18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only 28c2ecf20Sopenharmony_ci/* 38c2ecf20Sopenharmony_ci * Copyright (C) 2005,2006,2007,2008 IBM Corporation 48c2ecf20Sopenharmony_ci * 58c2ecf20Sopenharmony_ci * Authors: 68c2ecf20Sopenharmony_ci * Mimi Zohar <zohar@us.ibm.com> 78c2ecf20Sopenharmony_ci * Kylene Hall <kjhall@us.ibm.com> 88c2ecf20Sopenharmony_ci * 98c2ecf20Sopenharmony_ci * File: ima_crypto.c 108c2ecf20Sopenharmony_ci * Calculates md5/sha1 file hash, template hash, boot-aggreate hash 118c2ecf20Sopenharmony_ci */ 128c2ecf20Sopenharmony_ci 138c2ecf20Sopenharmony_ci#include <linux/kernel.h> 148c2ecf20Sopenharmony_ci#include <linux/moduleparam.h> 158c2ecf20Sopenharmony_ci#include <linux/ratelimit.h> 168c2ecf20Sopenharmony_ci#include <linux/file.h> 178c2ecf20Sopenharmony_ci#include <linux/crypto.h> 188c2ecf20Sopenharmony_ci#include <linux/scatterlist.h> 198c2ecf20Sopenharmony_ci#include <linux/err.h> 208c2ecf20Sopenharmony_ci#include <linux/slab.h> 218c2ecf20Sopenharmony_ci#include <crypto/hash.h> 228c2ecf20Sopenharmony_ci 238c2ecf20Sopenharmony_ci#include "ima.h" 248c2ecf20Sopenharmony_ci 258c2ecf20Sopenharmony_ci/* minimum file size for ahash use */ 268c2ecf20Sopenharmony_cistatic unsigned long ima_ahash_minsize; 278c2ecf20Sopenharmony_cimodule_param_named(ahash_minsize, ima_ahash_minsize, ulong, 0644); 288c2ecf20Sopenharmony_ciMODULE_PARM_DESC(ahash_minsize, "Minimum file size for ahash use"); 298c2ecf20Sopenharmony_ci 308c2ecf20Sopenharmony_ci/* default is 0 - 1 page. */ 318c2ecf20Sopenharmony_cistatic int ima_maxorder; 328c2ecf20Sopenharmony_cistatic unsigned int ima_bufsize = PAGE_SIZE; 338c2ecf20Sopenharmony_ci 348c2ecf20Sopenharmony_cistatic int param_set_bufsize(const char *val, const struct kernel_param *kp) 358c2ecf20Sopenharmony_ci{ 368c2ecf20Sopenharmony_ci unsigned long long size; 378c2ecf20Sopenharmony_ci int order; 388c2ecf20Sopenharmony_ci 398c2ecf20Sopenharmony_ci size = memparse(val, NULL); 408c2ecf20Sopenharmony_ci order = get_order(size); 418c2ecf20Sopenharmony_ci if (order >= MAX_ORDER) 428c2ecf20Sopenharmony_ci return -EINVAL; 438c2ecf20Sopenharmony_ci ima_maxorder = order; 448c2ecf20Sopenharmony_ci ima_bufsize = PAGE_SIZE << order; 458c2ecf20Sopenharmony_ci return 0; 468c2ecf20Sopenharmony_ci} 478c2ecf20Sopenharmony_ci 488c2ecf20Sopenharmony_cistatic const struct kernel_param_ops param_ops_bufsize = { 498c2ecf20Sopenharmony_ci .set = param_set_bufsize, 508c2ecf20Sopenharmony_ci .get = param_get_uint, 518c2ecf20Sopenharmony_ci}; 528c2ecf20Sopenharmony_ci#define param_check_bufsize(name, p) __param_check(name, p, unsigned int) 538c2ecf20Sopenharmony_ci 548c2ecf20Sopenharmony_cimodule_param_named(ahash_bufsize, ima_bufsize, bufsize, 0644); 558c2ecf20Sopenharmony_ciMODULE_PARM_DESC(ahash_bufsize, "Maximum ahash buffer size"); 568c2ecf20Sopenharmony_ci 578c2ecf20Sopenharmony_cistatic struct crypto_shash *ima_shash_tfm; 588c2ecf20Sopenharmony_cistatic struct crypto_ahash *ima_ahash_tfm; 598c2ecf20Sopenharmony_ci 608c2ecf20Sopenharmony_cistruct ima_algo_desc { 618c2ecf20Sopenharmony_ci struct crypto_shash *tfm; 628c2ecf20Sopenharmony_ci enum hash_algo algo; 638c2ecf20Sopenharmony_ci}; 648c2ecf20Sopenharmony_ci 658c2ecf20Sopenharmony_ciint ima_sha1_idx __ro_after_init; 668c2ecf20Sopenharmony_ciint ima_hash_algo_idx __ro_after_init; 678c2ecf20Sopenharmony_ci/* 688c2ecf20Sopenharmony_ci * Additional number of slots reserved, as needed, for SHA1 698c2ecf20Sopenharmony_ci * and IMA default algo. 708c2ecf20Sopenharmony_ci */ 718c2ecf20Sopenharmony_ciint ima_extra_slots __ro_after_init; 728c2ecf20Sopenharmony_ci 738c2ecf20Sopenharmony_cistatic struct ima_algo_desc *ima_algo_array; 748c2ecf20Sopenharmony_ci 758c2ecf20Sopenharmony_cistatic int __init ima_init_ima_crypto(void) 768c2ecf20Sopenharmony_ci{ 778c2ecf20Sopenharmony_ci long rc; 788c2ecf20Sopenharmony_ci 798c2ecf20Sopenharmony_ci ima_shash_tfm = crypto_alloc_shash(hash_algo_name[ima_hash_algo], 0, 0); 808c2ecf20Sopenharmony_ci if (IS_ERR(ima_shash_tfm)) { 818c2ecf20Sopenharmony_ci rc = PTR_ERR(ima_shash_tfm); 828c2ecf20Sopenharmony_ci pr_err("Can not allocate %s (reason: %ld)\n", 838c2ecf20Sopenharmony_ci hash_algo_name[ima_hash_algo], rc); 848c2ecf20Sopenharmony_ci return rc; 858c2ecf20Sopenharmony_ci } 868c2ecf20Sopenharmony_ci pr_info("Allocated hash algorithm: %s\n", 878c2ecf20Sopenharmony_ci hash_algo_name[ima_hash_algo]); 888c2ecf20Sopenharmony_ci return 0; 898c2ecf20Sopenharmony_ci} 908c2ecf20Sopenharmony_ci 918c2ecf20Sopenharmony_cistatic struct crypto_shash *ima_alloc_tfm(enum hash_algo algo) 928c2ecf20Sopenharmony_ci{ 938c2ecf20Sopenharmony_ci struct crypto_shash *tfm = ima_shash_tfm; 948c2ecf20Sopenharmony_ci int rc, i; 958c2ecf20Sopenharmony_ci 968c2ecf20Sopenharmony_ci if (algo < 0 || algo >= HASH_ALGO__LAST) 978c2ecf20Sopenharmony_ci algo = ima_hash_algo; 988c2ecf20Sopenharmony_ci 998c2ecf20Sopenharmony_ci if (algo == ima_hash_algo) 1008c2ecf20Sopenharmony_ci return tfm; 1018c2ecf20Sopenharmony_ci 1028c2ecf20Sopenharmony_ci for (i = 0; i < NR_BANKS(ima_tpm_chip) + ima_extra_slots; i++) 1038c2ecf20Sopenharmony_ci if (ima_algo_array[i].tfm && ima_algo_array[i].algo == algo) 1048c2ecf20Sopenharmony_ci return ima_algo_array[i].tfm; 1058c2ecf20Sopenharmony_ci 1068c2ecf20Sopenharmony_ci tfm = crypto_alloc_shash(hash_algo_name[algo], 0, 0); 1078c2ecf20Sopenharmony_ci if (IS_ERR(tfm)) { 1088c2ecf20Sopenharmony_ci rc = PTR_ERR(tfm); 1098c2ecf20Sopenharmony_ci pr_err("Can not allocate %s (reason: %d)\n", 1108c2ecf20Sopenharmony_ci hash_algo_name[algo], rc); 1118c2ecf20Sopenharmony_ci } 1128c2ecf20Sopenharmony_ci return tfm; 1138c2ecf20Sopenharmony_ci} 1148c2ecf20Sopenharmony_ci 1158c2ecf20Sopenharmony_ciint __init ima_init_crypto(void) 1168c2ecf20Sopenharmony_ci{ 1178c2ecf20Sopenharmony_ci enum hash_algo algo; 1188c2ecf20Sopenharmony_ci long rc; 1198c2ecf20Sopenharmony_ci int i; 1208c2ecf20Sopenharmony_ci 1218c2ecf20Sopenharmony_ci rc = ima_init_ima_crypto(); 1228c2ecf20Sopenharmony_ci if (rc) 1238c2ecf20Sopenharmony_ci return rc; 1248c2ecf20Sopenharmony_ci 1258c2ecf20Sopenharmony_ci ima_sha1_idx = -1; 1268c2ecf20Sopenharmony_ci ima_hash_algo_idx = -1; 1278c2ecf20Sopenharmony_ci 1288c2ecf20Sopenharmony_ci for (i = 0; i < NR_BANKS(ima_tpm_chip); i++) { 1298c2ecf20Sopenharmony_ci algo = ima_tpm_chip->allocated_banks[i].crypto_id; 1308c2ecf20Sopenharmony_ci if (algo == HASH_ALGO_SHA1) 1318c2ecf20Sopenharmony_ci ima_sha1_idx = i; 1328c2ecf20Sopenharmony_ci 1338c2ecf20Sopenharmony_ci if (algo == ima_hash_algo) 1348c2ecf20Sopenharmony_ci ima_hash_algo_idx = i; 1358c2ecf20Sopenharmony_ci } 1368c2ecf20Sopenharmony_ci 1378c2ecf20Sopenharmony_ci if (ima_sha1_idx < 0) { 1388c2ecf20Sopenharmony_ci ima_sha1_idx = NR_BANKS(ima_tpm_chip) + ima_extra_slots++; 1398c2ecf20Sopenharmony_ci if (ima_hash_algo == HASH_ALGO_SHA1) 1408c2ecf20Sopenharmony_ci ima_hash_algo_idx = ima_sha1_idx; 1418c2ecf20Sopenharmony_ci } 1428c2ecf20Sopenharmony_ci 1438c2ecf20Sopenharmony_ci if (ima_hash_algo_idx < 0) 1448c2ecf20Sopenharmony_ci ima_hash_algo_idx = NR_BANKS(ima_tpm_chip) + ima_extra_slots++; 1458c2ecf20Sopenharmony_ci 1468c2ecf20Sopenharmony_ci ima_algo_array = kcalloc(NR_BANKS(ima_tpm_chip) + ima_extra_slots, 1478c2ecf20Sopenharmony_ci sizeof(*ima_algo_array), GFP_KERNEL); 1488c2ecf20Sopenharmony_ci if (!ima_algo_array) { 1498c2ecf20Sopenharmony_ci rc = -ENOMEM; 1508c2ecf20Sopenharmony_ci goto out; 1518c2ecf20Sopenharmony_ci } 1528c2ecf20Sopenharmony_ci 1538c2ecf20Sopenharmony_ci for (i = 0; i < NR_BANKS(ima_tpm_chip); i++) { 1548c2ecf20Sopenharmony_ci algo = ima_tpm_chip->allocated_banks[i].crypto_id; 1558c2ecf20Sopenharmony_ci ima_algo_array[i].algo = algo; 1568c2ecf20Sopenharmony_ci 1578c2ecf20Sopenharmony_ci /* unknown TPM algorithm */ 1588c2ecf20Sopenharmony_ci if (algo == HASH_ALGO__LAST) 1598c2ecf20Sopenharmony_ci continue; 1608c2ecf20Sopenharmony_ci 1618c2ecf20Sopenharmony_ci if (algo == ima_hash_algo) { 1628c2ecf20Sopenharmony_ci ima_algo_array[i].tfm = ima_shash_tfm; 1638c2ecf20Sopenharmony_ci continue; 1648c2ecf20Sopenharmony_ci } 1658c2ecf20Sopenharmony_ci 1668c2ecf20Sopenharmony_ci ima_algo_array[i].tfm = ima_alloc_tfm(algo); 1678c2ecf20Sopenharmony_ci if (IS_ERR(ima_algo_array[i].tfm)) { 1688c2ecf20Sopenharmony_ci if (algo == HASH_ALGO_SHA1) { 1698c2ecf20Sopenharmony_ci rc = PTR_ERR(ima_algo_array[i].tfm); 1708c2ecf20Sopenharmony_ci ima_algo_array[i].tfm = NULL; 1718c2ecf20Sopenharmony_ci goto out_array; 1728c2ecf20Sopenharmony_ci } 1738c2ecf20Sopenharmony_ci 1748c2ecf20Sopenharmony_ci ima_algo_array[i].tfm = NULL; 1758c2ecf20Sopenharmony_ci } 1768c2ecf20Sopenharmony_ci } 1778c2ecf20Sopenharmony_ci 1788c2ecf20Sopenharmony_ci if (ima_sha1_idx >= NR_BANKS(ima_tpm_chip)) { 1798c2ecf20Sopenharmony_ci if (ima_hash_algo == HASH_ALGO_SHA1) { 1808c2ecf20Sopenharmony_ci ima_algo_array[ima_sha1_idx].tfm = ima_shash_tfm; 1818c2ecf20Sopenharmony_ci } else { 1828c2ecf20Sopenharmony_ci ima_algo_array[ima_sha1_idx].tfm = 1838c2ecf20Sopenharmony_ci ima_alloc_tfm(HASH_ALGO_SHA1); 1848c2ecf20Sopenharmony_ci if (IS_ERR(ima_algo_array[ima_sha1_idx].tfm)) { 1858c2ecf20Sopenharmony_ci rc = PTR_ERR(ima_algo_array[ima_sha1_idx].tfm); 1868c2ecf20Sopenharmony_ci goto out_array; 1878c2ecf20Sopenharmony_ci } 1888c2ecf20Sopenharmony_ci } 1898c2ecf20Sopenharmony_ci 1908c2ecf20Sopenharmony_ci ima_algo_array[ima_sha1_idx].algo = HASH_ALGO_SHA1; 1918c2ecf20Sopenharmony_ci } 1928c2ecf20Sopenharmony_ci 1938c2ecf20Sopenharmony_ci if (ima_hash_algo_idx >= NR_BANKS(ima_tpm_chip) && 1948c2ecf20Sopenharmony_ci ima_hash_algo_idx != ima_sha1_idx) { 1958c2ecf20Sopenharmony_ci ima_algo_array[ima_hash_algo_idx].tfm = ima_shash_tfm; 1968c2ecf20Sopenharmony_ci ima_algo_array[ima_hash_algo_idx].algo = ima_hash_algo; 1978c2ecf20Sopenharmony_ci } 1988c2ecf20Sopenharmony_ci 1998c2ecf20Sopenharmony_ci return 0; 2008c2ecf20Sopenharmony_ciout_array: 2018c2ecf20Sopenharmony_ci for (i = 0; i < NR_BANKS(ima_tpm_chip) + ima_extra_slots; i++) { 2028c2ecf20Sopenharmony_ci if (!ima_algo_array[i].tfm || 2038c2ecf20Sopenharmony_ci ima_algo_array[i].tfm == ima_shash_tfm) 2048c2ecf20Sopenharmony_ci continue; 2058c2ecf20Sopenharmony_ci 2068c2ecf20Sopenharmony_ci crypto_free_shash(ima_algo_array[i].tfm); 2078c2ecf20Sopenharmony_ci } 2088c2ecf20Sopenharmony_ci kfree(ima_algo_array); 2098c2ecf20Sopenharmony_ciout: 2108c2ecf20Sopenharmony_ci crypto_free_shash(ima_shash_tfm); 2118c2ecf20Sopenharmony_ci return rc; 2128c2ecf20Sopenharmony_ci} 2138c2ecf20Sopenharmony_ci 2148c2ecf20Sopenharmony_cistatic void ima_free_tfm(struct crypto_shash *tfm) 2158c2ecf20Sopenharmony_ci{ 2168c2ecf20Sopenharmony_ci int i; 2178c2ecf20Sopenharmony_ci 2188c2ecf20Sopenharmony_ci if (tfm == ima_shash_tfm) 2198c2ecf20Sopenharmony_ci return; 2208c2ecf20Sopenharmony_ci 2218c2ecf20Sopenharmony_ci for (i = 0; i < NR_BANKS(ima_tpm_chip) + ima_extra_slots; i++) 2228c2ecf20Sopenharmony_ci if (ima_algo_array[i].tfm == tfm) 2238c2ecf20Sopenharmony_ci return; 2248c2ecf20Sopenharmony_ci 2258c2ecf20Sopenharmony_ci crypto_free_shash(tfm); 2268c2ecf20Sopenharmony_ci} 2278c2ecf20Sopenharmony_ci 2288c2ecf20Sopenharmony_ci/** 2298c2ecf20Sopenharmony_ci * ima_alloc_pages() - Allocate contiguous pages. 2308c2ecf20Sopenharmony_ci * @max_size: Maximum amount of memory to allocate. 2318c2ecf20Sopenharmony_ci * @allocated_size: Returned size of actual allocation. 2328c2ecf20Sopenharmony_ci * @last_warn: Should the min_size allocation warn or not. 2338c2ecf20Sopenharmony_ci * 2348c2ecf20Sopenharmony_ci * Tries to do opportunistic allocation for memory first trying to allocate 2358c2ecf20Sopenharmony_ci * max_size amount of memory and then splitting that until zero order is 2368c2ecf20Sopenharmony_ci * reached. Allocation is tried without generating allocation warnings unless 2378c2ecf20Sopenharmony_ci * last_warn is set. Last_warn set affects only last allocation of zero order. 2388c2ecf20Sopenharmony_ci * 2398c2ecf20Sopenharmony_ci * By default, ima_maxorder is 0 and it is equivalent to kmalloc(GFP_KERNEL) 2408c2ecf20Sopenharmony_ci * 2418c2ecf20Sopenharmony_ci * Return pointer to allocated memory, or NULL on failure. 2428c2ecf20Sopenharmony_ci */ 2438c2ecf20Sopenharmony_cistatic void *ima_alloc_pages(loff_t max_size, size_t *allocated_size, 2448c2ecf20Sopenharmony_ci int last_warn) 2458c2ecf20Sopenharmony_ci{ 2468c2ecf20Sopenharmony_ci void *ptr; 2478c2ecf20Sopenharmony_ci int order = ima_maxorder; 2488c2ecf20Sopenharmony_ci gfp_t gfp_mask = __GFP_RECLAIM | __GFP_NOWARN | __GFP_NORETRY; 2498c2ecf20Sopenharmony_ci 2508c2ecf20Sopenharmony_ci if (order) 2518c2ecf20Sopenharmony_ci order = min(get_order(max_size), order); 2528c2ecf20Sopenharmony_ci 2538c2ecf20Sopenharmony_ci for (; order; order--) { 2548c2ecf20Sopenharmony_ci ptr = (void *)__get_free_pages(gfp_mask, order); 2558c2ecf20Sopenharmony_ci if (ptr) { 2568c2ecf20Sopenharmony_ci *allocated_size = PAGE_SIZE << order; 2578c2ecf20Sopenharmony_ci return ptr; 2588c2ecf20Sopenharmony_ci } 2598c2ecf20Sopenharmony_ci } 2608c2ecf20Sopenharmony_ci 2618c2ecf20Sopenharmony_ci /* order is zero - one page */ 2628c2ecf20Sopenharmony_ci 2638c2ecf20Sopenharmony_ci gfp_mask = GFP_KERNEL; 2648c2ecf20Sopenharmony_ci 2658c2ecf20Sopenharmony_ci if (!last_warn) 2668c2ecf20Sopenharmony_ci gfp_mask |= __GFP_NOWARN; 2678c2ecf20Sopenharmony_ci 2688c2ecf20Sopenharmony_ci ptr = (void *)__get_free_pages(gfp_mask, 0); 2698c2ecf20Sopenharmony_ci if (ptr) { 2708c2ecf20Sopenharmony_ci *allocated_size = PAGE_SIZE; 2718c2ecf20Sopenharmony_ci return ptr; 2728c2ecf20Sopenharmony_ci } 2738c2ecf20Sopenharmony_ci 2748c2ecf20Sopenharmony_ci *allocated_size = 0; 2758c2ecf20Sopenharmony_ci return NULL; 2768c2ecf20Sopenharmony_ci} 2778c2ecf20Sopenharmony_ci 2788c2ecf20Sopenharmony_ci/** 2798c2ecf20Sopenharmony_ci * ima_free_pages() - Free pages allocated by ima_alloc_pages(). 2808c2ecf20Sopenharmony_ci * @ptr: Pointer to allocated pages. 2818c2ecf20Sopenharmony_ci * @size: Size of allocated buffer. 2828c2ecf20Sopenharmony_ci */ 2838c2ecf20Sopenharmony_cistatic void ima_free_pages(void *ptr, size_t size) 2848c2ecf20Sopenharmony_ci{ 2858c2ecf20Sopenharmony_ci if (!ptr) 2868c2ecf20Sopenharmony_ci return; 2878c2ecf20Sopenharmony_ci free_pages((unsigned long)ptr, get_order(size)); 2888c2ecf20Sopenharmony_ci} 2898c2ecf20Sopenharmony_ci 2908c2ecf20Sopenharmony_cistatic struct crypto_ahash *ima_alloc_atfm(enum hash_algo algo) 2918c2ecf20Sopenharmony_ci{ 2928c2ecf20Sopenharmony_ci struct crypto_ahash *tfm = ima_ahash_tfm; 2938c2ecf20Sopenharmony_ci int rc; 2948c2ecf20Sopenharmony_ci 2958c2ecf20Sopenharmony_ci if (algo < 0 || algo >= HASH_ALGO__LAST) 2968c2ecf20Sopenharmony_ci algo = ima_hash_algo; 2978c2ecf20Sopenharmony_ci 2988c2ecf20Sopenharmony_ci if (algo != ima_hash_algo || !tfm) { 2998c2ecf20Sopenharmony_ci tfm = crypto_alloc_ahash(hash_algo_name[algo], 0, 0); 3008c2ecf20Sopenharmony_ci if (!IS_ERR(tfm)) { 3018c2ecf20Sopenharmony_ci if (algo == ima_hash_algo) 3028c2ecf20Sopenharmony_ci ima_ahash_tfm = tfm; 3038c2ecf20Sopenharmony_ci } else { 3048c2ecf20Sopenharmony_ci rc = PTR_ERR(tfm); 3058c2ecf20Sopenharmony_ci pr_err("Can not allocate %s (reason: %d)\n", 3068c2ecf20Sopenharmony_ci hash_algo_name[algo], rc); 3078c2ecf20Sopenharmony_ci } 3088c2ecf20Sopenharmony_ci } 3098c2ecf20Sopenharmony_ci return tfm; 3108c2ecf20Sopenharmony_ci} 3118c2ecf20Sopenharmony_ci 3128c2ecf20Sopenharmony_cistatic void ima_free_atfm(struct crypto_ahash *tfm) 3138c2ecf20Sopenharmony_ci{ 3148c2ecf20Sopenharmony_ci if (tfm != ima_ahash_tfm) 3158c2ecf20Sopenharmony_ci crypto_free_ahash(tfm); 3168c2ecf20Sopenharmony_ci} 3178c2ecf20Sopenharmony_ci 3188c2ecf20Sopenharmony_cistatic inline int ahash_wait(int err, struct crypto_wait *wait) 3198c2ecf20Sopenharmony_ci{ 3208c2ecf20Sopenharmony_ci 3218c2ecf20Sopenharmony_ci err = crypto_wait_req(err, wait); 3228c2ecf20Sopenharmony_ci 3238c2ecf20Sopenharmony_ci if (err) 3248c2ecf20Sopenharmony_ci pr_crit_ratelimited("ahash calculation failed: err: %d\n", err); 3258c2ecf20Sopenharmony_ci 3268c2ecf20Sopenharmony_ci return err; 3278c2ecf20Sopenharmony_ci} 3288c2ecf20Sopenharmony_ci 3298c2ecf20Sopenharmony_cistatic int ima_calc_file_hash_atfm(struct file *file, 3308c2ecf20Sopenharmony_ci struct ima_digest_data *hash, 3318c2ecf20Sopenharmony_ci struct crypto_ahash *tfm) 3328c2ecf20Sopenharmony_ci{ 3338c2ecf20Sopenharmony_ci loff_t i_size, offset; 3348c2ecf20Sopenharmony_ci char *rbuf[2] = { NULL, }; 3358c2ecf20Sopenharmony_ci int rc, rbuf_len, active = 0, ahash_rc = 0; 3368c2ecf20Sopenharmony_ci struct ahash_request *req; 3378c2ecf20Sopenharmony_ci struct scatterlist sg[1]; 3388c2ecf20Sopenharmony_ci struct crypto_wait wait; 3398c2ecf20Sopenharmony_ci size_t rbuf_size[2]; 3408c2ecf20Sopenharmony_ci 3418c2ecf20Sopenharmony_ci hash->length = crypto_ahash_digestsize(tfm); 3428c2ecf20Sopenharmony_ci 3438c2ecf20Sopenharmony_ci req = ahash_request_alloc(tfm, GFP_KERNEL); 3448c2ecf20Sopenharmony_ci if (!req) 3458c2ecf20Sopenharmony_ci return -ENOMEM; 3468c2ecf20Sopenharmony_ci 3478c2ecf20Sopenharmony_ci crypto_init_wait(&wait); 3488c2ecf20Sopenharmony_ci ahash_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG | 3498c2ecf20Sopenharmony_ci CRYPTO_TFM_REQ_MAY_SLEEP, 3508c2ecf20Sopenharmony_ci crypto_req_done, &wait); 3518c2ecf20Sopenharmony_ci 3528c2ecf20Sopenharmony_ci rc = ahash_wait(crypto_ahash_init(req), &wait); 3538c2ecf20Sopenharmony_ci if (rc) 3548c2ecf20Sopenharmony_ci goto out1; 3558c2ecf20Sopenharmony_ci 3568c2ecf20Sopenharmony_ci i_size = i_size_read(file_inode(file)); 3578c2ecf20Sopenharmony_ci 3588c2ecf20Sopenharmony_ci if (i_size == 0) 3598c2ecf20Sopenharmony_ci goto out2; 3608c2ecf20Sopenharmony_ci 3618c2ecf20Sopenharmony_ci /* 3628c2ecf20Sopenharmony_ci * Try to allocate maximum size of memory. 3638c2ecf20Sopenharmony_ci * Fail if even a single page cannot be allocated. 3648c2ecf20Sopenharmony_ci */ 3658c2ecf20Sopenharmony_ci rbuf[0] = ima_alloc_pages(i_size, &rbuf_size[0], 1); 3668c2ecf20Sopenharmony_ci if (!rbuf[0]) { 3678c2ecf20Sopenharmony_ci rc = -ENOMEM; 3688c2ecf20Sopenharmony_ci goto out1; 3698c2ecf20Sopenharmony_ci } 3708c2ecf20Sopenharmony_ci 3718c2ecf20Sopenharmony_ci /* Only allocate one buffer if that is enough. */ 3728c2ecf20Sopenharmony_ci if (i_size > rbuf_size[0]) { 3738c2ecf20Sopenharmony_ci /* 3748c2ecf20Sopenharmony_ci * Try to allocate secondary buffer. If that fails fallback to 3758c2ecf20Sopenharmony_ci * using single buffering. Use previous memory allocation size 3768c2ecf20Sopenharmony_ci * as baseline for possible allocation size. 3778c2ecf20Sopenharmony_ci */ 3788c2ecf20Sopenharmony_ci rbuf[1] = ima_alloc_pages(i_size - rbuf_size[0], 3798c2ecf20Sopenharmony_ci &rbuf_size[1], 0); 3808c2ecf20Sopenharmony_ci } 3818c2ecf20Sopenharmony_ci 3828c2ecf20Sopenharmony_ci for (offset = 0; offset < i_size; offset += rbuf_len) { 3838c2ecf20Sopenharmony_ci if (!rbuf[1] && offset) { 3848c2ecf20Sopenharmony_ci /* Not using two buffers, and it is not the first 3858c2ecf20Sopenharmony_ci * read/request, wait for the completion of the 3868c2ecf20Sopenharmony_ci * previous ahash_update() request. 3878c2ecf20Sopenharmony_ci */ 3888c2ecf20Sopenharmony_ci rc = ahash_wait(ahash_rc, &wait); 3898c2ecf20Sopenharmony_ci if (rc) 3908c2ecf20Sopenharmony_ci goto out3; 3918c2ecf20Sopenharmony_ci } 3928c2ecf20Sopenharmony_ci /* read buffer */ 3938c2ecf20Sopenharmony_ci rbuf_len = min_t(loff_t, i_size - offset, rbuf_size[active]); 3948c2ecf20Sopenharmony_ci rc = integrity_kernel_read(file, offset, rbuf[active], 3958c2ecf20Sopenharmony_ci rbuf_len); 3968c2ecf20Sopenharmony_ci if (rc != rbuf_len) { 3978c2ecf20Sopenharmony_ci if (rc >= 0) 3988c2ecf20Sopenharmony_ci rc = -EINVAL; 3998c2ecf20Sopenharmony_ci /* 4008c2ecf20Sopenharmony_ci * Forward current rc, do not overwrite with return value 4018c2ecf20Sopenharmony_ci * from ahash_wait() 4028c2ecf20Sopenharmony_ci */ 4038c2ecf20Sopenharmony_ci ahash_wait(ahash_rc, &wait); 4048c2ecf20Sopenharmony_ci goto out3; 4058c2ecf20Sopenharmony_ci } 4068c2ecf20Sopenharmony_ci 4078c2ecf20Sopenharmony_ci if (rbuf[1] && offset) { 4088c2ecf20Sopenharmony_ci /* Using two buffers, and it is not the first 4098c2ecf20Sopenharmony_ci * read/request, wait for the completion of the 4108c2ecf20Sopenharmony_ci * previous ahash_update() request. 4118c2ecf20Sopenharmony_ci */ 4128c2ecf20Sopenharmony_ci rc = ahash_wait(ahash_rc, &wait); 4138c2ecf20Sopenharmony_ci if (rc) 4148c2ecf20Sopenharmony_ci goto out3; 4158c2ecf20Sopenharmony_ci } 4168c2ecf20Sopenharmony_ci 4178c2ecf20Sopenharmony_ci sg_init_one(&sg[0], rbuf[active], rbuf_len); 4188c2ecf20Sopenharmony_ci ahash_request_set_crypt(req, sg, NULL, rbuf_len); 4198c2ecf20Sopenharmony_ci 4208c2ecf20Sopenharmony_ci ahash_rc = crypto_ahash_update(req); 4218c2ecf20Sopenharmony_ci 4228c2ecf20Sopenharmony_ci if (rbuf[1]) 4238c2ecf20Sopenharmony_ci active = !active; /* swap buffers, if we use two */ 4248c2ecf20Sopenharmony_ci } 4258c2ecf20Sopenharmony_ci /* wait for the last update request to complete */ 4268c2ecf20Sopenharmony_ci rc = ahash_wait(ahash_rc, &wait); 4278c2ecf20Sopenharmony_ciout3: 4288c2ecf20Sopenharmony_ci ima_free_pages(rbuf[0], rbuf_size[0]); 4298c2ecf20Sopenharmony_ci ima_free_pages(rbuf[1], rbuf_size[1]); 4308c2ecf20Sopenharmony_ciout2: 4318c2ecf20Sopenharmony_ci if (!rc) { 4328c2ecf20Sopenharmony_ci ahash_request_set_crypt(req, NULL, hash->digest, 0); 4338c2ecf20Sopenharmony_ci rc = ahash_wait(crypto_ahash_final(req), &wait); 4348c2ecf20Sopenharmony_ci } 4358c2ecf20Sopenharmony_ciout1: 4368c2ecf20Sopenharmony_ci ahash_request_free(req); 4378c2ecf20Sopenharmony_ci return rc; 4388c2ecf20Sopenharmony_ci} 4398c2ecf20Sopenharmony_ci 4408c2ecf20Sopenharmony_cistatic int ima_calc_file_ahash(struct file *file, struct ima_digest_data *hash) 4418c2ecf20Sopenharmony_ci{ 4428c2ecf20Sopenharmony_ci struct crypto_ahash *tfm; 4438c2ecf20Sopenharmony_ci int rc; 4448c2ecf20Sopenharmony_ci 4458c2ecf20Sopenharmony_ci tfm = ima_alloc_atfm(hash->algo); 4468c2ecf20Sopenharmony_ci if (IS_ERR(tfm)) 4478c2ecf20Sopenharmony_ci return PTR_ERR(tfm); 4488c2ecf20Sopenharmony_ci 4498c2ecf20Sopenharmony_ci rc = ima_calc_file_hash_atfm(file, hash, tfm); 4508c2ecf20Sopenharmony_ci 4518c2ecf20Sopenharmony_ci ima_free_atfm(tfm); 4528c2ecf20Sopenharmony_ci 4538c2ecf20Sopenharmony_ci return rc; 4548c2ecf20Sopenharmony_ci} 4558c2ecf20Sopenharmony_ci 4568c2ecf20Sopenharmony_cistatic int ima_calc_file_hash_tfm(struct file *file, 4578c2ecf20Sopenharmony_ci struct ima_digest_data *hash, 4588c2ecf20Sopenharmony_ci struct crypto_shash *tfm) 4598c2ecf20Sopenharmony_ci{ 4608c2ecf20Sopenharmony_ci loff_t i_size, offset = 0; 4618c2ecf20Sopenharmony_ci char *rbuf; 4628c2ecf20Sopenharmony_ci int rc; 4638c2ecf20Sopenharmony_ci SHASH_DESC_ON_STACK(shash, tfm); 4648c2ecf20Sopenharmony_ci 4658c2ecf20Sopenharmony_ci shash->tfm = tfm; 4668c2ecf20Sopenharmony_ci 4678c2ecf20Sopenharmony_ci hash->length = crypto_shash_digestsize(tfm); 4688c2ecf20Sopenharmony_ci 4698c2ecf20Sopenharmony_ci rc = crypto_shash_init(shash); 4708c2ecf20Sopenharmony_ci if (rc != 0) 4718c2ecf20Sopenharmony_ci return rc; 4728c2ecf20Sopenharmony_ci 4738c2ecf20Sopenharmony_ci i_size = i_size_read(file_inode(file)); 4748c2ecf20Sopenharmony_ci 4758c2ecf20Sopenharmony_ci if (i_size == 0) 4768c2ecf20Sopenharmony_ci goto out; 4778c2ecf20Sopenharmony_ci 4788c2ecf20Sopenharmony_ci rbuf = kzalloc(PAGE_SIZE, GFP_KERNEL); 4798c2ecf20Sopenharmony_ci if (!rbuf) 4808c2ecf20Sopenharmony_ci return -ENOMEM; 4818c2ecf20Sopenharmony_ci 4828c2ecf20Sopenharmony_ci while (offset < i_size) { 4838c2ecf20Sopenharmony_ci int rbuf_len; 4848c2ecf20Sopenharmony_ci 4858c2ecf20Sopenharmony_ci rbuf_len = integrity_kernel_read(file, offset, rbuf, PAGE_SIZE); 4868c2ecf20Sopenharmony_ci if (rbuf_len < 0) { 4878c2ecf20Sopenharmony_ci rc = rbuf_len; 4888c2ecf20Sopenharmony_ci break; 4898c2ecf20Sopenharmony_ci } 4908c2ecf20Sopenharmony_ci if (rbuf_len == 0) { /* unexpected EOF */ 4918c2ecf20Sopenharmony_ci rc = -EINVAL; 4928c2ecf20Sopenharmony_ci break; 4938c2ecf20Sopenharmony_ci } 4948c2ecf20Sopenharmony_ci offset += rbuf_len; 4958c2ecf20Sopenharmony_ci 4968c2ecf20Sopenharmony_ci rc = crypto_shash_update(shash, rbuf, rbuf_len); 4978c2ecf20Sopenharmony_ci if (rc) 4988c2ecf20Sopenharmony_ci break; 4998c2ecf20Sopenharmony_ci } 5008c2ecf20Sopenharmony_ci kfree(rbuf); 5018c2ecf20Sopenharmony_ciout: 5028c2ecf20Sopenharmony_ci if (!rc) 5038c2ecf20Sopenharmony_ci rc = crypto_shash_final(shash, hash->digest); 5048c2ecf20Sopenharmony_ci return rc; 5058c2ecf20Sopenharmony_ci} 5068c2ecf20Sopenharmony_ci 5078c2ecf20Sopenharmony_cistatic int ima_calc_file_shash(struct file *file, struct ima_digest_data *hash) 5088c2ecf20Sopenharmony_ci{ 5098c2ecf20Sopenharmony_ci struct crypto_shash *tfm; 5108c2ecf20Sopenharmony_ci int rc; 5118c2ecf20Sopenharmony_ci 5128c2ecf20Sopenharmony_ci tfm = ima_alloc_tfm(hash->algo); 5138c2ecf20Sopenharmony_ci if (IS_ERR(tfm)) 5148c2ecf20Sopenharmony_ci return PTR_ERR(tfm); 5158c2ecf20Sopenharmony_ci 5168c2ecf20Sopenharmony_ci rc = ima_calc_file_hash_tfm(file, hash, tfm); 5178c2ecf20Sopenharmony_ci 5188c2ecf20Sopenharmony_ci ima_free_tfm(tfm); 5198c2ecf20Sopenharmony_ci 5208c2ecf20Sopenharmony_ci return rc; 5218c2ecf20Sopenharmony_ci} 5228c2ecf20Sopenharmony_ci 5238c2ecf20Sopenharmony_ci/* 5248c2ecf20Sopenharmony_ci * ima_calc_file_hash - calculate file hash 5258c2ecf20Sopenharmony_ci * 5268c2ecf20Sopenharmony_ci * Asynchronous hash (ahash) allows using HW acceleration for calculating 5278c2ecf20Sopenharmony_ci * a hash. ahash performance varies for different data sizes on different 5288c2ecf20Sopenharmony_ci * crypto accelerators. shash performance might be better for smaller files. 5298c2ecf20Sopenharmony_ci * The 'ima.ahash_minsize' module parameter allows specifying the best 5308c2ecf20Sopenharmony_ci * minimum file size for using ahash on the system. 5318c2ecf20Sopenharmony_ci * 5328c2ecf20Sopenharmony_ci * If the ima.ahash_minsize parameter is not specified, this function uses 5338c2ecf20Sopenharmony_ci * shash for the hash calculation. If ahash fails, it falls back to using 5348c2ecf20Sopenharmony_ci * shash. 5358c2ecf20Sopenharmony_ci */ 5368c2ecf20Sopenharmony_ciint ima_calc_file_hash(struct file *file, struct ima_digest_data *hash) 5378c2ecf20Sopenharmony_ci{ 5388c2ecf20Sopenharmony_ci loff_t i_size; 5398c2ecf20Sopenharmony_ci int rc; 5408c2ecf20Sopenharmony_ci struct file *f = file; 5418c2ecf20Sopenharmony_ci bool new_file_instance = false; 5428c2ecf20Sopenharmony_ci 5438c2ecf20Sopenharmony_ci /* 5448c2ecf20Sopenharmony_ci * For consistency, fail file's opened with the O_DIRECT flag on 5458c2ecf20Sopenharmony_ci * filesystems mounted with/without DAX option. 5468c2ecf20Sopenharmony_ci */ 5478c2ecf20Sopenharmony_ci if (file->f_flags & O_DIRECT) { 5488c2ecf20Sopenharmony_ci hash->length = hash_digest_size[ima_hash_algo]; 5498c2ecf20Sopenharmony_ci hash->algo = ima_hash_algo; 5508c2ecf20Sopenharmony_ci return -EINVAL; 5518c2ecf20Sopenharmony_ci } 5528c2ecf20Sopenharmony_ci 5538c2ecf20Sopenharmony_ci /* Open a new file instance in O_RDONLY if we cannot read */ 5548c2ecf20Sopenharmony_ci if (!(file->f_mode & FMODE_READ)) { 5558c2ecf20Sopenharmony_ci int flags = file->f_flags & ~(O_WRONLY | O_APPEND | 5568c2ecf20Sopenharmony_ci O_TRUNC | O_CREAT | O_NOCTTY | O_EXCL); 5578c2ecf20Sopenharmony_ci flags |= O_RDONLY; 5588c2ecf20Sopenharmony_ci f = dentry_open(&file->f_path, flags, file->f_cred); 5598c2ecf20Sopenharmony_ci if (IS_ERR(f)) 5608c2ecf20Sopenharmony_ci return PTR_ERR(f); 5618c2ecf20Sopenharmony_ci 5628c2ecf20Sopenharmony_ci new_file_instance = true; 5638c2ecf20Sopenharmony_ci } 5648c2ecf20Sopenharmony_ci 5658c2ecf20Sopenharmony_ci i_size = i_size_read(file_inode(f)); 5668c2ecf20Sopenharmony_ci 5678c2ecf20Sopenharmony_ci if (ima_ahash_minsize && i_size >= ima_ahash_minsize) { 5688c2ecf20Sopenharmony_ci rc = ima_calc_file_ahash(f, hash); 5698c2ecf20Sopenharmony_ci if (!rc) 5708c2ecf20Sopenharmony_ci goto out; 5718c2ecf20Sopenharmony_ci } 5728c2ecf20Sopenharmony_ci 5738c2ecf20Sopenharmony_ci rc = ima_calc_file_shash(f, hash); 5748c2ecf20Sopenharmony_ciout: 5758c2ecf20Sopenharmony_ci if (new_file_instance) 5768c2ecf20Sopenharmony_ci fput(f); 5778c2ecf20Sopenharmony_ci return rc; 5788c2ecf20Sopenharmony_ci} 5798c2ecf20Sopenharmony_ci 5808c2ecf20Sopenharmony_ci/* 5818c2ecf20Sopenharmony_ci * Calculate the hash of template data 5828c2ecf20Sopenharmony_ci */ 5838c2ecf20Sopenharmony_cistatic int ima_calc_field_array_hash_tfm(struct ima_field_data *field_data, 5848c2ecf20Sopenharmony_ci struct ima_template_entry *entry, 5858c2ecf20Sopenharmony_ci int tfm_idx) 5868c2ecf20Sopenharmony_ci{ 5878c2ecf20Sopenharmony_ci SHASH_DESC_ON_STACK(shash, ima_algo_array[tfm_idx].tfm); 5888c2ecf20Sopenharmony_ci struct ima_template_desc *td = entry->template_desc; 5898c2ecf20Sopenharmony_ci int num_fields = entry->template_desc->num_fields; 5908c2ecf20Sopenharmony_ci int rc, i; 5918c2ecf20Sopenharmony_ci 5928c2ecf20Sopenharmony_ci shash->tfm = ima_algo_array[tfm_idx].tfm; 5938c2ecf20Sopenharmony_ci 5948c2ecf20Sopenharmony_ci rc = crypto_shash_init(shash); 5958c2ecf20Sopenharmony_ci if (rc != 0) 5968c2ecf20Sopenharmony_ci return rc; 5978c2ecf20Sopenharmony_ci 5988c2ecf20Sopenharmony_ci for (i = 0; i < num_fields; i++) { 5998c2ecf20Sopenharmony_ci u8 buffer[IMA_EVENT_NAME_LEN_MAX + 1] = { 0 }; 6008c2ecf20Sopenharmony_ci u8 *data_to_hash = field_data[i].data; 6018c2ecf20Sopenharmony_ci u32 datalen = field_data[i].len; 6028c2ecf20Sopenharmony_ci u32 datalen_to_hash = 6038c2ecf20Sopenharmony_ci !ima_canonical_fmt ? datalen : cpu_to_le32(datalen); 6048c2ecf20Sopenharmony_ci 6058c2ecf20Sopenharmony_ci if (strcmp(td->name, IMA_TEMPLATE_IMA_NAME) != 0) { 6068c2ecf20Sopenharmony_ci rc = crypto_shash_update(shash, 6078c2ecf20Sopenharmony_ci (const u8 *) &datalen_to_hash, 6088c2ecf20Sopenharmony_ci sizeof(datalen_to_hash)); 6098c2ecf20Sopenharmony_ci if (rc) 6108c2ecf20Sopenharmony_ci break; 6118c2ecf20Sopenharmony_ci } else if (strcmp(td->fields[i]->field_id, "n") == 0) { 6128c2ecf20Sopenharmony_ci memcpy(buffer, data_to_hash, datalen); 6138c2ecf20Sopenharmony_ci data_to_hash = buffer; 6148c2ecf20Sopenharmony_ci datalen = IMA_EVENT_NAME_LEN_MAX + 1; 6158c2ecf20Sopenharmony_ci } 6168c2ecf20Sopenharmony_ci rc = crypto_shash_update(shash, data_to_hash, datalen); 6178c2ecf20Sopenharmony_ci if (rc) 6188c2ecf20Sopenharmony_ci break; 6198c2ecf20Sopenharmony_ci } 6208c2ecf20Sopenharmony_ci 6218c2ecf20Sopenharmony_ci if (!rc) 6228c2ecf20Sopenharmony_ci rc = crypto_shash_final(shash, entry->digests[tfm_idx].digest); 6238c2ecf20Sopenharmony_ci 6248c2ecf20Sopenharmony_ci return rc; 6258c2ecf20Sopenharmony_ci} 6268c2ecf20Sopenharmony_ci 6278c2ecf20Sopenharmony_ciint ima_calc_field_array_hash(struct ima_field_data *field_data, 6288c2ecf20Sopenharmony_ci struct ima_template_entry *entry) 6298c2ecf20Sopenharmony_ci{ 6308c2ecf20Sopenharmony_ci u16 alg_id; 6318c2ecf20Sopenharmony_ci int rc, i; 6328c2ecf20Sopenharmony_ci 6338c2ecf20Sopenharmony_ci rc = ima_calc_field_array_hash_tfm(field_data, entry, ima_sha1_idx); 6348c2ecf20Sopenharmony_ci if (rc) 6358c2ecf20Sopenharmony_ci return rc; 6368c2ecf20Sopenharmony_ci 6378c2ecf20Sopenharmony_ci entry->digests[ima_sha1_idx].alg_id = TPM_ALG_SHA1; 6388c2ecf20Sopenharmony_ci 6398c2ecf20Sopenharmony_ci for (i = 0; i < NR_BANKS(ima_tpm_chip) + ima_extra_slots; i++) { 6408c2ecf20Sopenharmony_ci if (i == ima_sha1_idx) 6418c2ecf20Sopenharmony_ci continue; 6428c2ecf20Sopenharmony_ci 6438c2ecf20Sopenharmony_ci if (i < NR_BANKS(ima_tpm_chip)) { 6448c2ecf20Sopenharmony_ci alg_id = ima_tpm_chip->allocated_banks[i].alg_id; 6458c2ecf20Sopenharmony_ci entry->digests[i].alg_id = alg_id; 6468c2ecf20Sopenharmony_ci } 6478c2ecf20Sopenharmony_ci 6488c2ecf20Sopenharmony_ci /* for unmapped TPM algorithms digest is still a padded SHA1 */ 6498c2ecf20Sopenharmony_ci if (!ima_algo_array[i].tfm) { 6508c2ecf20Sopenharmony_ci memcpy(entry->digests[i].digest, 6518c2ecf20Sopenharmony_ci entry->digests[ima_sha1_idx].digest, 6528c2ecf20Sopenharmony_ci TPM_DIGEST_SIZE); 6538c2ecf20Sopenharmony_ci continue; 6548c2ecf20Sopenharmony_ci } 6558c2ecf20Sopenharmony_ci 6568c2ecf20Sopenharmony_ci rc = ima_calc_field_array_hash_tfm(field_data, entry, i); 6578c2ecf20Sopenharmony_ci if (rc) 6588c2ecf20Sopenharmony_ci return rc; 6598c2ecf20Sopenharmony_ci } 6608c2ecf20Sopenharmony_ci return rc; 6618c2ecf20Sopenharmony_ci} 6628c2ecf20Sopenharmony_ci 6638c2ecf20Sopenharmony_cistatic int calc_buffer_ahash_atfm(const void *buf, loff_t len, 6648c2ecf20Sopenharmony_ci struct ima_digest_data *hash, 6658c2ecf20Sopenharmony_ci struct crypto_ahash *tfm) 6668c2ecf20Sopenharmony_ci{ 6678c2ecf20Sopenharmony_ci struct ahash_request *req; 6688c2ecf20Sopenharmony_ci struct scatterlist sg; 6698c2ecf20Sopenharmony_ci struct crypto_wait wait; 6708c2ecf20Sopenharmony_ci int rc, ahash_rc = 0; 6718c2ecf20Sopenharmony_ci 6728c2ecf20Sopenharmony_ci hash->length = crypto_ahash_digestsize(tfm); 6738c2ecf20Sopenharmony_ci 6748c2ecf20Sopenharmony_ci req = ahash_request_alloc(tfm, GFP_KERNEL); 6758c2ecf20Sopenharmony_ci if (!req) 6768c2ecf20Sopenharmony_ci return -ENOMEM; 6778c2ecf20Sopenharmony_ci 6788c2ecf20Sopenharmony_ci crypto_init_wait(&wait); 6798c2ecf20Sopenharmony_ci ahash_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG | 6808c2ecf20Sopenharmony_ci CRYPTO_TFM_REQ_MAY_SLEEP, 6818c2ecf20Sopenharmony_ci crypto_req_done, &wait); 6828c2ecf20Sopenharmony_ci 6838c2ecf20Sopenharmony_ci rc = ahash_wait(crypto_ahash_init(req), &wait); 6848c2ecf20Sopenharmony_ci if (rc) 6858c2ecf20Sopenharmony_ci goto out; 6868c2ecf20Sopenharmony_ci 6878c2ecf20Sopenharmony_ci sg_init_one(&sg, buf, len); 6888c2ecf20Sopenharmony_ci ahash_request_set_crypt(req, &sg, NULL, len); 6898c2ecf20Sopenharmony_ci 6908c2ecf20Sopenharmony_ci ahash_rc = crypto_ahash_update(req); 6918c2ecf20Sopenharmony_ci 6928c2ecf20Sopenharmony_ci /* wait for the update request to complete */ 6938c2ecf20Sopenharmony_ci rc = ahash_wait(ahash_rc, &wait); 6948c2ecf20Sopenharmony_ci if (!rc) { 6958c2ecf20Sopenharmony_ci ahash_request_set_crypt(req, NULL, hash->digest, 0); 6968c2ecf20Sopenharmony_ci rc = ahash_wait(crypto_ahash_final(req), &wait); 6978c2ecf20Sopenharmony_ci } 6988c2ecf20Sopenharmony_ciout: 6998c2ecf20Sopenharmony_ci ahash_request_free(req); 7008c2ecf20Sopenharmony_ci return rc; 7018c2ecf20Sopenharmony_ci} 7028c2ecf20Sopenharmony_ci 7038c2ecf20Sopenharmony_cistatic int calc_buffer_ahash(const void *buf, loff_t len, 7048c2ecf20Sopenharmony_ci struct ima_digest_data *hash) 7058c2ecf20Sopenharmony_ci{ 7068c2ecf20Sopenharmony_ci struct crypto_ahash *tfm; 7078c2ecf20Sopenharmony_ci int rc; 7088c2ecf20Sopenharmony_ci 7098c2ecf20Sopenharmony_ci tfm = ima_alloc_atfm(hash->algo); 7108c2ecf20Sopenharmony_ci if (IS_ERR(tfm)) 7118c2ecf20Sopenharmony_ci return PTR_ERR(tfm); 7128c2ecf20Sopenharmony_ci 7138c2ecf20Sopenharmony_ci rc = calc_buffer_ahash_atfm(buf, len, hash, tfm); 7148c2ecf20Sopenharmony_ci 7158c2ecf20Sopenharmony_ci ima_free_atfm(tfm); 7168c2ecf20Sopenharmony_ci 7178c2ecf20Sopenharmony_ci return rc; 7188c2ecf20Sopenharmony_ci} 7198c2ecf20Sopenharmony_ci 7208c2ecf20Sopenharmony_cistatic int calc_buffer_shash_tfm(const void *buf, loff_t size, 7218c2ecf20Sopenharmony_ci struct ima_digest_data *hash, 7228c2ecf20Sopenharmony_ci struct crypto_shash *tfm) 7238c2ecf20Sopenharmony_ci{ 7248c2ecf20Sopenharmony_ci SHASH_DESC_ON_STACK(shash, tfm); 7258c2ecf20Sopenharmony_ci unsigned int len; 7268c2ecf20Sopenharmony_ci int rc; 7278c2ecf20Sopenharmony_ci 7288c2ecf20Sopenharmony_ci shash->tfm = tfm; 7298c2ecf20Sopenharmony_ci 7308c2ecf20Sopenharmony_ci hash->length = crypto_shash_digestsize(tfm); 7318c2ecf20Sopenharmony_ci 7328c2ecf20Sopenharmony_ci rc = crypto_shash_init(shash); 7338c2ecf20Sopenharmony_ci if (rc != 0) 7348c2ecf20Sopenharmony_ci return rc; 7358c2ecf20Sopenharmony_ci 7368c2ecf20Sopenharmony_ci while (size) { 7378c2ecf20Sopenharmony_ci len = size < PAGE_SIZE ? size : PAGE_SIZE; 7388c2ecf20Sopenharmony_ci rc = crypto_shash_update(shash, buf, len); 7398c2ecf20Sopenharmony_ci if (rc) 7408c2ecf20Sopenharmony_ci break; 7418c2ecf20Sopenharmony_ci buf += len; 7428c2ecf20Sopenharmony_ci size -= len; 7438c2ecf20Sopenharmony_ci } 7448c2ecf20Sopenharmony_ci 7458c2ecf20Sopenharmony_ci if (!rc) 7468c2ecf20Sopenharmony_ci rc = crypto_shash_final(shash, hash->digest); 7478c2ecf20Sopenharmony_ci return rc; 7488c2ecf20Sopenharmony_ci} 7498c2ecf20Sopenharmony_ci 7508c2ecf20Sopenharmony_cistatic int calc_buffer_shash(const void *buf, loff_t len, 7518c2ecf20Sopenharmony_ci struct ima_digest_data *hash) 7528c2ecf20Sopenharmony_ci{ 7538c2ecf20Sopenharmony_ci struct crypto_shash *tfm; 7548c2ecf20Sopenharmony_ci int rc; 7558c2ecf20Sopenharmony_ci 7568c2ecf20Sopenharmony_ci tfm = ima_alloc_tfm(hash->algo); 7578c2ecf20Sopenharmony_ci if (IS_ERR(tfm)) 7588c2ecf20Sopenharmony_ci return PTR_ERR(tfm); 7598c2ecf20Sopenharmony_ci 7608c2ecf20Sopenharmony_ci rc = calc_buffer_shash_tfm(buf, len, hash, tfm); 7618c2ecf20Sopenharmony_ci 7628c2ecf20Sopenharmony_ci ima_free_tfm(tfm); 7638c2ecf20Sopenharmony_ci return rc; 7648c2ecf20Sopenharmony_ci} 7658c2ecf20Sopenharmony_ci 7668c2ecf20Sopenharmony_ciint ima_calc_buffer_hash(const void *buf, loff_t len, 7678c2ecf20Sopenharmony_ci struct ima_digest_data *hash) 7688c2ecf20Sopenharmony_ci{ 7698c2ecf20Sopenharmony_ci int rc; 7708c2ecf20Sopenharmony_ci 7718c2ecf20Sopenharmony_ci if (ima_ahash_minsize && len >= ima_ahash_minsize) { 7728c2ecf20Sopenharmony_ci rc = calc_buffer_ahash(buf, len, hash); 7738c2ecf20Sopenharmony_ci if (!rc) 7748c2ecf20Sopenharmony_ci return 0; 7758c2ecf20Sopenharmony_ci } 7768c2ecf20Sopenharmony_ci 7778c2ecf20Sopenharmony_ci return calc_buffer_shash(buf, len, hash); 7788c2ecf20Sopenharmony_ci} 7798c2ecf20Sopenharmony_ci 7808c2ecf20Sopenharmony_cistatic void ima_pcrread(u32 idx, struct tpm_digest *d) 7818c2ecf20Sopenharmony_ci{ 7828c2ecf20Sopenharmony_ci if (!ima_tpm_chip) 7838c2ecf20Sopenharmony_ci return; 7848c2ecf20Sopenharmony_ci 7858c2ecf20Sopenharmony_ci if (tpm_pcr_read(ima_tpm_chip, idx, d) != 0) 7868c2ecf20Sopenharmony_ci pr_err("Error Communicating to TPM chip\n"); 7878c2ecf20Sopenharmony_ci} 7888c2ecf20Sopenharmony_ci 7898c2ecf20Sopenharmony_ci/* 7908c2ecf20Sopenharmony_ci * The boot_aggregate is a cumulative hash over TPM registers 0 - 7. With 7918c2ecf20Sopenharmony_ci * TPM 1.2 the boot_aggregate was based on reading the SHA1 PCRs, but with 7928c2ecf20Sopenharmony_ci * TPM 2.0 hash agility, TPM chips could support multiple TPM PCR banks, 7938c2ecf20Sopenharmony_ci * allowing firmware to configure and enable different banks. 7948c2ecf20Sopenharmony_ci * 7958c2ecf20Sopenharmony_ci * Knowing which TPM bank is read to calculate the boot_aggregate digest 7968c2ecf20Sopenharmony_ci * needs to be conveyed to a verifier. For this reason, use the same 7978c2ecf20Sopenharmony_ci * hash algorithm for reading the TPM PCRs as for calculating the boot 7988c2ecf20Sopenharmony_ci * aggregate digest as stored in the measurement list. 7998c2ecf20Sopenharmony_ci */ 8008c2ecf20Sopenharmony_cistatic int ima_calc_boot_aggregate_tfm(char *digest, u16 alg_id, 8018c2ecf20Sopenharmony_ci struct crypto_shash *tfm) 8028c2ecf20Sopenharmony_ci{ 8038c2ecf20Sopenharmony_ci struct tpm_digest d = { .alg_id = alg_id, .digest = {0} }; 8048c2ecf20Sopenharmony_ci int rc; 8058c2ecf20Sopenharmony_ci u32 i; 8068c2ecf20Sopenharmony_ci SHASH_DESC_ON_STACK(shash, tfm); 8078c2ecf20Sopenharmony_ci 8088c2ecf20Sopenharmony_ci shash->tfm = tfm; 8098c2ecf20Sopenharmony_ci 8108c2ecf20Sopenharmony_ci pr_devel("calculating the boot-aggregate based on TPM bank: %04x\n", 8118c2ecf20Sopenharmony_ci d.alg_id); 8128c2ecf20Sopenharmony_ci 8138c2ecf20Sopenharmony_ci rc = crypto_shash_init(shash); 8148c2ecf20Sopenharmony_ci if (rc != 0) 8158c2ecf20Sopenharmony_ci return rc; 8168c2ecf20Sopenharmony_ci 8178c2ecf20Sopenharmony_ci /* cumulative digest over TPM registers 0-7 */ 8188c2ecf20Sopenharmony_ci for (i = TPM_PCR0; i < TPM_PCR8; i++) { 8198c2ecf20Sopenharmony_ci ima_pcrread(i, &d); 8208c2ecf20Sopenharmony_ci /* now accumulate with current aggregate */ 8218c2ecf20Sopenharmony_ci rc = crypto_shash_update(shash, d.digest, 8228c2ecf20Sopenharmony_ci crypto_shash_digestsize(tfm)); 8238c2ecf20Sopenharmony_ci if (rc != 0) 8248c2ecf20Sopenharmony_ci return rc; 8258c2ecf20Sopenharmony_ci } 8268c2ecf20Sopenharmony_ci /* 8278c2ecf20Sopenharmony_ci * Extend cumulative digest over TPM registers 8-9, which contain 8288c2ecf20Sopenharmony_ci * measurement for the kernel command line (reg. 8) and image (reg. 9) 8298c2ecf20Sopenharmony_ci * in a typical PCR allocation. Registers 8-9 are only included in 8308c2ecf20Sopenharmony_ci * non-SHA1 boot_aggregate digests to avoid ambiguity. 8318c2ecf20Sopenharmony_ci */ 8328c2ecf20Sopenharmony_ci if (alg_id != TPM_ALG_SHA1) { 8338c2ecf20Sopenharmony_ci for (i = TPM_PCR8; i < TPM_PCR10; i++) { 8348c2ecf20Sopenharmony_ci ima_pcrread(i, &d); 8358c2ecf20Sopenharmony_ci rc = crypto_shash_update(shash, d.digest, 8368c2ecf20Sopenharmony_ci crypto_shash_digestsize(tfm)); 8378c2ecf20Sopenharmony_ci } 8388c2ecf20Sopenharmony_ci } 8398c2ecf20Sopenharmony_ci if (!rc) 8408c2ecf20Sopenharmony_ci crypto_shash_final(shash, digest); 8418c2ecf20Sopenharmony_ci return rc; 8428c2ecf20Sopenharmony_ci} 8438c2ecf20Sopenharmony_ci 8448c2ecf20Sopenharmony_ciint ima_calc_boot_aggregate(struct ima_digest_data *hash) 8458c2ecf20Sopenharmony_ci{ 8468c2ecf20Sopenharmony_ci struct crypto_shash *tfm; 8478c2ecf20Sopenharmony_ci u16 crypto_id, alg_id; 8488c2ecf20Sopenharmony_ci int rc, i, bank_idx = -1; 8498c2ecf20Sopenharmony_ci 8508c2ecf20Sopenharmony_ci for (i = 0; i < ima_tpm_chip->nr_allocated_banks; i++) { 8518c2ecf20Sopenharmony_ci crypto_id = ima_tpm_chip->allocated_banks[i].crypto_id; 8528c2ecf20Sopenharmony_ci if (crypto_id == hash->algo) { 8538c2ecf20Sopenharmony_ci bank_idx = i; 8548c2ecf20Sopenharmony_ci break; 8558c2ecf20Sopenharmony_ci } 8568c2ecf20Sopenharmony_ci 8578c2ecf20Sopenharmony_ci if (crypto_id == HASH_ALGO_SHA256) 8588c2ecf20Sopenharmony_ci bank_idx = i; 8598c2ecf20Sopenharmony_ci 8608c2ecf20Sopenharmony_ci if (bank_idx == -1 && crypto_id == HASH_ALGO_SHA1) 8618c2ecf20Sopenharmony_ci bank_idx = i; 8628c2ecf20Sopenharmony_ci } 8638c2ecf20Sopenharmony_ci 8648c2ecf20Sopenharmony_ci if (bank_idx == -1) { 8658c2ecf20Sopenharmony_ci pr_err("No suitable TPM algorithm for boot aggregate\n"); 8668c2ecf20Sopenharmony_ci return 0; 8678c2ecf20Sopenharmony_ci } 8688c2ecf20Sopenharmony_ci 8698c2ecf20Sopenharmony_ci hash->algo = ima_tpm_chip->allocated_banks[bank_idx].crypto_id; 8708c2ecf20Sopenharmony_ci 8718c2ecf20Sopenharmony_ci tfm = ima_alloc_tfm(hash->algo); 8728c2ecf20Sopenharmony_ci if (IS_ERR(tfm)) 8738c2ecf20Sopenharmony_ci return PTR_ERR(tfm); 8748c2ecf20Sopenharmony_ci 8758c2ecf20Sopenharmony_ci hash->length = crypto_shash_digestsize(tfm); 8768c2ecf20Sopenharmony_ci alg_id = ima_tpm_chip->allocated_banks[bank_idx].alg_id; 8778c2ecf20Sopenharmony_ci rc = ima_calc_boot_aggregate_tfm(hash->digest, alg_id, tfm); 8788c2ecf20Sopenharmony_ci 8798c2ecf20Sopenharmony_ci ima_free_tfm(tfm); 8808c2ecf20Sopenharmony_ci 8818c2ecf20Sopenharmony_ci return rc; 8828c2ecf20Sopenharmony_ci} 883