| 1 | // SPDX-License-Identifier: GPL-2.0-only |
| 2 | #include <linux/key.h> |
| 3 | #include <linux/keyctl.h> |
| 4 | #include <keys/user-type.h> |
| 5 | #include <linux/crash_dump.h> |
| 6 | #include <linux/cc_platform.h> |
| 7 | #include <linux/configfs.h> |
| 8 | #include <linux/module.h> |
| 9 | |
| 10 | #define KEY_NUM_MAX 128 /* maximum dm crypt keys */ |
| 11 | #define KEY_SIZE_MAX 256 /* maximum dm crypt key size */ |
| 12 | #define KEY_DESC_MAX_LEN 128 /* maximum dm crypt key description size */ |
| 13 | |
| 14 | static unsigned int key_count; |
| 15 | |
| 16 | struct dm_crypt_key { |
| 17 | unsigned int key_size; |
| 18 | char key_desc[KEY_DESC_MAX_LEN]; |
| 19 | u8 data[KEY_SIZE_MAX]; |
| 20 | }; |
| 21 | |
| 22 | static struct { |
| 23 | unsigned int ; |
| 24 | struct dm_crypt_key [] __counted_by(total_keys); |
| 25 | } *; |
| 26 | |
| 27 | static size_t (size_t total_keys) |
| 28 | { |
| 29 | return struct_size(keys_header, keys, total_keys); |
| 30 | } |
| 31 | |
| 32 | unsigned long long dm_crypt_keys_addr; |
| 33 | EXPORT_SYMBOL_GPL(dm_crypt_keys_addr); |
| 34 | |
| 35 | static int __init setup_dmcryptkeys(char *arg) |
| 36 | { |
| 37 | char *end; |
| 38 | |
| 39 | if (!arg) |
| 40 | return -EINVAL; |
| 41 | dm_crypt_keys_addr = memparse(ptr: arg, retptr: &end); |
| 42 | if (end > arg) |
| 43 | return 0; |
| 44 | |
| 45 | dm_crypt_keys_addr = 0; |
| 46 | return -EINVAL; |
| 47 | } |
| 48 | |
| 49 | early_param("dmcryptkeys" , setup_dmcryptkeys); |
| 50 | |
| 51 | /* |
| 52 | * Architectures may override this function to read dm crypt keys |
| 53 | */ |
| 54 | ssize_t __weak dm_crypt_keys_read(char *buf, size_t count, u64 *ppos) |
| 55 | { |
| 56 | struct kvec kvec = { .iov_base = buf, .iov_len = count }; |
| 57 | struct iov_iter iter; |
| 58 | |
| 59 | iov_iter_kvec(i: &iter, READ, kvec: &kvec, nr_segs: 1, count); |
| 60 | return read_from_oldmem(iter: &iter, count, ppos, encrypted: cc_platform_has(attr: CC_ATTR_MEM_ENCRYPT)); |
| 61 | } |
| 62 | |
| 63 | static int add_key_to_keyring(struct dm_crypt_key *dm_key, |
| 64 | key_ref_t keyring_ref) |
| 65 | { |
| 66 | key_ref_t key_ref; |
| 67 | int r; |
| 68 | |
| 69 | /* create or update the requested key and add it to the target keyring */ |
| 70 | key_ref = key_create_or_update(keyring: keyring_ref, type: "user" , description: dm_key->key_desc, |
| 71 | payload: dm_key->data, plen: dm_key->key_size, |
| 72 | KEY_USR_ALL, KEY_ALLOC_IN_QUOTA); |
| 73 | |
| 74 | if (!IS_ERR(ptr: key_ref)) { |
| 75 | r = key_ref_to_ptr(key_ref)->serial; |
| 76 | key_ref_put(key_ref); |
| 77 | kexec_dprintk("Success adding key %s" , dm_key->key_desc); |
| 78 | } else { |
| 79 | r = PTR_ERR(ptr: key_ref); |
| 80 | kexec_dprintk("Error when adding key" ); |
| 81 | } |
| 82 | |
| 83 | key_ref_put(key_ref: keyring_ref); |
| 84 | return r; |
| 85 | } |
| 86 | |
| 87 | static void get_keys_from_kdump_reserved_memory(void) |
| 88 | { |
| 89 | struct keys_header *; |
| 90 | |
| 91 | arch_kexec_unprotect_crashkres(); |
| 92 | |
| 93 | keys_header_loaded = kmap_local_page(pfn_to_page( |
| 94 | kexec_crash_image->dm_crypt_keys_addr >> PAGE_SHIFT)); |
| 95 | |
| 96 | memcpy(keys_header, keys_header_loaded, get_keys_header_size(key_count)); |
| 97 | kunmap_local(keys_header_loaded); |
| 98 | arch_kexec_protect_crashkres(); |
| 99 | } |
| 100 | |
| 101 | static int restore_dm_crypt_keys_to_thread_keyring(void) |
| 102 | { |
| 103 | struct dm_crypt_key *key; |
| 104 | size_t ; |
| 105 | key_ref_t keyring_ref; |
| 106 | u64 addr; |
| 107 | |
| 108 | /* find the target keyring (which must be writable) */ |
| 109 | keyring_ref = |
| 110 | lookup_user_key(KEY_SPEC_USER_KEYRING, flags: 0x01, need_perm: KEY_NEED_WRITE); |
| 111 | if (IS_ERR(ptr: keyring_ref)) { |
| 112 | kexec_dprintk("Failed to get the user keyring\n" ); |
| 113 | return PTR_ERR(ptr: keyring_ref); |
| 114 | } |
| 115 | |
| 116 | addr = dm_crypt_keys_addr; |
| 117 | dm_crypt_keys_read(buf: (char *)&key_count, count: sizeof(key_count), ppos: &addr); |
| 118 | if (key_count < 0 || key_count > KEY_NUM_MAX) { |
| 119 | kexec_dprintk("Failed to read the number of dm-crypt keys\n" ); |
| 120 | return -1; |
| 121 | } |
| 122 | |
| 123 | kexec_dprintk("There are %u keys\n" , key_count); |
| 124 | addr = dm_crypt_keys_addr; |
| 125 | |
| 126 | keys_header_size = get_keys_header_size(total_keys: key_count); |
| 127 | keys_header = kzalloc(keys_header_size, GFP_KERNEL); |
| 128 | if (!keys_header) |
| 129 | return -ENOMEM; |
| 130 | |
| 131 | dm_crypt_keys_read(buf: (char *)keys_header, count: keys_header_size, ppos: &addr); |
| 132 | |
| 133 | for (int i = 0; i < keys_header->total_keys; i++) { |
| 134 | key = &keys_header->keys[i]; |
| 135 | kexec_dprintk("Get key (size=%u)\n" , key->key_size); |
| 136 | add_key_to_keyring(dm_key: key, keyring_ref); |
| 137 | } |
| 138 | |
| 139 | return 0; |
| 140 | } |
| 141 | |
| 142 | static int read_key_from_user_keying(struct dm_crypt_key *dm_key) |
| 143 | { |
| 144 | const struct user_key_payload *ukp; |
| 145 | struct key *key; |
| 146 | |
| 147 | kexec_dprintk("Requesting logon key %s" , dm_key->key_desc); |
| 148 | key = request_key(type: &key_type_logon, description: dm_key->key_desc, NULL); |
| 149 | |
| 150 | if (IS_ERR(ptr: key)) { |
| 151 | pr_warn("No such logon key %s\n" , dm_key->key_desc); |
| 152 | return PTR_ERR(ptr: key); |
| 153 | } |
| 154 | |
| 155 | ukp = user_key_payload_locked(key); |
| 156 | if (!ukp) |
| 157 | return -EKEYREVOKED; |
| 158 | |
| 159 | if (ukp->datalen > KEY_SIZE_MAX) { |
| 160 | pr_err("Key size %u exceeds maximum (%u)\n" , ukp->datalen, KEY_SIZE_MAX); |
| 161 | return -EINVAL; |
| 162 | } |
| 163 | |
| 164 | memcpy(dm_key->data, ukp->data, ukp->datalen); |
| 165 | dm_key->key_size = ukp->datalen; |
| 166 | kexec_dprintk("Get dm crypt key (size=%u) %s: %8ph\n" , dm_key->key_size, |
| 167 | dm_key->key_desc, dm_key->data); |
| 168 | return 0; |
| 169 | } |
| 170 | |
| 171 | struct config_key { |
| 172 | struct config_item item; |
| 173 | const char *description; |
| 174 | }; |
| 175 | |
| 176 | static inline struct config_key *to_config_key(struct config_item *item) |
| 177 | { |
| 178 | return container_of(item, struct config_key, item); |
| 179 | } |
| 180 | |
| 181 | static ssize_t config_key_description_show(struct config_item *item, char *page) |
| 182 | { |
| 183 | return sprintf(buf: page, fmt: "%s\n" , to_config_key(item)->description); |
| 184 | } |
| 185 | |
| 186 | static ssize_t config_key_description_store(struct config_item *item, |
| 187 | const char *page, size_t count) |
| 188 | { |
| 189 | struct config_key *config_key = to_config_key(item); |
| 190 | size_t len; |
| 191 | int ret; |
| 192 | |
| 193 | ret = -EINVAL; |
| 194 | len = strcspn(page, "\n" ); |
| 195 | |
| 196 | if (len > KEY_DESC_MAX_LEN) { |
| 197 | pr_err("The key description shouldn't exceed %u characters" , KEY_DESC_MAX_LEN); |
| 198 | return ret; |
| 199 | } |
| 200 | |
| 201 | if (!len) |
| 202 | return ret; |
| 203 | |
| 204 | kfree(objp: config_key->description); |
| 205 | ret = -ENOMEM; |
| 206 | config_key->description = kmemdup_nul(s: page, len, GFP_KERNEL); |
| 207 | if (!config_key->description) |
| 208 | return ret; |
| 209 | |
| 210 | return count; |
| 211 | } |
| 212 | |
| 213 | CONFIGFS_ATTR(config_key_, description); |
| 214 | |
| 215 | static struct configfs_attribute *config_key_attrs[] = { |
| 216 | &config_key_attr_description, |
| 217 | NULL, |
| 218 | }; |
| 219 | |
| 220 | static void config_key_release(struct config_item *item) |
| 221 | { |
| 222 | kfree(objp: to_config_key(item)); |
| 223 | key_count--; |
| 224 | } |
| 225 | |
| 226 | static struct configfs_item_operations config_key_item_ops = { |
| 227 | .release = config_key_release, |
| 228 | }; |
| 229 | |
| 230 | static const struct config_item_type config_key_type = { |
| 231 | .ct_item_ops = &config_key_item_ops, |
| 232 | .ct_attrs = config_key_attrs, |
| 233 | .ct_owner = THIS_MODULE, |
| 234 | }; |
| 235 | |
| 236 | static struct config_item *config_keys_make_item(struct config_group *group, |
| 237 | const char *name) |
| 238 | { |
| 239 | struct config_key *config_key; |
| 240 | |
| 241 | if (key_count > KEY_NUM_MAX) { |
| 242 | pr_err("Only %u keys at maximum to be created\n" , KEY_NUM_MAX); |
| 243 | return ERR_PTR(error: -EINVAL); |
| 244 | } |
| 245 | |
| 246 | config_key = kzalloc(sizeof(struct config_key), GFP_KERNEL); |
| 247 | if (!config_key) |
| 248 | return ERR_PTR(error: -ENOMEM); |
| 249 | |
| 250 | config_item_init_type_name(item: &config_key->item, name, type: &config_key_type); |
| 251 | |
| 252 | key_count++; |
| 253 | |
| 254 | return &config_key->item; |
| 255 | } |
| 256 | |
| 257 | static ssize_t config_keys_count_show(struct config_item *item, char *page) |
| 258 | { |
| 259 | return sprintf(buf: page, fmt: "%d\n" , key_count); |
| 260 | } |
| 261 | |
| 262 | CONFIGFS_ATTR_RO(config_keys_, count); |
| 263 | |
| 264 | static bool is_dm_key_reused; |
| 265 | |
| 266 | static ssize_t config_keys_reuse_show(struct config_item *item, char *page) |
| 267 | { |
| 268 | return sprintf(buf: page, fmt: "%d\n" , is_dm_key_reused); |
| 269 | } |
| 270 | |
| 271 | static ssize_t config_keys_reuse_store(struct config_item *item, |
| 272 | const char *page, size_t count) |
| 273 | { |
| 274 | if (!kexec_crash_image || !kexec_crash_image->dm_crypt_keys_addr) { |
| 275 | kexec_dprintk( |
| 276 | "dm-crypt keys haven't be saved to crash-reserved memory\n" ); |
| 277 | return -EINVAL; |
| 278 | } |
| 279 | |
| 280 | if (kstrtobool(s: page, res: &is_dm_key_reused)) |
| 281 | return -EINVAL; |
| 282 | |
| 283 | if (is_dm_key_reused) |
| 284 | get_keys_from_kdump_reserved_memory(); |
| 285 | |
| 286 | return count; |
| 287 | } |
| 288 | |
| 289 | CONFIGFS_ATTR(config_keys_, reuse); |
| 290 | |
| 291 | static struct configfs_attribute *config_keys_attrs[] = { |
| 292 | &config_keys_attr_count, |
| 293 | &config_keys_attr_reuse, |
| 294 | NULL, |
| 295 | }; |
| 296 | |
| 297 | /* |
| 298 | * Note that, since no extra work is required on ->drop_item(), |
| 299 | * no ->drop_item() is provided. |
| 300 | */ |
| 301 | static struct configfs_group_operations config_keys_group_ops = { |
| 302 | .make_item = config_keys_make_item, |
| 303 | }; |
| 304 | |
| 305 | static const struct config_item_type config_keys_type = { |
| 306 | .ct_group_ops = &config_keys_group_ops, |
| 307 | .ct_attrs = config_keys_attrs, |
| 308 | .ct_owner = THIS_MODULE, |
| 309 | }; |
| 310 | |
| 311 | static bool restore; |
| 312 | |
| 313 | static ssize_t config_keys_restore_show(struct config_item *item, char *page) |
| 314 | { |
| 315 | return sprintf(buf: page, fmt: "%d\n" , restore); |
| 316 | } |
| 317 | |
| 318 | static ssize_t config_keys_restore_store(struct config_item *item, |
| 319 | const char *page, size_t count) |
| 320 | { |
| 321 | if (!restore) |
| 322 | restore_dm_crypt_keys_to_thread_keyring(); |
| 323 | |
| 324 | if (kstrtobool(s: page, res: &restore)) |
| 325 | return -EINVAL; |
| 326 | |
| 327 | return count; |
| 328 | } |
| 329 | |
| 330 | CONFIGFS_ATTR(config_keys_, restore); |
| 331 | |
| 332 | static struct configfs_attribute *kdump_config_keys_attrs[] = { |
| 333 | &config_keys_attr_restore, |
| 334 | NULL, |
| 335 | }; |
| 336 | |
| 337 | static const struct config_item_type kdump_config_keys_type = { |
| 338 | .ct_attrs = kdump_config_keys_attrs, |
| 339 | .ct_owner = THIS_MODULE, |
| 340 | }; |
| 341 | |
| 342 | static struct configfs_subsystem config_keys_subsys = { |
| 343 | .su_group = { |
| 344 | .cg_item = { |
| 345 | .ci_namebuf = "crash_dm_crypt_keys" , |
| 346 | .ci_type = &config_keys_type, |
| 347 | }, |
| 348 | }, |
| 349 | }; |
| 350 | |
| 351 | static int (void) |
| 352 | { |
| 353 | struct config_item *item = NULL; |
| 354 | struct config_key *key; |
| 355 | int i, r; |
| 356 | |
| 357 | if (keys_header != NULL) |
| 358 | kvfree(addr: keys_header); |
| 359 | |
| 360 | keys_header = kzalloc(get_keys_header_size(key_count), GFP_KERNEL); |
| 361 | if (!keys_header) |
| 362 | return -ENOMEM; |
| 363 | |
| 364 | keys_header->total_keys = key_count; |
| 365 | |
| 366 | i = 0; |
| 367 | list_for_each_entry(item, &config_keys_subsys.su_group.cg_children, |
| 368 | ci_entry) { |
| 369 | if (item->ci_type != &config_key_type) |
| 370 | continue; |
| 371 | |
| 372 | key = to_config_key(item); |
| 373 | |
| 374 | if (!key->description) { |
| 375 | pr_warn("No key description for key %s\n" , item->ci_name); |
| 376 | return -EINVAL; |
| 377 | } |
| 378 | |
| 379 | strscpy(keys_header->keys[i].key_desc, key->description, |
| 380 | KEY_DESC_MAX_LEN); |
| 381 | r = read_key_from_user_keying(dm_key: &keys_header->keys[i]); |
| 382 | if (r != 0) { |
| 383 | kexec_dprintk("Failed to read key %s\n" , |
| 384 | keys_header->keys[i].key_desc); |
| 385 | return r; |
| 386 | } |
| 387 | i++; |
| 388 | kexec_dprintk("Found key: %s\n" , item->ci_name); |
| 389 | } |
| 390 | |
| 391 | return 0; |
| 392 | } |
| 393 | |
| 394 | int crash_load_dm_crypt_keys(struct kimage *image) |
| 395 | { |
| 396 | struct kexec_buf kbuf = { |
| 397 | .image = image, |
| 398 | .buf_min = 0, |
| 399 | .buf_max = ULONG_MAX, |
| 400 | .top_down = false, |
| 401 | .random = true, |
| 402 | }; |
| 403 | int r; |
| 404 | |
| 405 | |
| 406 | if (key_count <= 0) { |
| 407 | kexec_dprintk("No dm-crypt keys\n" ); |
| 408 | return -ENOENT; |
| 409 | } |
| 410 | |
| 411 | if (!is_dm_key_reused) { |
| 412 | image->dm_crypt_keys_addr = 0; |
| 413 | r = build_keys_header(); |
| 414 | if (r) |
| 415 | return r; |
| 416 | } |
| 417 | |
| 418 | kbuf.buffer = keys_header; |
| 419 | kbuf.bufsz = get_keys_header_size(total_keys: key_count); |
| 420 | |
| 421 | kbuf.memsz = kbuf.bufsz; |
| 422 | kbuf.buf_align = ELF_CORE_HEADER_ALIGN; |
| 423 | kbuf.mem = KEXEC_BUF_MEM_UNKNOWN; |
| 424 | r = kexec_add_buffer(kbuf: &kbuf); |
| 425 | if (r) { |
| 426 | kvfree(addr: (void *)kbuf.buffer); |
| 427 | return r; |
| 428 | } |
| 429 | image->dm_crypt_keys_addr = kbuf.mem; |
| 430 | image->dm_crypt_keys_sz = kbuf.bufsz; |
| 431 | kexec_dprintk( |
| 432 | "Loaded dm crypt keys to kexec_buffer bufsz=0x%lx memsz=0x%lx\n" , |
| 433 | kbuf.bufsz, kbuf.memsz); |
| 434 | |
| 435 | return r; |
| 436 | } |
| 437 | |
| 438 | static int __init configfs_dmcrypt_keys_init(void) |
| 439 | { |
| 440 | int ret; |
| 441 | |
| 442 | if (is_kdump_kernel()) { |
| 443 | config_keys_subsys.su_group.cg_item.ci_type = |
| 444 | &kdump_config_keys_type; |
| 445 | } |
| 446 | |
| 447 | config_group_init(group: &config_keys_subsys.su_group); |
| 448 | mutex_init(&config_keys_subsys.su_mutex); |
| 449 | ret = configfs_register_subsystem(subsys: &config_keys_subsys); |
| 450 | if (ret) { |
| 451 | pr_err("Error %d while registering subsystem %s\n" , ret, |
| 452 | config_keys_subsys.su_group.cg_item.ci_namebuf); |
| 453 | goto out_unregister; |
| 454 | } |
| 455 | |
| 456 | return 0; |
| 457 | |
| 458 | out_unregister: |
| 459 | configfs_unregister_subsystem(subsys: &config_keys_subsys); |
| 460 | |
| 461 | return ret; |
| 462 | } |
| 463 | |
| 464 | module_init(configfs_dmcrypt_keys_init); |
| 465 | |