STATE_E;
- goto out;
- }
- ret = crypto_shash_final(desc, hash);
- if (ret) {
- pr_err("crypto_shash_final failed: err %d\n", ret);
- ret = BAD_STATE_E;
- goto out;
- }
- ret = GenBase16_Hash(hash, WC_SHA256_DIGEST_SIZE, base16_hash, WC_SHA256_DIGEST_SIZE*2 + 1);
- if (ret != 0) {
- pr_err("GenBase16_Hash failed: %s\n", wc_GetErrorString(ret));
- goto out;
- }
- {
- word32 base16_out_len = verifySz;
- ret = Base16_Decode((const byte *)verifyCore, sizeof verifyCore - 1, binVerify, &base16_out_len);
- if (ret != 0) {
- pr_err("Base16_Decode for verifyCore: %s\n", wc_GetErrorString(ret));
- goto out;
- }
- if (base16_out_len != binCoreSz) {
- pr_err("unexpected output length %u for verifyCore from Base16_Decode.\n",base16_out_len);
- ret = BAD_STATE_E;
- goto out;
- }
- }
- if (XMEMCMP(hash, binVerify, WC_SHA256_DIGEST_SIZE) == 0) {
- #if defined(DEBUG_LINUXKM_PIE_SUPPORT) || defined(WOLFSSL_LINUXKM_VERBOSE_DEBUG)
- pr_info("updateFipsHash: verifyCore already matches [%s]\n", verifyCore);
- #else
- pr_info("updateFipsHash: verifyCore already matches.\n");
- #endif
- } else {
- XMEMCPY(verifyCore, base16_hash, WC_SHA256_DIGEST_SIZE*2 + 1);
- #if defined(DEBUG_LINUXKM_PIE_SUPPORT) || defined(WOLFSSL_LINUXKM_VERBOSE_DEBUG)
- pr_info("updateFipsHash: verifyCore updated [%s].\n", base16_hash);
- #else
- pr_info("updateFipsHash: verifyCore updated.\n");
- #endif
- }
- ret = 0;
- out:
- if (tfm != NULL)
- crypto_free_shash(tfm);
- XFREE(desc, NULL, DYNAMIC_TYPE_TMP_BUFFER);
- XFREE(hash, NULL, DYNAMIC_TYPE_TMP_BUFFER);
- XFREE(base16_hash, NULL, DYNAMIC_TYPE_TMP_BUFFER);
- XFREE(binCoreKey, NULL, DYNAMIC_TYPE_TMP_BUFFER);
- XFREE(binVerify, NULL, DYNAMIC_TYPE_TMP_BUFFER);
- return ret;
- }
- #endif /* WOLFCRYPT_FIPS_CORE_DYNAMIC_HASH_VALUE */
|