Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp2366626ybi; Thu, 20 Jun 2019 13:54:14 -0700 (PDT) X-Google-Smtp-Source: APXvYqyVx7vipYklYNA8WopwUwNjXtXKHvEwTQobN82d9iI+McuiVMezkP32O3Va4llHNAVUp+Bf X-Received: by 2002:a63:db05:: with SMTP id e5mr14480047pgg.121.1561064054747; Thu, 20 Jun 2019 13:54:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561064054; cv=none; d=google.com; s=arc-20160816; b=edk6UCYgbDx4fuaDvtxgGujBhfiBYdhQJL1fM01PEJd0zwgtwPr2YWw3gbn+2HqhkM 9cjL02tHzfZjfOpCreO6Tx2XVK26cgIimYCm+4y4wsXn9uo5lIjzbGfoT/i3Eeter9MA CnkFSLN8oPK/3FSjNkYIlMvfiVYQf0HNoQHdpAK2DcTHgLNLFX5EIMTEIMigvFgyKp+O qgqUFIZ9o/fxhk5XUp3jBWgqMn6ohAfkW0c5PALdmwkUAuCLCACo132BwnngvNrlQfVG jmnRxzQj4Up3Z5kV8kFkDAhvmmgKg9qT+kqZtC79wgWRoAwmmhrDZJE426k69rbA895a TKhw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=mKXcqUyjTlnFB6QB+5mj/urkNA6wnrL6yHcGNUuBZ3A=; b=JtJOjPgjqAIWYvrtI8mh6c7ars6EKISOTCLKef3MupbtGk41o6pXjm2ri3PY7O5/am keKMsq+EUTI/I2BSa5mdRN9/LubaWjGN0V4VlPyp2AtuUBUUlmTSLT8OScQ1UhQ97yHh tk1JxYXaHQqHyV5G6SmFyUyyFLFCS0nVdiL16pPv9KeL/ycBPKVv0t1E5PsRN/gZhTDk Tx0aEG4Ia673O+WWJLQKCdyWZyn85lORG4VUuqgGsuDQUfwMJTypXeBfDf6gbve7pHtb rscteSY9qiVLtedo/fjaiOzboLbBTPHBcHcPJ9R3Oh4mKoOtU38a6EsTsb7SBtV5NN3Z C3/g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2Mhg3yMA; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s34si746258pjc.2.2019.06.20.13.53.59; Thu, 20 Jun 2019 13:54:14 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2Mhg3yMA; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726521AbfFTUxv (ORCPT + 99 others); Thu, 20 Jun 2019 16:53:51 -0400 Received: from mail.kernel.org ([198.145.29.99]:56536 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726404AbfFTUxt (ORCPT ); Thu, 20 Jun 2019 16:53:49 -0400 Received: from ebiggers-linuxstation.mtv.corp.google.com (unknown [104.132.1.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9209221734; Thu, 20 Jun 2019 20:53:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1561064028; bh=w6zF//dEPtzFlVWdYC3PWn+VGS+6ez/U/hGbd39NKlE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=2Mhg3yMAbfnBphzMkvBPTFUX8up1GuFbUxz0TM1dOQyAvTPzzgOmU89AP95gJR2ZU qg5cisRr7Nhn9/vNufP1otqefxB78IqbnKP4kERCbEmtt9tV7IxUkys/+aSXUR4qz6 u2gLXWoMorRqAy5uxEKv4AHSrgdXmNgMdElb2ixE= From: Eric Biggers To: linux-fscrypt@vger.kernel.org Cc: linux-ext4@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net, linux-fsdevel@vger.kernel.org, linux-api@vger.kernel.org, linux-integrity@vger.kernel.org, Jaegeuk Kim , "Theodore Y . Ts'o" , Victor Hsieh , Chandan Rajendra , Dave Chinner , Christoph Hellwig , "Darrick J . Wong" , Linus Torvalds Subject: [PATCH v5 11/16] fs-verity: implement FS_IOC_MEASURE_VERITY ioctl Date: Thu, 20 Jun 2019 13:50:38 -0700 Message-Id: <20190620205043.64350-12-ebiggers@kernel.org> X-Mailer: git-send-email 2.22.0.410.gd8fdbe21b5-goog In-Reply-To: <20190620205043.64350-1-ebiggers@kernel.org> References: <20190620205043.64350-1-ebiggers@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org From: Eric Biggers Add a function for filesystems to call to implement the FS_IOC_MEASURE_VERITY ioctl. This ioctl retrieves the file measurement that fs-verity calculated for the given file and is enforcing for reads; i.e., reads that don't match this hash will fail. This ioctl can be used for authentication or logging of file measurements in userspace. See the "FS_IOC_MEASURE_VERITY" section of Documentation/filesystems/fsverity.rst for the documentation. Reviewed-by: Theodore Ts'o Signed-off-by: Eric Biggers --- fs/verity/Makefile | 1 + fs/verity/measure.c | 57 ++++++++++++++++++++++++++++++++++++++++ include/linux/fsverity.h | 11 ++++++++ 3 files changed, 69 insertions(+) create mode 100644 fs/verity/measure.c diff --git a/fs/verity/Makefile b/fs/verity/Makefile index 04b37475fd280a..6f7675ae0a3110 100644 --- a/fs/verity/Makefile +++ b/fs/verity/Makefile @@ -3,5 +3,6 @@ obj-$(CONFIG_FS_VERITY) += enable.o \ hash_algs.o \ init.o \ + measure.o \ open.o \ verify.o diff --git a/fs/verity/measure.c b/fs/verity/measure.c new file mode 100644 index 00000000000000..05049b68c74553 --- /dev/null +++ b/fs/verity/measure.c @@ -0,0 +1,57 @@ +// SPDX-License-Identifier: GPL-2.0 +/* + * fs/verity/measure.c: ioctl to get a verity file's measurement + * + * Copyright 2019 Google LLC + */ + +#include "fsverity_private.h" + +#include + +/** + * fsverity_ioctl_measure() - get a verity file's measurement + * + * Retrieve the file measurement that the kernel is enforcing for reads from a + * verity file. See the "FS_IOC_MEASURE_VERITY" section of + * Documentation/filesystems/fsverity.rst for the documentation. + * + * Return: 0 on success, -errno on failure + */ +int fsverity_ioctl_measure(struct file *filp, void __user *_uarg) +{ + const struct inode *inode = file_inode(filp); + struct fsverity_digest __user *uarg = _uarg; + const struct fsverity_info *vi; + const struct fsverity_hash_alg *hash_alg; + struct fsverity_digest arg; + + vi = fsverity_get_info(inode); + if (!vi) + return -ENODATA; /* not a verity file */ + hash_alg = vi->tree_params.hash_alg; + + /* + * The user specifies the digest_size their buffer has space for; we can + * return the digest if it fits in the available space. We write back + * the actual size, which may be shorter than the user-specified size. + */ + + if (get_user(arg.digest_size, &uarg->digest_size)) + return -EFAULT; + if (arg.digest_size < hash_alg->digest_size) + return -EOVERFLOW; + + memset(&arg, 0, sizeof(arg)); + arg.digest_algorithm = hash_alg - fsverity_hash_algs; + arg.digest_size = hash_alg->digest_size; + + if (copy_to_user(uarg, &arg, sizeof(arg))) + return -EFAULT; + + if (copy_to_user(uarg->digest, vi->measurement, hash_alg->digest_size)) + return -EFAULT; + + return 0; +} +EXPORT_SYMBOL_GPL(fsverity_ioctl_measure); diff --git a/include/linux/fsverity.h b/include/linux/fsverity.h index 7ef2ef82653409..247359c86b72e0 100644 --- a/include/linux/fsverity.h +++ b/include/linux/fsverity.h @@ -116,6 +116,10 @@ static inline struct fsverity_info *fsverity_get_info(const struct inode *inode) extern int fsverity_ioctl_enable(struct file *filp, const void __user *arg); +/* measure.c */ + +extern int fsverity_ioctl_measure(struct file *filp, void __user *arg); + /* open.c */ extern int fsverity_file_open(struct inode *inode, struct file *filp); @@ -143,6 +147,13 @@ static inline int fsverity_ioctl_enable(struct file *filp, return -EOPNOTSUPP; } +/* measure.c */ + +static inline int fsverity_ioctl_measure(struct file *filp, void __user *arg) +{ + return -EOPNOTSUPP; +} + /* open.c */ static inline int fsverity_file_open(struct inode *inode, struct file *filp) -- 2.22.0.410.gd8fdbe21b5-goog