public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* [PATCH] crypto: testmgr - block Crypto API xxhash64 in FIPS mode
@ 2026-03-03  6:05 Joachim Vandersmissen
  2026-03-03 15:09 ` Christoph Hellwig
  2026-03-14  5:11 ` Herbert Xu
  0 siblings, 2 replies; 9+ messages in thread
From: Joachim Vandersmissen @ 2026-03-03  6:05 UTC (permalink / raw)
  To: Herbert Xu, David S. Miller, Maxime Coquelin, Alexandre Torgue,
	linux-crypto, linux-stm32, linux-arm-kernel, linux-kernel
  Cc: Joachim Vandersmissen

xxhash64 is not a cryptographic hash algorithm, but is offered in the
same API (shash) as actual cryptographic hash algorithms such as
SHA-256. The Cryptographic Module Validation Program (CMVP), managing
FIPS certification, believes that this could cause confusion. xxhash64
must therefore be blocked in FIPS mode.

The only usage of xxhash64 in the kernel is btrfs. Commit fe11ac191ce0
("btrfs: switch to library APIs for checksums") recently modified the
btrfs code to use the lib/crypto API, avoiding the Kernel Cryptographic
API. Consequently, the removal of xxhash64 from the Crypto API in FIPS
mode should now have no impact on btrfs usage.

Signed-off-by: Joachim Vandersmissen <git@jvdsn.com>
---
 crypto/testmgr.c | 1 -
 1 file changed, 1 deletion(-)

diff --git a/crypto/testmgr.c b/crypto/testmgr.c
index 49b607f65f63..d7475d6000dd 100644
--- a/crypto/testmgr.c
+++ b/crypto/testmgr.c
@@ -5609,7 +5609,6 @@ static const struct alg_test_desc alg_test_descs[] = {
 #endif
 		.alg = "xxhash64",
 		.test = alg_test_hash,
-		.fips_allowed = 1,
 		.suite = {
 			.hash = __VECS(xxhash64_tv_template)
 		}
-- 
2.53.0


^ permalink raw reply related	[flat|nested] 9+ messages in thread

* Re: [PATCH] crypto: testmgr - block Crypto API xxhash64 in FIPS mode
  2026-03-03  6:05 [PATCH] crypto: testmgr - block Crypto API xxhash64 in FIPS mode Joachim Vandersmissen
@ 2026-03-03 15:09 ` Christoph Hellwig
  2026-03-03 19:31   ` Eric Biggers
  2026-03-14  5:11 ` Herbert Xu
  1 sibling, 1 reply; 9+ messages in thread
From: Christoph Hellwig @ 2026-03-03 15:09 UTC (permalink / raw)
  To: Joachim Vandersmissen
  Cc: Herbert Xu, David S. Miller, Maxime Coquelin, Alexandre Torgue,
	linux-crypto, linux-stm32, linux-arm-kernel, linux-kernel

On Tue, Mar 03, 2026 at 12:05:09AM -0600, Joachim Vandersmissen wrote:
> xxhash64 is not a cryptographic hash algorithm, but is offered in the
> same API (shash) as actual cryptographic hash algorithms such as
> SHA-256. The Cryptographic Module Validation Program (CMVP), managing
> FIPS certification, believes that this could cause confusion. xxhash64
> must therefore be blocked in FIPS mode.
> 
> The only usage of xxhash64 in the kernel is btrfs. Commit fe11ac191ce0
> ("btrfs: switch to library APIs for checksums") recently modified the
> btrfs code to use the lib/crypto API, avoiding the Kernel Cryptographic
> API. Consequently, the removal of xxhash64 from the Crypto API in FIPS
> mode should now have no impact on btrfs usage.

It sounds like xxhash should be removed the crypto API entirely.
There's no user of it, it's not crypto, and doing xxhash through
the userspace crypto API socket is so stupid that I doubt anyone
attempted it.


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH] crypto: testmgr - block Crypto API xxhash64 in FIPS mode
  2026-03-03 15:09 ` Christoph Hellwig
@ 2026-03-03 19:31   ` Eric Biggers
  2026-03-04  9:55     ` Milan Broz
  2026-03-04 13:09     ` Christoph Hellwig
  0 siblings, 2 replies; 9+ messages in thread
From: Eric Biggers @ 2026-03-03 19:31 UTC (permalink / raw)
  To: Christoph Hellwig
  Cc: Joachim Vandersmissen, Herbert Xu, David S. Miller,
	Maxime Coquelin, Alexandre Torgue, linux-crypto, linux-stm32,
	linux-arm-kernel, linux-kernel, dm-devel

[+Cc dm-devel@lists.linux.dev]

On Tue, Mar 03, 2026 at 07:09:26AM -0800, Christoph Hellwig wrote:
> On Tue, Mar 03, 2026 at 12:05:09AM -0600, Joachim Vandersmissen wrote:
> > xxhash64 is not a cryptographic hash algorithm, but is offered in the
> > same API (shash) as actual cryptographic hash algorithms such as
> > SHA-256. The Cryptographic Module Validation Program (CMVP), managing
> > FIPS certification, believes that this could cause confusion. xxhash64
> > must therefore be blocked in FIPS mode.
> > 
> > The only usage of xxhash64 in the kernel is btrfs. Commit fe11ac191ce0
> > ("btrfs: switch to library APIs for checksums") recently modified the
> > btrfs code to use the lib/crypto API, avoiding the Kernel Cryptographic
> > API. Consequently, the removal of xxhash64 from the Crypto API in FIPS
> > mode should now have no impact on btrfs usage.
> 
> It sounds like xxhash should be removed the crypto API entirely.
> There's no user of it, it's not crypto, and doing xxhash through
> the userspace crypto API socket is so stupid that I doubt anyone
> attempted it.

dm-integrity, which uses crypto_shash and accepts arbitrary hash
algorithm strings from userspace, might be relying on "xxhash64" being
supported in crypto_shash.  The integritysetup man page specifically
mentions xxhash64:

     --integrity, -I algorithm
         Use  internal  integrity  calculation (standalone mode). The integrity
         algorithm can be CRC (crc32c/crc32), a non-cryptographic hash function
         (xxhash64) or a hash function (sha1, sha256).

         For HMAC (hmac-sha256), you must specify  an  integrity  key  and  its
         size.

Maybe the device-mapper maintainers have some insight into whether
anyone is actually using xxhash64 with dm-integrity.

If yes, then dm-integrity could still switch to using the library API
for it.  dm-integrity would just need to gain some helper functions that
call either the xxhash64 library or crypto_shash depending on the
configured algorithm.  If the full set of algorithms being used can be
determined, then dm-integrity could even switch to the library APIs
entirely, like many other kernel subsystems such as btrfs have.

- Eric

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH] crypto: testmgr - block Crypto API xxhash64 in FIPS mode
  2026-03-03 19:31   ` Eric Biggers
@ 2026-03-04  9:55     ` Milan Broz
  2026-03-04 13:09     ` Christoph Hellwig
  1 sibling, 0 replies; 9+ messages in thread
From: Milan Broz @ 2026-03-04  9:55 UTC (permalink / raw)
  To: Eric Biggers, Christoph Hellwig
  Cc: Joachim Vandersmissen, Herbert Xu, David S. Miller,
	Maxime Coquelin, Alexandre Torgue, linux-crypto, linux-stm32,
	linux-arm-kernel, linux-kernel, dm-devel

On 3/3/26 8:31 PM, Eric Biggers wrote:
> 
> Maybe the device-mapper maintainers have some insight into whether
> anyone is actually using xxhash64 with dm-integrity.

Someone requested to mention it in integritysetup man page
   https://gitlab.com/cryptsetup/cryptsetup/-/issues/632

I think there were more reports people are using it in some specific cases.

Milan


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH] crypto: testmgr - block Crypto API xxhash64 in FIPS mode
  2026-03-03 19:31   ` Eric Biggers
  2026-03-04  9:55     ` Milan Broz
@ 2026-03-04 13:09     ` Christoph Hellwig
  2026-03-05  7:19       ` Joachim Vandersmissen
  1 sibling, 1 reply; 9+ messages in thread
From: Christoph Hellwig @ 2026-03-04 13:09 UTC (permalink / raw)
  To: Eric Biggers
  Cc: Christoph Hellwig, Joachim Vandersmissen, Herbert Xu,
	David S. Miller, Maxime Coquelin, Alexandre Torgue, linux-crypto,
	linux-stm32, linux-arm-kernel, linux-kernel, dm-devel

On Tue, Mar 03, 2026 at 11:31:02AM -0800, Eric Biggers wrote:
> > It sounds like xxhash should be removed the crypto API entirely.
> > There's no user of it, it's not crypto, and doing xxhash through
> > the userspace crypto API socket is so stupid that I doubt anyone
> > attempted it.
> 
> dm-integrity, which uses crypto_shash and accepts arbitrary hash
> algorithm strings from userspace, might be relying on "xxhash64" being
> supported in crypto_shash.  The integritysetup man page specifically
> mentions xxhash64:

Oh, ok.  So at least for now we need it, although it would be nice to
convert dm-integrity to lib/crypto/ and limit it to the advertised
algorithms (including xxhash).


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH] crypto: testmgr - block Crypto API xxhash64 in FIPS mode
  2026-03-04 13:09     ` Christoph Hellwig
@ 2026-03-05  7:19       ` Joachim Vandersmissen
  0 siblings, 0 replies; 9+ messages in thread
From: Joachim Vandersmissen @ 2026-03-05  7:19 UTC (permalink / raw)
  To: Christoph Hellwig, Eric Biggers
  Cc: Herbert Xu, David S. Miller, Maxime Coquelin, Alexandre Torgue,
	linux-crypto, linux-stm32, linux-arm-kernel, linux-kernel,
	dm-devel

Thanks for the discussion below, it sounds like I need to ensure 
dm-integrity can use lib/crypto (at least for xxhash64) before blocking 
it in the crypto API.

On 3/4/26 7:09 AM, Christoph Hellwig wrote:
> On Tue, Mar 03, 2026 at 11:31:02AM -0800, Eric Biggers wrote:
>>> It sounds like xxhash should be removed the crypto API entirely.
>>> There's no user of it, it's not crypto, and doing xxhash through
>>> the userspace crypto API socket is so stupid that I doubt anyone
>>> attempted it.
>> dm-integrity, which uses crypto_shash and accepts arbitrary hash
>> algorithm strings from userspace, might be relying on "xxhash64" being
>> supported in crypto_shash.  The integritysetup man page specifically
>> mentions xxhash64:
> Oh, ok.  So at least for now we need it, although it would be nice to
> convert dm-integrity to lib/crypto/ and limit it to the advertised
> algorithms (including xxhash).
>
>

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH] crypto: testmgr - block Crypto API xxhash64 in FIPS mode
  2026-03-03  6:05 [PATCH] crypto: testmgr - block Crypto API xxhash64 in FIPS mode Joachim Vandersmissen
  2026-03-03 15:09 ` Christoph Hellwig
@ 2026-03-14  5:11 ` Herbert Xu
  2026-03-15  0:43   ` Joachim Vandersmissen
  1 sibling, 1 reply; 9+ messages in thread
From: Herbert Xu @ 2026-03-14  5:11 UTC (permalink / raw)
  To: Joachim Vandersmissen
  Cc: David S. Miller, Maxime Coquelin, Alexandre Torgue, linux-crypto,
	linux-stm32, linux-arm-kernel, linux-kernel

On Tue, Mar 03, 2026 at 12:05:09AM -0600, Joachim Vandersmissen wrote:
> xxhash64 is not a cryptographic hash algorithm, but is offered in the
> same API (shash) as actual cryptographic hash algorithms such as
> SHA-256. The Cryptographic Module Validation Program (CMVP), managing
> FIPS certification, believes that this could cause confusion. xxhash64
> must therefore be blocked in FIPS mode.
> 
> The only usage of xxhash64 in the kernel is btrfs. Commit fe11ac191ce0
> ("btrfs: switch to library APIs for checksums") recently modified the
> btrfs code to use the lib/crypto API, avoiding the Kernel Cryptographic
> API. Consequently, the removal of xxhash64 from the Crypto API in FIPS
> mode should now have no impact on btrfs usage.
> 
> Signed-off-by: Joachim Vandersmissen <git@jvdsn.com>
> ---
>  crypto/testmgr.c | 1 -
>  1 file changed, 1 deletion(-)

Patch applied.  Thanks.
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH] crypto: testmgr - block Crypto API xxhash64 in FIPS mode
  2026-03-14  5:11 ` Herbert Xu
@ 2026-03-15  0:43   ` Joachim Vandersmissen
  2026-03-15  4:32     ` Herbert Xu
  0 siblings, 1 reply; 9+ messages in thread
From: Joachim Vandersmissen @ 2026-03-15  0:43 UTC (permalink / raw)
  To: Herbert Xu, Joachim Vandersmissen
  Cc: David S. Miller, Maxime Coquelin, Alexandre Torgue, linux-crypto,
	linux-stm32, linux-arm-kernel, linux-kernel

Hi Herbert,

I don't think this one can be applied yet since dm-integrity still uses 
xxhash64 through the crypto API. This would break fips=1 systems that 
use it.

Kind regards,
Joachim

On 3/14/26 12:11 AM, Herbert Xu wrote:
> On Tue, Mar 03, 2026 at 12:05:09AM -0600, Joachim Vandersmissen wrote:
>> xxhash64 is not a cryptographic hash algorithm, but is offered in the
>> same API (shash) as actual cryptographic hash algorithms such as
>> SHA-256. The Cryptographic Module Validation Program (CMVP), managing
>> FIPS certification, believes that this could cause confusion. xxhash64
>> must therefore be blocked in FIPS mode.
>>
>> The only usage of xxhash64 in the kernel is btrfs. Commit fe11ac191ce0
>> ("btrfs: switch to library APIs for checksums") recently modified the
>> btrfs code to use the lib/crypto API, avoiding the Kernel Cryptographic
>> API. Consequently, the removal of xxhash64 from the Crypto API in FIPS
>> mode should now have no impact on btrfs usage.
>>
>> Signed-off-by: Joachim Vandersmissen <git@jvdsn.com>
>> ---
>>   crypto/testmgr.c | 1 -
>>   1 file changed, 1 deletion(-)
> Patch applied.  Thanks.

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH] crypto: testmgr - block Crypto API xxhash64 in FIPS mode
  2026-03-15  0:43   ` Joachim Vandersmissen
@ 2026-03-15  4:32     ` Herbert Xu
  0 siblings, 0 replies; 9+ messages in thread
From: Herbert Xu @ 2026-03-15  4:32 UTC (permalink / raw)
  To: Joachim Vandersmissen
  Cc: David S. Miller, Maxime Coquelin, Alexandre Torgue, linux-crypto,
	linux-stm32, linux-arm-kernel, linux-kernel

On Sat, Mar 14, 2026 at 07:43:15PM -0500, Joachim Vandersmissen wrote:
> Hi Herbert,
> 
> I don't think this one can be applied yet since dm-integrity still uses
> xxhash64 through the crypto API. This would break fips=1 systems that use
> it.

OK I've removed the patch.

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2026-03-15  4:32 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-03-03  6:05 [PATCH] crypto: testmgr - block Crypto API xxhash64 in FIPS mode Joachim Vandersmissen
2026-03-03 15:09 ` Christoph Hellwig
2026-03-03 19:31   ` Eric Biggers
2026-03-04  9:55     ` Milan Broz
2026-03-04 13:09     ` Christoph Hellwig
2026-03-05  7:19       ` Joachim Vandersmissen
2026-03-14  5:11 ` Herbert Xu
2026-03-15  0:43   ` Joachim Vandersmissen
2026-03-15  4:32     ` Herbert Xu

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox