Message ID | 20190620205043.64350-11-ebiggers@kernel.org (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
Series | fs-verity: read-only file-based authenticity protection | expand |
On 06/20, Eric Biggers wrote: > From: Eric Biggers <ebiggers@google.com> > > Add a function for filesystems to call to implement the > FS_IOC_ENABLE_VERITY ioctl. This ioctl enables fs-verity on a file. > > See the "FS_IOC_ENABLE_VERITY" section of > Documentation/filesystems/fsverity.rst for the documentation. > Reviewed-by: Jaegeuk Kim <jaegeuk@kernel.org> > Signed-off-by: Eric Biggers <ebiggers@google.com> > --- > fs/verity/Makefile | 3 +- > fs/verity/enable.c | 341 +++++++++++++++++++++++++++++++++++++++ > include/linux/fsverity.h | 64 ++++++++ > 3 files changed, 407 insertions(+), 1 deletion(-) > create mode 100644 fs/verity/enable.c > > diff --git a/fs/verity/Makefile b/fs/verity/Makefile > index 7fa628cd5eba24..04b37475fd280a 100644 > --- a/fs/verity/Makefile > +++ b/fs/verity/Makefile > @@ -1,6 +1,7 @@ > # SPDX-License-Identifier: GPL-2.0 > > -obj-$(CONFIG_FS_VERITY) += hash_algs.o \ > +obj-$(CONFIG_FS_VERITY) += enable.o \ > + hash_algs.o \ > init.o \ > open.o \ > verify.o > diff --git a/fs/verity/enable.c b/fs/verity/enable.c > new file mode 100644 > index 00000000000000..144721bbe4aab9 > --- /dev/null > +++ b/fs/verity/enable.c > @@ -0,0 +1,341 @@ > +// SPDX-License-Identifier: GPL-2.0 > +/* > + * fs/verity/enable.c: ioctl to enable verity on a file > + * > + * Copyright 2019 Google LLC > + */ > + > +#include "fsverity_private.h" > + > +#include <crypto/hash.h> > +#include <linux/mount.h> > +#include <linux/pagemap.h> > +#include <linux/sched/signal.h> > +#include <linux/uaccess.h> > + > +static int build_merkle_tree_level(struct inode *inode, unsigned int level, > + u64 num_blocks_to_hash, > + const struct merkle_tree_params *params, > + u8 *pending_hashes, > + struct ahash_request *req) > +{ > + const struct fsverity_operations *vops = inode->i_sb->s_vop; > + unsigned int pending_size = 0; > + u64 dst_block_num; > + u64 i; > + int err; > + > + if (WARN_ON(params->block_size != PAGE_SIZE)) /* checked earlier too */ > + return -EINVAL; > + > + if (level < params->num_levels) { > + dst_block_num = params->level_start[level]; > + } else { > + if (WARN_ON(num_blocks_to_hash != 1)) > + return -EINVAL; > + dst_block_num = 0; /* unused */ > + } > + > + for (i = 0; i < num_blocks_to_hash; i++) { > + struct page *src_page; > + > + if ((pgoff_t)i % 10000 == 0 || i + 1 == num_blocks_to_hash) > + pr_debug("Hashing block %llu of %llu for level %u\n", > + i + 1, num_blocks_to_hash, level); > + > + if (level == 0) > + /* Leaf: hashing a data block */ > + src_page = read_mapping_page(inode->i_mapping, i, NULL); > + else > + /* Non-leaf: hashing hash block from level below */ > + src_page = vops->read_merkle_tree_page(inode, > + params->level_start[level - 1] + i); > + if (IS_ERR(src_page)) { > + err = PTR_ERR(src_page); > + fsverity_err(inode, > + "Error %d reading Merkle tree page %llu", > + err, params->level_start[level - 1] + i); > + return err; > + } > + > + err = fsverity_hash_page(params, inode, req, src_page, > + &pending_hashes[pending_size]); > + put_page(src_page); > + if (err) > + return err; > + pending_size += params->digest_size; > + > + if (level == params->num_levels) /* Root hash? */ > + return 0; > + > + if (pending_size + params->digest_size > params->block_size || > + i + 1 == num_blocks_to_hash) { > + /* Flush the pending hash block */ > + memset(&pending_hashes[pending_size], 0, > + params->block_size - pending_size); > + err = vops->write_merkle_tree_block(inode, > + pending_hashes, > + dst_block_num, > + params->log_blocksize); > + if (err) { > + fsverity_err(inode, > + "Error %d writing Merkle tree block %llu", > + err, dst_block_num); > + return err; > + } > + dst_block_num++; > + pending_size = 0; > + } > + > + if (fatal_signal_pending(current)) > + return -EINTR; > + cond_resched(); > + } > + return 0; > +} > + > +/* > + * Build the Merkle tree for the given inode using the given parameters, and > + * return the root hash in @root_hash. > + * > + * The tree is written to a filesystem-specific location as determined by the > + * ->write_merkle_tree_block() method. However, the blocks that comprise the > + * tree are the same for all filesystems. > + */ > +static int build_merkle_tree(struct inode *inode, > + const struct merkle_tree_params *params, > + u8 *root_hash) > +{ > + u8 *pending_hashes; > + struct ahash_request *req; > + u64 blocks; > + unsigned int level; > + int err = -ENOMEM; > + > + if (inode->i_size == 0) { > + /* Empty file is a special case; root hash is all 0's */ > + memset(root_hash, 0, params->digest_size); > + return 0; > + } > + > + pending_hashes = kmalloc(params->block_size, GFP_KERNEL); > + req = ahash_request_alloc(params->hash_alg->tfm, GFP_KERNEL); > + if (!pending_hashes || !req) > + goto out; > + > + /* > + * Build each level of the Merkle tree, starting at the leaf level > + * (level 0) and ascending to the root node (level 'num_levels - 1'). > + * Then at the end (level 'num_levels'), calculate the root hash. > + */ > + blocks = (inode->i_size + params->block_size - 1) >> > + params->log_blocksize; > + for (level = 0; level <= params->num_levels; level++) { > + err = build_merkle_tree_level(inode, level, blocks, params, > + pending_hashes, req); > + if (err) > + goto out; > + blocks = (blocks + params->hashes_per_block - 1) >> > + params->log_arity; > + } > + memcpy(root_hash, pending_hashes, params->digest_size); > + err = 0; > +out: > + kfree(pending_hashes); > + ahash_request_free(req); > + return err; > +} > + > +static int enable_verity(struct file *filp, > + const struct fsverity_enable_arg *arg) > +{ > + struct inode *inode = file_inode(filp); > + const struct fsverity_operations *vops = inode->i_sb->s_vop; > + struct merkle_tree_params params = { }; > + struct fsverity_descriptor *desc; > + size_t desc_size = sizeof(*desc); > + struct fsverity_info *vi; > + int err; > + > + /* Start initializing the fsverity_descriptor */ > + desc = kzalloc(desc_size, GFP_KERNEL); > + if (!desc) > + return -ENOMEM; > + desc->version = 1; > + desc->hash_algorithm = arg->hash_algorithm; > + desc->log_blocksize = ilog2(arg->block_size); > + > + /* Get the salt if the user provided one */ > + if (arg->salt_size && > + copy_from_user(desc->salt, > + (const u8 __user *)(uintptr_t)arg->salt_ptr, > + arg->salt_size)) { > + err = -EFAULT; > + goto out; > + } > + desc->salt_size = arg->salt_size; > + > + desc->data_size = cpu_to_le64(inode->i_size); > + > + pr_debug("Building Merkle tree...\n"); > + > + /* Prepare the Merkle tree parameters */ > + err = fsverity_init_merkle_tree_params(¶ms, inode, > + arg->hash_algorithm, > + desc->log_blocksize, > + desc->salt, desc->salt_size); > + if (err) > + goto out; > + > + /* Tell the filesystem that verity is being enabled on the file */ > + err = vops->begin_enable_verity(filp); > + if (err) > + goto out; > + > + /* Build the Merkle tree */ > + BUILD_BUG_ON(sizeof(desc->root_hash) < FS_VERITY_MAX_DIGEST_SIZE); > + err = build_merkle_tree(inode, ¶ms, desc->root_hash); > + if (err) { > + fsverity_err(inode, "Error %d building Merkle tree", err); > + goto rollback; > + } > + pr_debug("Done building Merkle tree. Root hash is %s:%*phN\n", > + params.hash_alg->name, params.digest_size, desc->root_hash); > + > + /* > + * Create the fsverity_info. Don't bother trying to save work by > + * reusing the merkle_tree_params from above. Instead, just create the > + * fsverity_info from the fsverity_descriptor as if it were just loaded > + * from disk. This is simpler, and it serves as an extra check that the > + * metadata we're writing is valid before actually enabling verity. > + */ > + vi = fsverity_create_info(inode, desc, desc_size); > + if (IS_ERR(vi)) { > + err = PTR_ERR(vi); > + goto rollback; > + } > + > + /* Tell the filesystem to finish enabling verity on the file */ > + err = vops->end_enable_verity(filp, desc, desc_size, params.tree_size); > + if (err) { > + fsverity_err(inode, "%ps() failed with err %d", > + vops->end_enable_verity, err); > + fsverity_free_info(vi); > + } else if (WARN_ON(!IS_VERITY(inode))) { > + err = -EINVAL; > + fsverity_free_info(vi); > + } else { > + /* Successfully enabled verity */ > + > + /* > + * Readers can start using ->i_verity_info immediately, so it > + * can't be rolled back once set. So don't set it until just > + * after the filesystem has successfully enabled verity. > + */ > + fsverity_set_info(inode, vi); > + } > +out: > + kfree(params.hashstate); > + kfree(desc); > + return err; > + > +rollback: > + (void)vops->end_enable_verity(filp, NULL, 0, params.tree_size); > + goto out; > +} > + > +/** > + * fsverity_ioctl_enable() - enable verity on a file > + * > + * Enable fs-verity on a file. See the "FS_IOC_ENABLE_VERITY" section of > + * Documentation/filesystems/fsverity.rst for the documentation. > + * > + * Return: 0 on success, -errno on failure > + */ > +int fsverity_ioctl_enable(struct file *filp, const void __user *uarg) > +{ > + struct inode *inode = file_inode(filp); > + struct fsverity_enable_arg arg; > + int err; > + > + if (copy_from_user(&arg, uarg, sizeof(arg))) > + return -EFAULT; > + > + if (arg.version != 1) > + return -EINVAL; > + > + if (arg.__reserved1 || > + memchr_inv(arg.__reserved2, 0, sizeof(arg.__reserved2))) > + return -EINVAL; > + > + if (arg.block_size != PAGE_SIZE) > + return -EINVAL; > + > + if (arg.salt_size > FIELD_SIZEOF(struct fsverity_descriptor, salt)) > + return -EMSGSIZE; > + > + if (arg.sig_size) > + return -EINVAL; > + > + /* > + * Require a regular file with write access. But the actual fd must > + * still be readonly so that we can lock out all writers. This is > + * needed to guarantee that no writable fds exist to the file once it > + * has verity enabled, and to stabilize the data being hashed. > + */ > + > + err = inode_permission(inode, MAY_WRITE); > + if (err) > + return err; > + > + if (IS_APPEND(inode)) > + return -EPERM; > + > + if (S_ISDIR(inode->i_mode)) > + return -EISDIR; > + > + if (!S_ISREG(inode->i_mode)) > + return -EINVAL; > + > + err = mnt_want_write_file(filp); > + if (err) /* -EROFS */ > + return err; > + > + err = deny_write_access(filp); > + if (err) /* -ETXTBSY */ > + goto out_drop_write; > + > + inode_lock(inode); > + > + if (IS_VERITY(inode)) { > + err = -EEXIST; > + goto out_unlock; > + } > + > + err = enable_verity(filp, &arg); > + if (err) > + goto out_unlock; > + > + /* > + * Some pages of the file may have been evicted from pagecache after > + * being used in the Merkle tree construction, then read into pagecache > + * again by another process reading from the file concurrently. Since > + * these pages didn't undergo verification against the file measurement > + * which fs-verity now claims to be enforcing, we have to wipe the > + * pagecache to ensure that all future reads are verified. > + */ > + filemap_write_and_wait(inode->i_mapping); > + truncate_inode_pages(inode->i_mapping, 0); > + > + /* > + * allow_write_access() is needed to pair with deny_write_access(). > + * Regardless, the filesystem won't allow writing to verity files. > + */ > +out_unlock: > + inode_unlock(inode); > + allow_write_access(filp); > +out_drop_write: > + mnt_drop_write_file(filp); > + return err; > +} > +EXPORT_SYMBOL_GPL(fsverity_ioctl_enable); > diff --git a/include/linux/fsverity.h b/include/linux/fsverity.h > index ecd47e748c7f64..7ef2ef82653409 100644 > --- a/include/linux/fsverity.h > +++ b/include/linux/fsverity.h > @@ -17,6 +17,42 @@ > /* Verity operations for filesystems */ > struct fsverity_operations { > > + /** > + * Begin enabling verity on the given file. > + * > + * @filp: a readonly file descriptor for the file > + * > + * The filesystem must do any needed filesystem-specific preparations > + * for enabling verity, e.g. evicting inline data. > + * > + * i_rwsem is held for write. > + * > + * Return: 0 on success, -errno on failure > + */ > + int (*begin_enable_verity)(struct file *filp); > + > + /** > + * End enabling verity on the given file. > + * > + * @filp: a readonly file descriptor for the file > + * @desc: the verity descriptor to write, or NULL on failure > + * @desc_size: size of verity descriptor, or 0 on failure > + * @merkle_tree_size: total bytes the Merkle tree took up > + * > + * If desc == NULL, then enabling verity failed and the filesystem only > + * must do any necessary cleanups. Else, it must also store the given > + * verity descriptor to a fs-specific location associated with the inode > + * and do any fs-specific actions needed to mark the inode as a verity > + * inode, e.g. setting a bit in the on-disk inode. The filesystem is > + * also responsible for setting the S_VERITY flag in the VFS inode. > + * > + * i_rwsem is held for write. > + * > + * Return: 0 on success, -errno on failure > + */ > + int (*end_enable_verity)(struct file *filp, const void *desc, > + size_t desc_size, u64 merkle_tree_size); > + > /** > * Get the verity descriptor of the given inode. > * > @@ -50,6 +86,22 @@ struct fsverity_operations { > */ > struct page *(*read_merkle_tree_page)(struct inode *inode, > pgoff_t index); > + > + /** > + * Write a Merkle tree block to the given inode. > + * > + * @inode: the inode for which the Merkle tree is being built > + * @buf: block to write > + * @index: 0-based index of the block within the Merkle tree > + * @log_blocksize: log base 2 of the Merkle tree block size > + * > + * This is only called between ->begin_enable_verity() and > + * ->end_enable_verity(). i_rwsem is held for write. > + * > + * Return: 0 on success, -errno on failure > + */ > + int (*write_merkle_tree_block)(struct inode *inode, const void *buf, > + u64 index, int log_blocksize); > }; > > #ifdef CONFIG_FS_VERITY > @@ -60,6 +112,10 @@ static inline struct fsverity_info *fsverity_get_info(const struct inode *inode) > return READ_ONCE(inode->i_verity_info); > } > > +/* enable.c */ > + > +extern int fsverity_ioctl_enable(struct file *filp, const void __user *arg); > + > /* open.c */ > > extern int fsverity_file_open(struct inode *inode, struct file *filp); > @@ -79,6 +135,14 @@ static inline struct fsverity_info *fsverity_get_info(const struct inode *inode) > return NULL; > } > > +/* enable.c */ > + > +static inline int fsverity_ioctl_enable(struct file *filp, > + const void __user *arg) > +{ > + return -EOPNOTSUPP; > +} > + > /* open.c */ > > static inline int fsverity_file_open(struct inode *inode, struct file *filp) > -- > 2.22.0.410.gd8fdbe21b5-goog
diff --git a/fs/verity/Makefile b/fs/verity/Makefile index 7fa628cd5eba24..04b37475fd280a 100644 --- a/fs/verity/Makefile +++ b/fs/verity/Makefile @@ -1,6 +1,7 @@ # SPDX-License-Identifier: GPL-2.0 -obj-$(CONFIG_FS_VERITY) += hash_algs.o \ +obj-$(CONFIG_FS_VERITY) += enable.o \ + hash_algs.o \ init.o \ open.o \ verify.o diff --git a/fs/verity/enable.c b/fs/verity/enable.c new file mode 100644 index 00000000000000..144721bbe4aab9 --- /dev/null +++ b/fs/verity/enable.c @@ -0,0 +1,341 @@ +// SPDX-License-Identifier: GPL-2.0 +/* + * fs/verity/enable.c: ioctl to enable verity on a file + * + * Copyright 2019 Google LLC + */ + +#include "fsverity_private.h" + +#include <crypto/hash.h> +#include <linux/mount.h> +#include <linux/pagemap.h> +#include <linux/sched/signal.h> +#include <linux/uaccess.h> + +static int build_merkle_tree_level(struct inode *inode, unsigned int level, + u64 num_blocks_to_hash, + const struct merkle_tree_params *params, + u8 *pending_hashes, + struct ahash_request *req) +{ + const struct fsverity_operations *vops = inode->i_sb->s_vop; + unsigned int pending_size = 0; + u64 dst_block_num; + u64 i; + int err; + + if (WARN_ON(params->block_size != PAGE_SIZE)) /* checked earlier too */ + return -EINVAL; + + if (level < params->num_levels) { + dst_block_num = params->level_start[level]; + } else { + if (WARN_ON(num_blocks_to_hash != 1)) + return -EINVAL; + dst_block_num = 0; /* unused */ + } + + for (i = 0; i < num_blocks_to_hash; i++) { + struct page *src_page; + + if ((pgoff_t)i % 10000 == 0 || i + 1 == num_blocks_to_hash) + pr_debug("Hashing block %llu of %llu for level %u\n", + i + 1, num_blocks_to_hash, level); + + if (level == 0) + /* Leaf: hashing a data block */ + src_page = read_mapping_page(inode->i_mapping, i, NULL); + else + /* Non-leaf: hashing hash block from level below */ + src_page = vops->read_merkle_tree_page(inode, + params->level_start[level - 1] + i); + if (IS_ERR(src_page)) { + err = PTR_ERR(src_page); + fsverity_err(inode, + "Error %d reading Merkle tree page %llu", + err, params->level_start[level - 1] + i); + return err; + } + + err = fsverity_hash_page(params, inode, req, src_page, + &pending_hashes[pending_size]); + put_page(src_page); + if (err) + return err; + pending_size += params->digest_size; + + if (level == params->num_levels) /* Root hash? */ + return 0; + + if (pending_size + params->digest_size > params->block_size || + i + 1 == num_blocks_to_hash) { + /* Flush the pending hash block */ + memset(&pending_hashes[pending_size], 0, + params->block_size - pending_size); + err = vops->write_merkle_tree_block(inode, + pending_hashes, + dst_block_num, + params->log_blocksize); + if (err) { + fsverity_err(inode, + "Error %d writing Merkle tree block %llu", + err, dst_block_num); + return err; + } + dst_block_num++; + pending_size = 0; + } + + if (fatal_signal_pending(current)) + return -EINTR; + cond_resched(); + } + return 0; +} + +/* + * Build the Merkle tree for the given inode using the given parameters, and + * return the root hash in @root_hash. + * + * The tree is written to a filesystem-specific location as determined by the + * ->write_merkle_tree_block() method. However, the blocks that comprise the + * tree are the same for all filesystems. + */ +static int build_merkle_tree(struct inode *inode, + const struct merkle_tree_params *params, + u8 *root_hash) +{ + u8 *pending_hashes; + struct ahash_request *req; + u64 blocks; + unsigned int level; + int err = -ENOMEM; + + if (inode->i_size == 0) { + /* Empty file is a special case; root hash is all 0's */ + memset(root_hash, 0, params->digest_size); + return 0; + } + + pending_hashes = kmalloc(params->block_size, GFP_KERNEL); + req = ahash_request_alloc(params->hash_alg->tfm, GFP_KERNEL); + if (!pending_hashes || !req) + goto out; + + /* + * Build each level of the Merkle tree, starting at the leaf level + * (level 0) and ascending to the root node (level 'num_levels - 1'). + * Then at the end (level 'num_levels'), calculate the root hash. + */ + blocks = (inode->i_size + params->block_size - 1) >> + params->log_blocksize; + for (level = 0; level <= params->num_levels; level++) { + err = build_merkle_tree_level(inode, level, blocks, params, + pending_hashes, req); + if (err) + goto out; + blocks = (blocks + params->hashes_per_block - 1) >> + params->log_arity; + } + memcpy(root_hash, pending_hashes, params->digest_size); + err = 0; +out: + kfree(pending_hashes); + ahash_request_free(req); + return err; +} + +static int enable_verity(struct file *filp, + const struct fsverity_enable_arg *arg) +{ + struct inode *inode = file_inode(filp); + const struct fsverity_operations *vops = inode->i_sb->s_vop; + struct merkle_tree_params params = { }; + struct fsverity_descriptor *desc; + size_t desc_size = sizeof(*desc); + struct fsverity_info *vi; + int err; + + /* Start initializing the fsverity_descriptor */ + desc = kzalloc(desc_size, GFP_KERNEL); + if (!desc) + return -ENOMEM; + desc->version = 1; + desc->hash_algorithm = arg->hash_algorithm; + desc->log_blocksize = ilog2(arg->block_size); + + /* Get the salt if the user provided one */ + if (arg->salt_size && + copy_from_user(desc->salt, + (const u8 __user *)(uintptr_t)arg->salt_ptr, + arg->salt_size)) { + err = -EFAULT; + goto out; + } + desc->salt_size = arg->salt_size; + + desc->data_size = cpu_to_le64(inode->i_size); + + pr_debug("Building Merkle tree...\n"); + + /* Prepare the Merkle tree parameters */ + err = fsverity_init_merkle_tree_params(¶ms, inode, + arg->hash_algorithm, + desc->log_blocksize, + desc->salt, desc->salt_size); + if (err) + goto out; + + /* Tell the filesystem that verity is being enabled on the file */ + err = vops->begin_enable_verity(filp); + if (err) + goto out; + + /* Build the Merkle tree */ + BUILD_BUG_ON(sizeof(desc->root_hash) < FS_VERITY_MAX_DIGEST_SIZE); + err = build_merkle_tree(inode, ¶ms, desc->root_hash); + if (err) { + fsverity_err(inode, "Error %d building Merkle tree", err); + goto rollback; + } + pr_debug("Done building Merkle tree. Root hash is %s:%*phN\n", + params.hash_alg->name, params.digest_size, desc->root_hash); + + /* + * Create the fsverity_info. Don't bother trying to save work by + * reusing the merkle_tree_params from above. Instead, just create the + * fsverity_info from the fsverity_descriptor as if it were just loaded + * from disk. This is simpler, and it serves as an extra check that the + * metadata we're writing is valid before actually enabling verity. + */ + vi = fsverity_create_info(inode, desc, desc_size); + if (IS_ERR(vi)) { + err = PTR_ERR(vi); + goto rollback; + } + + /* Tell the filesystem to finish enabling verity on the file */ + err = vops->end_enable_verity(filp, desc, desc_size, params.tree_size); + if (err) { + fsverity_err(inode, "%ps() failed with err %d", + vops->end_enable_verity, err); + fsverity_free_info(vi); + } else if (WARN_ON(!IS_VERITY(inode))) { + err = -EINVAL; + fsverity_free_info(vi); + } else { + /* Successfully enabled verity */ + + /* + * Readers can start using ->i_verity_info immediately, so it + * can't be rolled back once set. So don't set it until just + * after the filesystem has successfully enabled verity. + */ + fsverity_set_info(inode, vi); + } +out: + kfree(params.hashstate); + kfree(desc); + return err; + +rollback: + (void)vops->end_enable_verity(filp, NULL, 0, params.tree_size); + goto out; +} + +/** + * fsverity_ioctl_enable() - enable verity on a file + * + * Enable fs-verity on a file. See the "FS_IOC_ENABLE_VERITY" section of + * Documentation/filesystems/fsverity.rst for the documentation. + * + * Return: 0 on success, -errno on failure + */ +int fsverity_ioctl_enable(struct file *filp, const void __user *uarg) +{ + struct inode *inode = file_inode(filp); + struct fsverity_enable_arg arg; + int err; + + if (copy_from_user(&arg, uarg, sizeof(arg))) + return -EFAULT; + + if (arg.version != 1) + return -EINVAL; + + if (arg.__reserved1 || + memchr_inv(arg.__reserved2, 0, sizeof(arg.__reserved2))) + return -EINVAL; + + if (arg.block_size != PAGE_SIZE) + return -EINVAL; + + if (arg.salt_size > FIELD_SIZEOF(struct fsverity_descriptor, salt)) + return -EMSGSIZE; + + if (arg.sig_size) + return -EINVAL; + + /* + * Require a regular file with write access. But the actual fd must + * still be readonly so that we can lock out all writers. This is + * needed to guarantee that no writable fds exist to the file once it + * has verity enabled, and to stabilize the data being hashed. + */ + + err = inode_permission(inode, MAY_WRITE); + if (err) + return err; + + if (IS_APPEND(inode)) + return -EPERM; + + if (S_ISDIR(inode->i_mode)) + return -EISDIR; + + if (!S_ISREG(inode->i_mode)) + return -EINVAL; + + err = mnt_want_write_file(filp); + if (err) /* -EROFS */ + return err; + + err = deny_write_access(filp); + if (err) /* -ETXTBSY */ + goto out_drop_write; + + inode_lock(inode); + + if (IS_VERITY(inode)) { + err = -EEXIST; + goto out_unlock; + } + + err = enable_verity(filp, &arg); + if (err) + goto out_unlock; + + /* + * Some pages of the file may have been evicted from pagecache after + * being used in the Merkle tree construction, then read into pagecache + * again by another process reading from the file concurrently. Since + * these pages didn't undergo verification against the file measurement + * which fs-verity now claims to be enforcing, we have to wipe the + * pagecache to ensure that all future reads are verified. + */ + filemap_write_and_wait(inode->i_mapping); + truncate_inode_pages(inode->i_mapping, 0); + + /* + * allow_write_access() is needed to pair with deny_write_access(). + * Regardless, the filesystem won't allow writing to verity files. + */ +out_unlock: + inode_unlock(inode); + allow_write_access(filp); +out_drop_write: + mnt_drop_write_file(filp); + return err; +} +EXPORT_SYMBOL_GPL(fsverity_ioctl_enable); diff --git a/include/linux/fsverity.h b/include/linux/fsverity.h index ecd47e748c7f64..7ef2ef82653409 100644 --- a/include/linux/fsverity.h +++ b/include/linux/fsverity.h @@ -17,6 +17,42 @@ /* Verity operations for filesystems */ struct fsverity_operations { + /** + * Begin enabling verity on the given file. + * + * @filp: a readonly file descriptor for the file + * + * The filesystem must do any needed filesystem-specific preparations + * for enabling verity, e.g. evicting inline data. + * + * i_rwsem is held for write. + * + * Return: 0 on success, -errno on failure + */ + int (*begin_enable_verity)(struct file *filp); + + /** + * End enabling verity on the given file. + * + * @filp: a readonly file descriptor for the file + * @desc: the verity descriptor to write, or NULL on failure + * @desc_size: size of verity descriptor, or 0 on failure + * @merkle_tree_size: total bytes the Merkle tree took up + * + * If desc == NULL, then enabling verity failed and the filesystem only + * must do any necessary cleanups. Else, it must also store the given + * verity descriptor to a fs-specific location associated with the inode + * and do any fs-specific actions needed to mark the inode as a verity + * inode, e.g. setting a bit in the on-disk inode. The filesystem is + * also responsible for setting the S_VERITY flag in the VFS inode. + * + * i_rwsem is held for write. + * + * Return: 0 on success, -errno on failure + */ + int (*end_enable_verity)(struct file *filp, const void *desc, + size_t desc_size, u64 merkle_tree_size); + /** * Get the verity descriptor of the given inode. * @@ -50,6 +86,22 @@ struct fsverity_operations { */ struct page *(*read_merkle_tree_page)(struct inode *inode, pgoff_t index); + + /** + * Write a Merkle tree block to the given inode. + * + * @inode: the inode for which the Merkle tree is being built + * @buf: block to write + * @index: 0-based index of the block within the Merkle tree + * @log_blocksize: log base 2 of the Merkle tree block size + * + * This is only called between ->begin_enable_verity() and + * ->end_enable_verity(). i_rwsem is held for write. + * + * Return: 0 on success, -errno on failure + */ + int (*write_merkle_tree_block)(struct inode *inode, const void *buf, + u64 index, int log_blocksize); }; #ifdef CONFIG_FS_VERITY @@ -60,6 +112,10 @@ static inline struct fsverity_info *fsverity_get_info(const struct inode *inode) return READ_ONCE(inode->i_verity_info); } +/* enable.c */ + +extern int fsverity_ioctl_enable(struct file *filp, const void __user *arg); + /* open.c */ extern int fsverity_file_open(struct inode *inode, struct file *filp); @@ -79,6 +135,14 @@ static inline struct fsverity_info *fsverity_get_info(const struct inode *inode) return NULL; } +/* enable.c */ + +static inline int fsverity_ioctl_enable(struct file *filp, + const void __user *arg) +{ + return -EOPNOTSUPP; +} + /* open.c */ static inline int fsverity_file_open(struct inode *inode, struct file *filp)