xref: /openbmc/linux/fs/verity/measure.c (revision 2612e3bbc0386368a850140a6c9b990cd496a5ec)
14dd893d8SEric Biggers // SPDX-License-Identifier: GPL-2.0
24dd893d8SEric Biggers /*
3ed45e201SEric Biggers  * Ioctl to get a verity file's digest
44dd893d8SEric Biggers  *
54dd893d8SEric Biggers  * Copyright 2019 Google LLC
64dd893d8SEric Biggers  */
74dd893d8SEric Biggers 
84dd893d8SEric Biggers #include "fsverity_private.h"
94dd893d8SEric Biggers 
104dd893d8SEric Biggers #include <linux/uaccess.h>
114dd893d8SEric Biggers 
124dd893d8SEric Biggers /**
13ed45e201SEric Biggers  * fsverity_ioctl_measure() - get a verity file's digest
14ed45e201SEric Biggers  * @filp: file to get digest of
156377a38bSEric Biggers  * @_uarg: user pointer to fsverity_digest
164dd893d8SEric Biggers  *
17ed45e201SEric Biggers  * Retrieve the file digest that the kernel is enforcing for reads from a verity
18ed45e201SEric Biggers  * file.  See the "FS_IOC_MEASURE_VERITY" section of
194dd893d8SEric Biggers  * Documentation/filesystems/fsverity.rst for the documentation.
204dd893d8SEric Biggers  *
214dd893d8SEric Biggers  * Return: 0 on success, -errno on failure
224dd893d8SEric Biggers  */
fsverity_ioctl_measure(struct file * filp,void __user * _uarg)234dd893d8SEric Biggers int fsverity_ioctl_measure(struct file *filp, void __user *_uarg)
244dd893d8SEric Biggers {
254dd893d8SEric Biggers 	const struct inode *inode = file_inode(filp);
264dd893d8SEric Biggers 	struct fsverity_digest __user *uarg = _uarg;
274dd893d8SEric Biggers 	const struct fsverity_info *vi;
284dd893d8SEric Biggers 	const struct fsverity_hash_alg *hash_alg;
294dd893d8SEric Biggers 	struct fsverity_digest arg;
304dd893d8SEric Biggers 
314dd893d8SEric Biggers 	vi = fsverity_get_info(inode);
324dd893d8SEric Biggers 	if (!vi)
334dd893d8SEric Biggers 		return -ENODATA; /* not a verity file */
344dd893d8SEric Biggers 	hash_alg = vi->tree_params.hash_alg;
354dd893d8SEric Biggers 
364dd893d8SEric Biggers 	/*
374dd893d8SEric Biggers 	 * The user specifies the digest_size their buffer has space for; we can
384dd893d8SEric Biggers 	 * return the digest if it fits in the available space.  We write back
394dd893d8SEric Biggers 	 * the actual size, which may be shorter than the user-specified size.
404dd893d8SEric Biggers 	 */
414dd893d8SEric Biggers 
424dd893d8SEric Biggers 	if (get_user(arg.digest_size, &uarg->digest_size))
434dd893d8SEric Biggers 		return -EFAULT;
444dd893d8SEric Biggers 	if (arg.digest_size < hash_alg->digest_size)
454dd893d8SEric Biggers 		return -EOVERFLOW;
464dd893d8SEric Biggers 
474dd893d8SEric Biggers 	memset(&arg, 0, sizeof(arg));
484dd893d8SEric Biggers 	arg.digest_algorithm = hash_alg - fsverity_hash_algs;
494dd893d8SEric Biggers 	arg.digest_size = hash_alg->digest_size;
504dd893d8SEric Biggers 
514dd893d8SEric Biggers 	if (copy_to_user(uarg, &arg, sizeof(arg)))
524dd893d8SEric Biggers 		return -EFAULT;
534dd893d8SEric Biggers 
54ed45e201SEric Biggers 	if (copy_to_user(uarg->digest, vi->file_digest, hash_alg->digest_size))
554dd893d8SEric Biggers 		return -EFAULT;
564dd893d8SEric Biggers 
574dd893d8SEric Biggers 	return 0;
584dd893d8SEric Biggers }
594dd893d8SEric Biggers EXPORT_SYMBOL_GPL(fsverity_ioctl_measure);
60246d9216SMimi Zohar 
61246d9216SMimi Zohar /**
62246d9216SMimi Zohar  * fsverity_get_digest() - get a verity file's digest
63246d9216SMimi Zohar  * @inode: inode to get digest of
64*74836ecbSEric Biggers  * @raw_digest: (out) the raw file digest
65*74836ecbSEric Biggers  * @alg: (out) the digest's algorithm, as a FS_VERITY_HASH_ALG_* value
66*74836ecbSEric Biggers  * @halg: (out) the digest's algorithm, as a HASH_ALGO_* value
67246d9216SMimi Zohar  *
68*74836ecbSEric Biggers  * Retrieves the fsverity digest of the given file.  The file must have been
69*74836ecbSEric Biggers  * opened at least once since the inode was last loaded into the inode cache;
70*74836ecbSEric Biggers  * otherwise this function will not recognize when fsverity is enabled.
71246d9216SMimi Zohar  *
72*74836ecbSEric Biggers  * The file's fsverity digest consists of @raw_digest in combination with either
73*74836ecbSEric Biggers  * @alg or @halg.  (The caller can choose which one of @alg or @halg to use.)
74*74836ecbSEric Biggers  *
75*74836ecbSEric Biggers  * IMPORTANT: Callers *must* make use of one of the two algorithm IDs, since
76*74836ecbSEric Biggers  * @raw_digest is meaningless without knowing which algorithm it uses!  fsverity
77*74836ecbSEric Biggers  * provides no security guarantee for users who ignore the algorithm ID, even if
78*74836ecbSEric Biggers  * they use the digest size (since algorithms can share the same digest size).
79*74836ecbSEric Biggers  *
80*74836ecbSEric Biggers  * Return: The size of the raw digest in bytes, or 0 if the file doesn't have
81*74836ecbSEric Biggers  *	   fsverity enabled.
82246d9216SMimi Zohar  */
fsverity_get_digest(struct inode * inode,u8 raw_digest[FS_VERITY_MAX_DIGEST_SIZE],u8 * alg,enum hash_algo * halg)83246d9216SMimi Zohar int fsverity_get_digest(struct inode *inode,
84*74836ecbSEric Biggers 			u8 raw_digest[FS_VERITY_MAX_DIGEST_SIZE],
85*74836ecbSEric Biggers 			u8 *alg, enum hash_algo *halg)
86246d9216SMimi Zohar {
87246d9216SMimi Zohar 	const struct fsverity_info *vi;
88246d9216SMimi Zohar 	const struct fsverity_hash_alg *hash_alg;
89246d9216SMimi Zohar 
90246d9216SMimi Zohar 	vi = fsverity_get_info(inode);
91246d9216SMimi Zohar 	if (!vi)
92*74836ecbSEric Biggers 		return 0; /* not a verity file */
93246d9216SMimi Zohar 
94246d9216SMimi Zohar 	hash_alg = vi->tree_params.hash_alg;
95*74836ecbSEric Biggers 	memcpy(raw_digest, vi->file_digest, hash_alg->digest_size);
96*74836ecbSEric Biggers 	if (alg)
97*74836ecbSEric Biggers 		*alg = hash_alg - fsverity_hash_algs;
98*74836ecbSEric Biggers 	if (halg)
99*74836ecbSEric Biggers 		*halg = hash_alg->algo_id;
100*74836ecbSEric Biggers 	return hash_alg->digest_size;
101246d9216SMimi Zohar }
102*74836ecbSEric Biggers EXPORT_SYMBOL_GPL(fsverity_get_digest);
103