14dd893d8SEric Biggers // SPDX-License-Identifier: GPL-2.0
24dd893d8SEric Biggers /*
3ed45e201SEric Biggers * Ioctl to get a verity file's digest
44dd893d8SEric Biggers *
54dd893d8SEric Biggers * Copyright 2019 Google LLC
64dd893d8SEric Biggers */
74dd893d8SEric Biggers
84dd893d8SEric Biggers #include "fsverity_private.h"
94dd893d8SEric Biggers
104dd893d8SEric Biggers #include <linux/uaccess.h>
114dd893d8SEric Biggers
124dd893d8SEric Biggers /**
13ed45e201SEric Biggers * fsverity_ioctl_measure() - get a verity file's digest
14ed45e201SEric Biggers * @filp: file to get digest of
156377a38bSEric Biggers * @_uarg: user pointer to fsverity_digest
164dd893d8SEric Biggers *
17ed45e201SEric Biggers * Retrieve the file digest that the kernel is enforcing for reads from a verity
18ed45e201SEric Biggers * file. See the "FS_IOC_MEASURE_VERITY" section of
194dd893d8SEric Biggers * Documentation/filesystems/fsverity.rst for the documentation.
204dd893d8SEric Biggers *
214dd893d8SEric Biggers * Return: 0 on success, -errno on failure
224dd893d8SEric Biggers */
fsverity_ioctl_measure(struct file * filp,void __user * _uarg)234dd893d8SEric Biggers int fsverity_ioctl_measure(struct file *filp, void __user *_uarg)
244dd893d8SEric Biggers {
254dd893d8SEric Biggers const struct inode *inode = file_inode(filp);
264dd893d8SEric Biggers struct fsverity_digest __user *uarg = _uarg;
274dd893d8SEric Biggers const struct fsverity_info *vi;
284dd893d8SEric Biggers const struct fsverity_hash_alg *hash_alg;
294dd893d8SEric Biggers struct fsverity_digest arg;
304dd893d8SEric Biggers
314dd893d8SEric Biggers vi = fsverity_get_info(inode);
324dd893d8SEric Biggers if (!vi)
334dd893d8SEric Biggers return -ENODATA; /* not a verity file */
344dd893d8SEric Biggers hash_alg = vi->tree_params.hash_alg;
354dd893d8SEric Biggers
364dd893d8SEric Biggers /*
374dd893d8SEric Biggers * The user specifies the digest_size their buffer has space for; we can
384dd893d8SEric Biggers * return the digest if it fits in the available space. We write back
394dd893d8SEric Biggers * the actual size, which may be shorter than the user-specified size.
404dd893d8SEric Biggers */
414dd893d8SEric Biggers
424dd893d8SEric Biggers if (get_user(arg.digest_size, &uarg->digest_size))
434dd893d8SEric Biggers return -EFAULT;
444dd893d8SEric Biggers if (arg.digest_size < hash_alg->digest_size)
454dd893d8SEric Biggers return -EOVERFLOW;
464dd893d8SEric Biggers
474dd893d8SEric Biggers memset(&arg, 0, sizeof(arg));
484dd893d8SEric Biggers arg.digest_algorithm = hash_alg - fsverity_hash_algs;
494dd893d8SEric Biggers arg.digest_size = hash_alg->digest_size;
504dd893d8SEric Biggers
514dd893d8SEric Biggers if (copy_to_user(uarg, &arg, sizeof(arg)))
524dd893d8SEric Biggers return -EFAULT;
534dd893d8SEric Biggers
54ed45e201SEric Biggers if (copy_to_user(uarg->digest, vi->file_digest, hash_alg->digest_size))
554dd893d8SEric Biggers return -EFAULT;
564dd893d8SEric Biggers
574dd893d8SEric Biggers return 0;
584dd893d8SEric Biggers }
594dd893d8SEric Biggers EXPORT_SYMBOL_GPL(fsverity_ioctl_measure);
60246d9216SMimi Zohar
61246d9216SMimi Zohar /**
62246d9216SMimi Zohar * fsverity_get_digest() - get a verity file's digest
63246d9216SMimi Zohar * @inode: inode to get digest of
64*74836ecbSEric Biggers * @raw_digest: (out) the raw file digest
65*74836ecbSEric Biggers * @alg: (out) the digest's algorithm, as a FS_VERITY_HASH_ALG_* value
66*74836ecbSEric Biggers * @halg: (out) the digest's algorithm, as a HASH_ALGO_* value
67246d9216SMimi Zohar *
68*74836ecbSEric Biggers * Retrieves the fsverity digest of the given file. The file must have been
69*74836ecbSEric Biggers * opened at least once since the inode was last loaded into the inode cache;
70*74836ecbSEric Biggers * otherwise this function will not recognize when fsverity is enabled.
71246d9216SMimi Zohar *
72*74836ecbSEric Biggers * The file's fsverity digest consists of @raw_digest in combination with either
73*74836ecbSEric Biggers * @alg or @halg. (The caller can choose which one of @alg or @halg to use.)
74*74836ecbSEric Biggers *
75*74836ecbSEric Biggers * IMPORTANT: Callers *must* make use of one of the two algorithm IDs, since
76*74836ecbSEric Biggers * @raw_digest is meaningless without knowing which algorithm it uses! fsverity
77*74836ecbSEric Biggers * provides no security guarantee for users who ignore the algorithm ID, even if
78*74836ecbSEric Biggers * they use the digest size (since algorithms can share the same digest size).
79*74836ecbSEric Biggers *
80*74836ecbSEric Biggers * Return: The size of the raw digest in bytes, or 0 if the file doesn't have
81*74836ecbSEric Biggers * fsverity enabled.
82246d9216SMimi Zohar */
fsverity_get_digest(struct inode * inode,u8 raw_digest[FS_VERITY_MAX_DIGEST_SIZE],u8 * alg,enum hash_algo * halg)83246d9216SMimi Zohar int fsverity_get_digest(struct inode *inode,
84*74836ecbSEric Biggers u8 raw_digest[FS_VERITY_MAX_DIGEST_SIZE],
85*74836ecbSEric Biggers u8 *alg, enum hash_algo *halg)
86246d9216SMimi Zohar {
87246d9216SMimi Zohar const struct fsverity_info *vi;
88246d9216SMimi Zohar const struct fsverity_hash_alg *hash_alg;
89246d9216SMimi Zohar
90246d9216SMimi Zohar vi = fsverity_get_info(inode);
91246d9216SMimi Zohar if (!vi)
92*74836ecbSEric Biggers return 0; /* not a verity file */
93246d9216SMimi Zohar
94246d9216SMimi Zohar hash_alg = vi->tree_params.hash_alg;
95*74836ecbSEric Biggers memcpy(raw_digest, vi->file_digest, hash_alg->digest_size);
96*74836ecbSEric Biggers if (alg)
97*74836ecbSEric Biggers *alg = hash_alg - fsverity_hash_algs;
98*74836ecbSEric Biggers if (halg)
99*74836ecbSEric Biggers *halg = hash_alg->algo_id;
100*74836ecbSEric Biggers return hash_alg->digest_size;
101246d9216SMimi Zohar }
102*74836ecbSEric Biggers EXPORT_SYMBOL_GPL(fsverity_get_digest);
103