Lines Matching +full:pre +full:- +full:verified

1 // SPDX-License-Identifier: GPL-2.0-only
7 * Based on Chromium dm-verity driver (C) 2011 The Chromium OS Authors
16 #include "dm-verity.h"
17 #include "dm-verity-fec.h"
18 #include "dm-verity-verify-sig.h"
19 #include "dm-audit.h"
72 * Auxiliary structure appended to each dm-bufio buffer. If the value
73 * hash_verified is nonzero, hash of the block has been verified.
94 aux->hash_verified = 0; in dm_bufio_alloc_callback()
102 return dm_target_offset(v->ti, bi_sector); in verity_map_sector()
108 * The lowest "hash_per_block_bits"-bits of the result denote hash position
114 return block >> (level * v->hash_per_block_bits); in verity_position_at_level()
120 struct shash_desc *desc = &io->hash_desc; in verity_hash()
123 desc->tfm = v->shash_tfm; in verity_hash()
124 if (unlikely(v->initial_hashstate == NULL)) { in verity_hash()
128 crypto_shash_update(desc, v->salt, v->salt_size) ?: in verity_hash()
132 r = crypto_shash_import(desc, v->initial_hashstate) ?: in verity_hash()
146 *hash_block = v->hash_level_block[level] + (position >> v->hash_per_block_bits); in verity_hash_at_level()
151 idx = position & ((1 << v->hash_per_block_bits) - 1); in verity_hash_at_level()
152 if (!v->version) in verity_hash_at_level()
153 *offset = idx * v->digest_size; in verity_hash_at_level()
155 *offset = idx << (v->hash_dev_block_bits - v->hash_per_block_bits); in verity_hash_at_level()
167 struct mapped_device *md = dm_table_get_md(v->ti->table); in verity_handle_err()
170 v->hash_failed = true; in verity_handle_err()
172 if (v->corrupted_errs >= DM_VERITY_MAX_CORRUPTED_ERRS) in verity_handle_err()
175 v->corrupted_errs++; in verity_handle_err()
188 DMERR_LIMIT("%s: %s block %llu is corrupted", v->data_dev->name, in verity_handle_err()
191 if (v->corrupted_errs == DM_VERITY_MAX_CORRUPTED_ERRS) { in verity_handle_err()
192 DMERR("%s: reached maximum errors", v->data_dev->name); in verity_handle_err()
193 dm_audit_log_target(DM_MSG_PREFIX, "max-corrupted-errors", v->ti, 0); in verity_handle_err()
199 kobject_uevent_env(&disk_to_dev(dm_disk(md))->kobj, KOBJ_CHANGE, envp); in verity_handle_err()
202 if (v->mode == DM_VERITY_MODE_LOGGING) in verity_handle_err()
205 if (v->mode == DM_VERITY_MODE_RESTART) in verity_handle_err()
206 kernel_restart("dm-verity device corrupted"); in verity_handle_err()
208 if (v->mode == DM_VERITY_MODE_PANIC) in verity_handle_err()
209 panic("dm-verity device corrupted"); in verity_handle_err()
222 * If "skip_unverified" is false, unverified buffer is hashed and verified
235 struct bio *bio = dm_bio_from_per_bio_data(io, v->ti->per_io_data_size); in verity_verify_level()
239 if (static_branch_unlikely(&use_bh_wq_enabled) && io->in_bh) { in verity_verify_level()
240 data = dm_bufio_get(v->bufio, hash_block, &buf); in verity_verify_level()
244 * Return early and resume execution from a work-queue in verity_verify_level()
247 return -EAGAIN; in verity_verify_level()
250 data = dm_bufio_read_with_ioprio(v->bufio, hash_block, in verity_verify_level()
251 &buf, bio->bi_ioprio); in verity_verify_level()
258 data = dm_bufio_new(v->bufio, hash_block, &buf); in verity_verify_level()
264 aux->hash_verified = 1; in verity_verify_level()
268 dm_bufio_forget(v->bufio, hash_block); in verity_verify_level()
275 if (!aux->hash_verified) { in verity_verify_level()
281 r = verity_hash(v, io, data, 1 << v->hash_dev_block_bits, in verity_verify_level()
287 v->digest_size) == 0)) in verity_verify_level()
288 aux->hash_verified = 1; in verity_verify_level()
289 else if (static_branch_unlikely(&use_bh_wq_enabled) && io->in_bh) { in verity_verify_level()
292 * tasklet since it may sleep, so fallback to work-queue. in verity_verify_level()
294 r = -EAGAIN; in verity_verify_level()
298 aux->hash_verified = 1; in verity_verify_level()
303 io->had_mismatch = true; in verity_verify_level()
304 bio = dm_bio_from_per_bio_data(io, v->ti->per_io_data_size); in verity_verify_level()
305 dm_audit_log_bio(DM_MSG_PREFIX, "verify-metadata", bio, in verity_verify_level()
307 r = -EIO; in verity_verify_level()
314 memcpy(want_digest, data, v->digest_size); in verity_verify_level()
331 if (likely(v->levels)) { in verity_hash_for_block()
335 * verified, zero is returned. If it isn't, this in verity_hash_for_block()
344 memcpy(digest, v->root_digest, v->digest_size); in verity_hash_for_block()
346 for (i = v->levels - 1; i >= 0; i--) { in verity_hash_for_block()
352 if (!r && v->zero_digest) in verity_hash_for_block()
353 *is_zero = !memcmp(v->zero_digest, digest, v->digest_size); in verity_hash_for_block()
369 page = mempool_alloc(&v->recheck_pool, GFP_NOIO); in verity_recheck()
376 io_req.client = v->io; in verity_recheck()
377 io_loc.bdev = v->data_dev->bdev; in verity_recheck()
378 io_loc.sector = cur_block << (v->data_dev_block_bits - SECTOR_SHIFT); in verity_recheck()
379 io_loc.count = 1 << (v->data_dev_block_bits - SECTOR_SHIFT); in verity_recheck()
384 r = verity_hash(v, io, buffer, 1 << v->data_dev_block_bits, in verity_recheck()
390 verity_io_want_digest(v, io), v->digest_size)) { in verity_recheck()
391 r = -EIO; in verity_recheck()
395 memcpy(dest, buffer, 1 << v->data_dev_block_bits); in verity_recheck()
398 mempool_free(page, &v->recheck_pool); in verity_recheck()
408 if (static_branch_unlikely(&use_bh_wq_enabled) && io->in_bh) { in verity_handle_data_hash_mismatch()
413 return -EAGAIN; in verity_handle_data_hash_mismatch()
416 if (v->validated_blocks) in verity_handle_data_hash_mismatch()
417 set_bit(blkno, v->validated_blocks); in verity_handle_data_hash_mismatch()
425 if (bio->bi_status) in verity_handle_data_hash_mismatch()
426 return -EIO; /* Error correction failed; Just return error */ in verity_handle_data_hash_mismatch()
429 io->had_mismatch = true; in verity_handle_data_hash_mismatch()
430 dm_audit_log_bio(DM_MSG_PREFIX, "verify-data", bio, blkno, 0); in verity_handle_data_hash_mismatch()
431 return -EIO; in verity_handle_data_hash_mismatch()
441 struct dm_verity *v = io->v; in verity_verify_io()
442 const unsigned int block_size = 1 << v->data_dev_block_bits; in verity_verify_io()
445 struct bio *bio = dm_bio_from_per_bio_data(io, v->ti->per_io_data_size); in verity_verify_io()
448 if (static_branch_unlikely(&use_bh_wq_enabled) && io->in_bh) { in verity_verify_io()
451 * verification in a work-queue. in verity_verify_io()
453 iter_copy = io->iter; in verity_verify_io()
456 iter = &io->iter; in verity_verify_io()
458 for (b = 0; b < io->n_blocks; in verity_verify_io()
461 sector_t cur_block = io->block + b; in verity_verify_io()
466 if (v->validated_blocks && bio->bi_status == BLK_STS_OK && in verity_verify_io()
467 likely(test_bit(cur_block, v->validated_blocks))) in verity_verify_io()
480 * since dm-verity sets dma_alignment to the data block in verity_verify_io()
481 * size minus 1, and dm-verity also doesn't allow the in verity_verify_io()
485 return -EIO; in verity_verify_io()
508 verity_io_want_digest(v, io), v->digest_size) == 0)) { in verity_verify_io()
509 if (v->validated_blocks) in verity_verify_io()
510 set_bit(cur_block, v->validated_blocks); in verity_verify_io()
535 kernel_restart("dm-verity device has I/O error"); in restart_io_error()
543 struct dm_verity *v = io->v; in verity_finish_io()
544 struct bio *bio = dm_bio_from_per_bio_data(io, v->ti->per_io_data_size); in verity_finish_io()
546 bio->bi_end_io = io->orig_bi_end_io; in verity_finish_io()
547 bio->bi_status = status; in verity_finish_io()
549 if (!static_branch_unlikely(&use_bh_wq_enabled) || !io->in_bh) in verity_finish_io()
553 unlikely(!(bio->bi_opf & REQ_RAHEAD)) && in verity_finish_io()
554 !io->had_mismatch && in verity_finish_io()
556 if (v->error_mode == DM_VERITY_MODE_PANIC) { in verity_finish_io()
557 panic("dm-verity device has I/O error"); in verity_finish_io()
559 if (v->error_mode == DM_VERITY_MODE_RESTART) { in verity_finish_io()
561 queue_work(v->verify_wq, &restart_work); in verity_finish_io()
577 io->in_bh = false; in verity_work()
587 io->in_bh = true; in verity_bh_work()
589 if (err == -EAGAIN || err == -ENOMEM) { in verity_bh_work()
590 /* fallback to retrying with work-queue */ in verity_bh_work()
591 INIT_WORK(&io->work, verity_work); in verity_bh_work()
592 queue_work(io->v->verify_wq, &io->work); in verity_bh_work()
608 struct dm_verity_io *io = bio->bi_private; in verity_end_io()
609 unsigned short ioprio = IOPRIO_PRIO_CLASS(bio->bi_ioprio); in verity_end_io()
610 unsigned int bytes = io->n_blocks << io->v->data_dev_block_bits; in verity_end_io()
612 if (bio->bi_status && in verity_end_io()
613 (!verity_fec_is_enabled(io->v) || in verity_end_io()
615 (bio->bi_opf & REQ_RAHEAD))) { in verity_end_io()
616 verity_finish_io(io, bio->bi_status); in verity_end_io()
620 if (static_branch_unlikely(&use_bh_wq_enabled) && io->v->use_bh_wq && in verity_end_io()
623 INIT_WORK(&io->bh_work, verity_bh_work); in verity_end_io()
624 queue_work(system_bh_wq, &io->bh_work); in verity_end_io()
626 verity_bh_work(&io->bh_work); in verity_end_io()
629 INIT_WORK(&io->work, verity_work); in verity_end_io()
630 queue_work(io->v->verify_wq, &io->work); in verity_end_io()
643 struct dm_verity *v = pw->v; in verity_prefetch_io()
646 for (i = v->levels - 2; i >= 0; i--) { in verity_prefetch_io()
650 verity_hash_at_level(v, pw->block, i, &hash_block_start, NULL); in verity_prefetch_io()
651 verity_hash_at_level(v, pw->block + pw->n_blocks - 1, i, &hash_block_end, NULL); in verity_prefetch_io()
656 cluster >>= v->data_dev_block_bits; in verity_prefetch_io()
660 if (unlikely(cluster & (cluster - 1))) in verity_prefetch_io()
663 hash_block_start &= ~(sector_t)(cluster - 1); in verity_prefetch_io()
664 hash_block_end |= cluster - 1; in verity_prefetch_io()
665 if (unlikely(hash_block_end >= v->hash_blocks)) in verity_prefetch_io()
666 hash_block_end = v->hash_blocks - 1; in verity_prefetch_io()
669 dm_bufio_prefetch_with_ioprio(v->bufio, hash_block_start, in verity_prefetch_io()
670 hash_block_end - hash_block_start + 1, in verity_prefetch_io()
671 pw->ioprio); in verity_prefetch_io()
680 sector_t block = io->block; in verity_submit_prefetch()
681 unsigned int n_blocks = io->n_blocks; in verity_submit_prefetch()
684 if (v->validated_blocks) { in verity_submit_prefetch()
685 while (n_blocks && test_bit(block, v->validated_blocks)) { in verity_submit_prefetch()
687 n_blocks--; in verity_submit_prefetch()
689 while (n_blocks && test_bit(block + n_blocks - 1, in verity_submit_prefetch()
690 v->validated_blocks)) in verity_submit_prefetch()
691 n_blocks--; in verity_submit_prefetch()
702 INIT_WORK(&pw->work, verity_prefetch_io); in verity_submit_prefetch()
703 pw->v = v; in verity_submit_prefetch()
704 pw->block = block; in verity_submit_prefetch()
705 pw->n_blocks = n_blocks; in verity_submit_prefetch()
706 pw->ioprio = ioprio; in verity_submit_prefetch()
707 queue_work(v->verify_wq, &pw->work); in verity_submit_prefetch()
716 struct dm_verity *v = ti->private; in verity_map()
719 bio_set_dev(bio, v->data_dev->bdev); in verity_map()
720 bio->bi_iter.bi_sector = verity_map_sector(v, bio->bi_iter.bi_sector); in verity_map()
722 if (((unsigned int)bio->bi_iter.bi_sector | bio_sectors(bio)) & in verity_map()
723 ((1 << (v->data_dev_block_bits - SECTOR_SHIFT)) - 1)) { in verity_map()
729 (v->data_dev_block_bits - SECTOR_SHIFT) > v->data_blocks) { in verity_map()
737 io = dm_per_bio_data(bio, ti->per_io_data_size); in verity_map()
738 io->v = v; in verity_map()
739 io->orig_bi_end_io = bio->bi_end_io; in verity_map()
740 io->block = bio->bi_iter.bi_sector >> (v->data_dev_block_bits - SECTOR_SHIFT); in verity_map()
741 io->n_blocks = bio->bi_iter.bi_size >> v->data_dev_block_bits; in verity_map()
742 io->had_mismatch = false; in verity_map()
744 bio->bi_end_io = verity_end_io; in verity_map()
745 bio->bi_private = io; in verity_map()
746 io->iter = bio->bi_iter; in verity_map()
750 verity_submit_prefetch(v, io, bio->bi_ioprio); in verity_map()
759 struct dm_verity *v = ti->private; in verity_postsuspend()
760 flush_workqueue(v->verify_wq); in verity_postsuspend()
761 dm_bufio_client_reset(v->bufio); in verity_postsuspend()
770 struct dm_verity *v = ti->private; in verity_status()
777 DMEMIT("%c", v->hash_failed ? 'C' : 'V'); in verity_status()
781 v->version, in verity_status()
782 v->data_dev->name, in verity_status()
783 v->hash_dev->name, in verity_status()
784 1 << v->data_dev_block_bits, in verity_status()
785 1 << v->hash_dev_block_bits, in verity_status()
786 (unsigned long long)v->data_blocks, in verity_status()
787 (unsigned long long)v->hash_start, in verity_status()
788 v->alg_name in verity_status()
790 for (x = 0; x < v->digest_size; x++) in verity_status()
791 DMEMIT("%02x", v->root_digest[x]); in verity_status()
793 if (!v->salt_size) in verity_status()
794 DMEMIT("-"); in verity_status()
796 for (x = 0; x < v->salt_size; x++) in verity_status()
797 DMEMIT("%02x", v->salt[x]); in verity_status()
798 if (v->mode != DM_VERITY_MODE_EIO) in verity_status()
800 if (v->error_mode != DM_VERITY_MODE_EIO) in verity_status()
804 if (v->zero_digest) in verity_status()
806 if (v->validated_blocks) in verity_status()
808 if (v->use_bh_wq) in verity_status()
810 if (v->signature_key_desc) in verity_status()
815 if (v->mode != DM_VERITY_MODE_EIO) { in verity_status()
817 switch (v->mode) { in verity_status()
831 if (v->error_mode != DM_VERITY_MODE_EIO) { in verity_status()
833 switch (v->error_mode) { in verity_status()
844 if (v->zero_digest) in verity_status()
846 if (v->validated_blocks) in verity_status()
848 if (v->use_bh_wq) in verity_status()
851 if (v->signature_key_desc) in verity_status()
853 " %s", v->signature_key_desc); in verity_status()
857 DMEMIT_TARGET_NAME_VERSION(ti->type); in verity_status()
858 DMEMIT(",hash_failed=%c", v->hash_failed ? 'C' : 'V'); in verity_status()
859 DMEMIT(",verity_version=%u", v->version); in verity_status()
860 DMEMIT(",data_device_name=%s", v->data_dev->name); in verity_status()
861 DMEMIT(",hash_device_name=%s", v->hash_dev->name); in verity_status()
862 DMEMIT(",verity_algorithm=%s", v->alg_name); in verity_status()
865 for (x = 0; x < v->digest_size; x++) in verity_status()
866 DMEMIT("%02x", v->root_digest[x]); in verity_status()
869 if (!v->salt_size) in verity_status()
870 DMEMIT("-"); in verity_status()
872 for (x = 0; x < v->salt_size; x++) in verity_status()
873 DMEMIT("%02x", v->salt[x]); in verity_status()
875 DMEMIT(",ignore_zero_blocks=%c", v->zero_digest ? 'y' : 'n'); in verity_status()
876 DMEMIT(",check_at_most_once=%c", v->validated_blocks ? 'y' : 'n'); in verity_status()
877 if (v->signature_key_desc) in verity_status()
878 DMEMIT(",root_hash_sig_key_desc=%s", v->signature_key_desc); in verity_status()
880 if (v->mode != DM_VERITY_MODE_EIO) { in verity_status()
882 switch (v->mode) { in verity_status()
896 if (v->error_mode != DM_VERITY_MODE_EIO) { in verity_status()
898 switch (v->error_mode) { in verity_status()
918 struct dm_verity *v = ti->private; in verity_prepare_ioctl()
920 *bdev = v->data_dev->bdev; in verity_prepare_ioctl()
922 if (ti->len != bdev_nr_sectors(v->data_dev->bdev)) in verity_prepare_ioctl()
930 struct dm_verity *v = ti->private; in verity_iterate_devices()
932 return fn(ti, v->data_dev, 0, ti->len, data); in verity_iterate_devices()
937 struct dm_verity *v = ti->private; in verity_io_hints()
939 if (limits->logical_block_size < 1 << v->data_dev_block_bits) in verity_io_hints()
940 limits->logical_block_size = 1 << v->data_dev_block_bits; in verity_io_hints()
942 if (limits->physical_block_size < 1 << v->data_dev_block_bits) in verity_io_hints()
943 limits->physical_block_size = 1 << v->data_dev_block_bits; in verity_io_hints()
945 limits->io_min = limits->logical_block_size; in verity_io_hints()
948 * Similar to what dm-crypt does, opt dm-verity out of support for in verity_io_hints()
950 * alignment requirement of logical_block_size. This prevents dm-verity in verity_io_hints()
953 limits->dma_alignment = limits->logical_block_size - 1; in verity_io_hints()
961 v->sig_size = sig_size; in verity_init_sig()
964 v->root_digest_sig = kmemdup(sig, v->sig_size, GFP_KERNEL); in verity_init_sig()
965 if (!v->root_digest_sig) in verity_init_sig()
966 return -ENOMEM; in verity_init_sig()
974 kfree(v->root_digest_sig); in verity_free_sig()
993 struct dm_verity *v = ti->private; in verity_dtr()
995 if (v->verify_wq) in verity_dtr()
996 destroy_workqueue(v->verify_wq); in verity_dtr()
998 mempool_exit(&v->recheck_pool); in verity_dtr()
999 if (v->io) in verity_dtr()
1000 dm_io_client_destroy(v->io); in verity_dtr()
1002 if (v->bufio) in verity_dtr()
1003 dm_bufio_client_destroy(v->bufio); in verity_dtr()
1005 kvfree(v->validated_blocks); in verity_dtr()
1006 kfree(v->salt); in verity_dtr()
1007 kfree(v->initial_hashstate); in verity_dtr()
1008 kfree(v->root_digest); in verity_dtr()
1009 kfree(v->zero_digest); in verity_dtr()
1012 crypto_free_shash(v->shash_tfm); in verity_dtr()
1014 kfree(v->alg_name); in verity_dtr()
1016 if (v->hash_dev) in verity_dtr()
1017 dm_put_device(ti, v->hash_dev); in verity_dtr()
1019 if (v->data_dev) in verity_dtr()
1020 dm_put_device(ti, v->data_dev); in verity_dtr()
1024 kfree(v->signature_key_desc); in verity_dtr()
1026 if (v->use_bh_wq) in verity_dtr()
1036 struct dm_target *ti = v->ti; in verity_alloc_most_once()
1038 if (v->validated_blocks) in verity_alloc_most_once()
1042 if (v->data_blocks > INT_MAX) { in verity_alloc_most_once()
1043 ti->error = "device too large to use check_at_most_once"; in verity_alloc_most_once()
1044 return -E2BIG; in verity_alloc_most_once()
1047 v->validated_blocks = kvcalloc(BITS_TO_LONGS(v->data_blocks), in verity_alloc_most_once()
1050 if (!v->validated_blocks) { in verity_alloc_most_once()
1051 ti->error = "failed to allocate bitset for check_at_most_once"; in verity_alloc_most_once()
1052 return -ENOMEM; in verity_alloc_most_once()
1060 int r = -ENOMEM; in verity_alloc_zero_digest()
1064 if (v->zero_digest) in verity_alloc_zero_digest()
1067 v->zero_digest = kmalloc(v->digest_size, GFP_KERNEL); in verity_alloc_zero_digest()
1069 if (!v->zero_digest) in verity_alloc_zero_digest()
1072 io = kmalloc(sizeof(*io) + crypto_shash_descsize(v->shash_tfm), in verity_alloc_zero_digest()
1078 zero_data = kzalloc(1 << v->data_dev_block_bits, GFP_KERNEL); in verity_alloc_zero_digest()
1083 r = verity_hash(v, io, zero_data, 1 << v->data_dev_block_bits, in verity_alloc_zero_digest()
1084 v->zero_digest); in verity_alloc_zero_digest()
1102 if (v->mode) in verity_parse_verity_mode()
1103 return -EINVAL; in verity_parse_verity_mode()
1106 v->mode = DM_VERITY_MODE_LOGGING; in verity_parse_verity_mode()
1108 v->mode = DM_VERITY_MODE_RESTART; in verity_parse_verity_mode()
1110 v->mode = DM_VERITY_MODE_PANIC; in verity_parse_verity_mode()
1123 if (v->error_mode) in verity_parse_verity_error_mode()
1124 return -EINVAL; in verity_parse_verity_error_mode()
1127 v->error_mode = DM_VERITY_MODE_RESTART; in verity_parse_verity_error_mode()
1129 v->error_mode = DM_VERITY_MODE_PANIC; in verity_parse_verity_error_mode()
1140 struct dm_target *ti = v->ti; in verity_parse_opt_args()
1147 r = dm_read_arg_group(_args, as, &argc, &ti->error); in verity_parse_opt_args()
1149 return -EINVAL; in verity_parse_opt_args()
1156 argc--; in verity_parse_opt_args()
1163 ti->error = "Conflicting error handling parameters"; in verity_parse_opt_args()
1173 ti->error = "Conflicting error handling parameters"; in verity_parse_opt_args()
1183 ti->error = "Cannot allocate zero digest"; in verity_parse_opt_args()
1197 v->use_bh_wq = true; in verity_parse_opt_args()
1230 ti->error = "Unrecognized verity feature request"; in verity_parse_opt_args()
1231 return -EINVAL; in verity_parse_opt_args()
1239 struct dm_target *ti = v->ti; in verity_setup_hash_alg()
1242 v->alg_name = kstrdup(alg_name, GFP_KERNEL); in verity_setup_hash_alg()
1243 if (!v->alg_name) { in verity_setup_hash_alg()
1244 ti->error = "Cannot allocate algorithm name"; in verity_setup_hash_alg()
1245 return -ENOMEM; in verity_setup_hash_alg()
1250 ti->error = "Cannot initialize hash function"; in verity_setup_hash_alg()
1253 v->shash_tfm = shash; in verity_setup_hash_alg()
1254 v->digest_size = crypto_shash_digestsize(shash); in verity_setup_hash_alg()
1256 if ((1 << v->hash_dev_block_bits) < v->digest_size * 2) { in verity_setup_hash_alg()
1257 ti->error = "Digest size too big"; in verity_setup_hash_alg()
1258 return -EINVAL; in verity_setup_hash_alg()
1265 struct dm_target *ti = v->ti; in verity_setup_salt_and_hashstate()
1267 if (strcmp(arg, "-") != 0) { in verity_setup_salt_and_hashstate()
1268 v->salt_size = strlen(arg) / 2; in verity_setup_salt_and_hashstate()
1269 v->salt = kmalloc(v->salt_size, GFP_KERNEL); in verity_setup_salt_and_hashstate()
1270 if (!v->salt) { in verity_setup_salt_and_hashstate()
1271 ti->error = "Cannot allocate salt"; in verity_setup_salt_and_hashstate()
1272 return -ENOMEM; in verity_setup_salt_and_hashstate()
1274 if (strlen(arg) != v->salt_size * 2 || in verity_setup_salt_and_hashstate()
1275 hex2bin(v->salt, arg, v->salt_size)) { in verity_setup_salt_and_hashstate()
1276 ti->error = "Invalid salt"; in verity_setup_salt_and_hashstate()
1277 return -EINVAL; in verity_setup_salt_and_hashstate()
1280 if (v->version) { /* Version 1: salt at beginning */ in verity_setup_salt_and_hashstate()
1281 SHASH_DESC_ON_STACK(desc, v->shash_tfm); in verity_setup_salt_and_hashstate()
1285 * Compute the pre-salted hash state that can be passed to in verity_setup_salt_and_hashstate()
1288 v->initial_hashstate = kmalloc( in verity_setup_salt_and_hashstate()
1289 crypto_shash_statesize(v->shash_tfm), GFP_KERNEL); in verity_setup_salt_and_hashstate()
1290 if (!v->initial_hashstate) { in verity_setup_salt_and_hashstate()
1291 ti->error = "Cannot allocate initial hash state"; in verity_setup_salt_and_hashstate()
1292 return -ENOMEM; in verity_setup_salt_and_hashstate()
1294 desc->tfm = v->shash_tfm; in verity_setup_salt_and_hashstate()
1296 crypto_shash_update(desc, v->salt, v->salt_size) ?: in verity_setup_salt_and_hashstate()
1297 crypto_shash_export(desc, v->initial_hashstate); in verity_setup_salt_and_hashstate()
1299 ti->error = "Cannot set up initial hash state"; in verity_setup_salt_and_hashstate()
1318 * <salt> Hex string or "-" if no salt.
1335 ti->error = "Cannot allocate verity structure"; in verity_ctr()
1336 return -ENOMEM; in verity_ctr()
1338 ti->private = v; in verity_ctr()
1339 v->ti = ti; in verity_ctr()
1345 if ((dm_table_get_mode(ti->table) & ~BLK_OPEN_READ)) { in verity_ctr()
1346 ti->error = "Device must be readonly"; in verity_ctr()
1347 r = -EINVAL; in verity_ctr()
1352 ti->error = "Not enough arguments"; in verity_ctr()
1353 r = -EINVAL; in verity_ctr()
1359 as.argc = argc - 10; in verity_ctr()
1368 ti->error = "Invalid version"; in verity_ctr()
1369 r = -EINVAL; in verity_ctr()
1372 v->version = num; in verity_ctr()
1374 r = dm_get_device(ti, argv[1], BLK_OPEN_READ, &v->data_dev); in verity_ctr()
1376 ti->error = "Data device lookup failed"; in verity_ctr()
1380 r = dm_get_device(ti, argv[2], BLK_OPEN_READ, &v->hash_dev); in verity_ctr()
1382 ti->error = "Hash device lookup failed"; in verity_ctr()
1387 !num || (num & (num - 1)) || in verity_ctr()
1388 num < bdev_logical_block_size(v->data_dev->bdev) || in verity_ctr()
1390 ti->error = "Invalid data device block size"; in verity_ctr()
1391 r = -EINVAL; in verity_ctr()
1394 v->data_dev_block_bits = __ffs(num); in verity_ctr()
1397 !num || (num & (num - 1)) || in verity_ctr()
1398 num < bdev_logical_block_size(v->hash_dev->bdev) || in verity_ctr()
1400 ti->error = "Invalid hash device block size"; in verity_ctr()
1401 r = -EINVAL; in verity_ctr()
1404 v->hash_dev_block_bits = __ffs(num); in verity_ctr()
1407 (sector_t)(num_ll << (v->data_dev_block_bits - SECTOR_SHIFT)) in verity_ctr()
1408 >> (v->data_dev_block_bits - SECTOR_SHIFT) != num_ll) { in verity_ctr()
1409 ti->error = "Invalid data blocks"; in verity_ctr()
1410 r = -EINVAL; in verity_ctr()
1413 v->data_blocks = num_ll; in verity_ctr()
1415 if (ti->len > (v->data_blocks << (v->data_dev_block_bits - SECTOR_SHIFT))) { in verity_ctr()
1416 ti->error = "Data device is too small"; in verity_ctr()
1417 r = -EINVAL; in verity_ctr()
1422 (sector_t)(num_ll << (v->hash_dev_block_bits - SECTOR_SHIFT)) in verity_ctr()
1423 >> (v->hash_dev_block_bits - SECTOR_SHIFT) != num_ll) { in verity_ctr()
1424 ti->error = "Invalid hash start"; in verity_ctr()
1425 r = -EINVAL; in verity_ctr()
1428 v->hash_start = num_ll; in verity_ctr()
1434 v->root_digest = kmalloc(v->digest_size, GFP_KERNEL); in verity_ctr()
1435 if (!v->root_digest) { in verity_ctr()
1436 ti->error = "Cannot allocate root digest"; in verity_ctr()
1437 r = -ENOMEM; in verity_ctr()
1440 if (strlen(argv[8]) != v->digest_size * 2 || in verity_ctr()
1441 hex2bin(v->root_digest, argv[8], v->digest_size)) { in verity_ctr()
1442 ti->error = "Invalid root digest"; in verity_ctr()
1443 r = -EINVAL; in verity_ctr()
1453 argc -= 10; in verity_ctr()
1470 ti->error = "Root hash verification failed"; in verity_ctr()
1476 ti->error = "Cannot allocate root digest signature"; in verity_ctr()
1480 v->hash_per_block_bits = in verity_ctr()
1481 __fls((1 << v->hash_dev_block_bits) / v->digest_size); in verity_ctr()
1483 v->levels = 0; in verity_ctr()
1484 if (v->data_blocks) in verity_ctr()
1485 while (v->hash_per_block_bits * v->levels < 64 && in verity_ctr()
1486 (unsigned long long)(v->data_blocks - 1) >> in verity_ctr()
1487 (v->hash_per_block_bits * v->levels)) in verity_ctr()
1488 v->levels++; in verity_ctr()
1490 if (v->levels > DM_VERITY_MAX_LEVELS) { in verity_ctr()
1491 ti->error = "Too many tree levels"; in verity_ctr()
1492 r = -E2BIG; in verity_ctr()
1496 hash_position = v->hash_start; in verity_ctr()
1497 for (i = v->levels - 1; i >= 0; i--) { in verity_ctr()
1500 v->hash_level_block[i] = hash_position; in verity_ctr()
1501 s = (v->data_blocks + ((sector_t)1 << ((i + 1) * v->hash_per_block_bits)) - 1) in verity_ctr()
1502 >> ((i + 1) * v->hash_per_block_bits); in verity_ctr()
1504 ti->error = "Hash device offset overflow"; in verity_ctr()
1505 r = -E2BIG; in verity_ctr()
1510 v->hash_blocks = hash_position; in verity_ctr()
1512 r = mempool_init_page_pool(&v->recheck_pool, 1, 0); in verity_ctr()
1514 ti->error = "Cannot allocate mempool"; in verity_ctr()
1518 v->io = dm_io_client_create(); in verity_ctr()
1519 if (IS_ERR(v->io)) { in verity_ctr()
1520 r = PTR_ERR(v->io); in verity_ctr()
1521 v->io = NULL; in verity_ctr()
1522 ti->error = "Cannot allocate dm io"; in verity_ctr()
1526 v->bufio = dm_bufio_client_create(v->hash_dev->bdev, in verity_ctr()
1527 1 << v->hash_dev_block_bits, 1, sizeof(struct buffer_aux), in verity_ctr()
1529 v->use_bh_wq ? DM_BUFIO_CLIENT_NO_SLEEP : 0); in verity_ctr()
1530 if (IS_ERR(v->bufio)) { in verity_ctr()
1531 ti->error = "Cannot initialize dm-bufio"; in verity_ctr()
1532 r = PTR_ERR(v->bufio); in verity_ctr()
1533 v->bufio = NULL; in verity_ctr()
1537 if (dm_bufio_get_device_size(v->bufio) < v->hash_blocks) { in verity_ctr()
1538 ti->error = "Hash device is too small"; in verity_ctr()
1539 r = -E2BIG; in verity_ctr()
1545 * reducing wait times when reading from a dm-verity device. in verity_ctr()
1549 * will fall-back to using it for error handling (or if the bufio cache in verity_ctr()
1552 v->verify_wq = alloc_workqueue("kverityd", WQ_MEM_RECLAIM | WQ_HIGHPRI, 0); in verity_ctr()
1553 if (!v->verify_wq) { in verity_ctr()
1554 ti->error = "Cannot allocate workqueue"; in verity_ctr()
1555 r = -ENOMEM; in verity_ctr()
1559 ti->per_io_data_size = sizeof(struct dm_verity_io) + in verity_ctr()
1560 crypto_shash_descsize(v->shash_tfm); in verity_ctr()
1566 ti->per_io_data_size = roundup(ti->per_io_data_size, in verity_ctr()
1587 * Returns the verity mode of the target, or -EINVAL if 'ti' is not a verity
1592 struct dm_verity *v = ti->private; in dm_verity_get_mode()
1595 return -EINVAL; in dm_verity_get_mode()
1597 return v->mode; in dm_verity_get_mode()
1608 struct dm_verity *v = ti->private; in dm_verity_get_root_digest()
1611 return -EINVAL; in dm_verity_get_root_digest()
1613 *root_digest = kmemdup(v->root_digest, v->digest_size, GFP_KERNEL); in dm_verity_get_root_digest()
1615 return -ENOMEM; in dm_verity_get_root_digest()
1617 *digest_size = v->digest_size; in dm_verity_get_root_digest()
1630 * if the dm-verity target is unsigned, v->root_digest_sig will in verity_security_set_signature()
1637 v->root_digest_sig, in verity_security_set_signature()
1638 v->sig_size); in verity_security_set_signature()
1654 * Returns 0 on success, or -ENOMEM if the system is out of memory.
1663 v = ti->private; in verity_preresume()
1664 bdev = dm_disk(dm_table_get_md(ti->table))->part0; in verity_preresume()
1665 root_digest.digest = v->root_digest; in verity_preresume()
1666 root_digest.digest_len = v->digest_size; in verity_preresume()
1667 root_digest.alg = crypto_shash_alg_name(v->shash_tfm); in verity_preresume()
1714 return ti->type == &verity_target; in dm_is_verity_target()