1// SPDX-License-Identifier: GPL-2.0-only
2#include <linux/key.h>
3#include <linux/keyctl.h>
4#include <keys/user-type.h>
5#include <linux/crash_dump.h>
6#include <linux/cc_platform.h>
7#include <linux/configfs.h>
8#include <linux/module.h>
9
10#define KEY_NUM_MAX 128 /* maximum dm crypt keys */
11#define KEY_SIZE_MAX 256 /* maximum dm crypt key size */
12#define KEY_DESC_MAX_LEN 128 /* maximum dm crypt key description size */
13
14static unsigned int key_count;
15
16struct dm_crypt_key {
17 unsigned int key_size;
18 char key_desc[KEY_DESC_MAX_LEN];
19 u8 data[KEY_SIZE_MAX];
20};
21
22static struct keys_header {
23 unsigned int total_keys;
24 struct dm_crypt_key keys[] __counted_by(total_keys);
25} *keys_header;
26
27static size_t get_keys_header_size(size_t total_keys)
28{
29 return struct_size(keys_header, keys, total_keys);
30}
31
32unsigned long long dm_crypt_keys_addr;
33EXPORT_SYMBOL_GPL(dm_crypt_keys_addr);
34
35static int __init setup_dmcryptkeys(char *arg)
36{
37 char *end;
38
39 if (!arg)
40 return -EINVAL;
41 dm_crypt_keys_addr = memparse(ptr: arg, retptr: &end);
42 if (end > arg)
43 return 0;
44
45 dm_crypt_keys_addr = 0;
46 return -EINVAL;
47}
48
49early_param("dmcryptkeys", setup_dmcryptkeys);
50
51/*
52 * Architectures may override this function to read dm crypt keys
53 */
54ssize_t __weak dm_crypt_keys_read(char *buf, size_t count, u64 *ppos)
55{
56 struct kvec kvec = { .iov_base = buf, .iov_len = count };
57 struct iov_iter iter;
58
59 iov_iter_kvec(i: &iter, READ, kvec: &kvec, nr_segs: 1, count);
60 return read_from_oldmem(iter: &iter, count, ppos, encrypted: cc_platform_has(attr: CC_ATTR_MEM_ENCRYPT));
61}
62
63static int add_key_to_keyring(struct dm_crypt_key *dm_key,
64 key_ref_t keyring_ref)
65{
66 key_ref_t key_ref;
67 int r;
68
69 /* create or update the requested key and add it to the target keyring */
70 key_ref = key_create_or_update(keyring: keyring_ref, type: "user", description: dm_key->key_desc,
71 payload: dm_key->data, plen: dm_key->key_size,
72 KEY_USR_ALL, KEY_ALLOC_IN_QUOTA);
73
74 if (!IS_ERR(ptr: key_ref)) {
75 r = key_ref_to_ptr(key_ref)->serial;
76 key_ref_put(key_ref);
77 kexec_dprintk("Success adding key %s", dm_key->key_desc);
78 } else {
79 r = PTR_ERR(ptr: key_ref);
80 kexec_dprintk("Error when adding key");
81 }
82
83 key_ref_put(key_ref: keyring_ref);
84 return r;
85}
86
87static void get_keys_from_kdump_reserved_memory(void)
88{
89 struct keys_header *keys_header_loaded;
90
91 arch_kexec_unprotect_crashkres();
92
93 keys_header_loaded = kmap_local_page(pfn_to_page(
94 kexec_crash_image->dm_crypt_keys_addr >> PAGE_SHIFT));
95
96 memcpy(keys_header, keys_header_loaded, get_keys_header_size(key_count));
97 kunmap_local(keys_header_loaded);
98 arch_kexec_protect_crashkres();
99}
100
101static int restore_dm_crypt_keys_to_thread_keyring(void)
102{
103 struct dm_crypt_key *key;
104 size_t keys_header_size;
105 key_ref_t keyring_ref;
106 u64 addr;
107
108 /* find the target keyring (which must be writable) */
109 keyring_ref =
110 lookup_user_key(KEY_SPEC_USER_KEYRING, flags: 0x01, need_perm: KEY_NEED_WRITE);
111 if (IS_ERR(ptr: keyring_ref)) {
112 kexec_dprintk("Failed to get the user keyring\n");
113 return PTR_ERR(ptr: keyring_ref);
114 }
115
116 addr = dm_crypt_keys_addr;
117 dm_crypt_keys_read(buf: (char *)&key_count, count: sizeof(key_count), ppos: &addr);
118 if (key_count < 0 || key_count > KEY_NUM_MAX) {
119 kexec_dprintk("Failed to read the number of dm-crypt keys\n");
120 return -1;
121 }
122
123 kexec_dprintk("There are %u keys\n", key_count);
124 addr = dm_crypt_keys_addr;
125
126 keys_header_size = get_keys_header_size(total_keys: key_count);
127 keys_header = kzalloc(keys_header_size, GFP_KERNEL);
128 if (!keys_header)
129 return -ENOMEM;
130
131 dm_crypt_keys_read(buf: (char *)keys_header, count: keys_header_size, ppos: &addr);
132
133 for (int i = 0; i < keys_header->total_keys; i++) {
134 key = &keys_header->keys[i];
135 kexec_dprintk("Get key (size=%u)\n", key->key_size);
136 add_key_to_keyring(dm_key: key, keyring_ref);
137 }
138
139 return 0;
140}
141
142static int read_key_from_user_keying(struct dm_crypt_key *dm_key)
143{
144 const struct user_key_payload *ukp;
145 struct key *key;
146
147 kexec_dprintk("Requesting logon key %s", dm_key->key_desc);
148 key = request_key(type: &key_type_logon, description: dm_key->key_desc, NULL);
149
150 if (IS_ERR(ptr: key)) {
151 pr_warn("No such logon key %s\n", dm_key->key_desc);
152 return PTR_ERR(ptr: key);
153 }
154
155 ukp = user_key_payload_locked(key);
156 if (!ukp)
157 return -EKEYREVOKED;
158
159 if (ukp->datalen > KEY_SIZE_MAX) {
160 pr_err("Key size %u exceeds maximum (%u)\n", ukp->datalen, KEY_SIZE_MAX);
161 return -EINVAL;
162 }
163
164 memcpy(dm_key->data, ukp->data, ukp->datalen);
165 dm_key->key_size = ukp->datalen;
166 kexec_dprintk("Get dm crypt key (size=%u) %s: %8ph\n", dm_key->key_size,
167 dm_key->key_desc, dm_key->data);
168 return 0;
169}
170
171struct config_key {
172 struct config_item item;
173 const char *description;
174};
175
176static inline struct config_key *to_config_key(struct config_item *item)
177{
178 return container_of(item, struct config_key, item);
179}
180
181static ssize_t config_key_description_show(struct config_item *item, char *page)
182{
183 return sprintf(buf: page, fmt: "%s\n", to_config_key(item)->description);
184}
185
186static ssize_t config_key_description_store(struct config_item *item,
187 const char *page, size_t count)
188{
189 struct config_key *config_key = to_config_key(item);
190 size_t len;
191 int ret;
192
193 ret = -EINVAL;
194 len = strcspn(page, "\n");
195
196 if (len > KEY_DESC_MAX_LEN) {
197 pr_err("The key description shouldn't exceed %u characters", KEY_DESC_MAX_LEN);
198 return ret;
199 }
200
201 if (!len)
202 return ret;
203
204 kfree(objp: config_key->description);
205 ret = -ENOMEM;
206 config_key->description = kmemdup_nul(s: page, len, GFP_KERNEL);
207 if (!config_key->description)
208 return ret;
209
210 return count;
211}
212
213CONFIGFS_ATTR(config_key_, description);
214
215static struct configfs_attribute *config_key_attrs[] = {
216 &config_key_attr_description,
217 NULL,
218};
219
220static void config_key_release(struct config_item *item)
221{
222 kfree(objp: to_config_key(item));
223 key_count--;
224}
225
226static struct configfs_item_operations config_key_item_ops = {
227 .release = config_key_release,
228};
229
230static const struct config_item_type config_key_type = {
231 .ct_item_ops = &config_key_item_ops,
232 .ct_attrs = config_key_attrs,
233 .ct_owner = THIS_MODULE,
234};
235
236static struct config_item *config_keys_make_item(struct config_group *group,
237 const char *name)
238{
239 struct config_key *config_key;
240
241 if (key_count > KEY_NUM_MAX) {
242 pr_err("Only %u keys at maximum to be created\n", KEY_NUM_MAX);
243 return ERR_PTR(error: -EINVAL);
244 }
245
246 config_key = kzalloc(sizeof(struct config_key), GFP_KERNEL);
247 if (!config_key)
248 return ERR_PTR(error: -ENOMEM);
249
250 config_item_init_type_name(item: &config_key->item, name, type: &config_key_type);
251
252 key_count++;
253
254 return &config_key->item;
255}
256
257static ssize_t config_keys_count_show(struct config_item *item, char *page)
258{
259 return sprintf(buf: page, fmt: "%d\n", key_count);
260}
261
262CONFIGFS_ATTR_RO(config_keys_, count);
263
264static bool is_dm_key_reused;
265
266static ssize_t config_keys_reuse_show(struct config_item *item, char *page)
267{
268 return sprintf(buf: page, fmt: "%d\n", is_dm_key_reused);
269}
270
271static ssize_t config_keys_reuse_store(struct config_item *item,
272 const char *page, size_t count)
273{
274 if (!kexec_crash_image || !kexec_crash_image->dm_crypt_keys_addr) {
275 kexec_dprintk(
276 "dm-crypt keys haven't be saved to crash-reserved memory\n");
277 return -EINVAL;
278 }
279
280 if (kstrtobool(s: page, res: &is_dm_key_reused))
281 return -EINVAL;
282
283 if (is_dm_key_reused)
284 get_keys_from_kdump_reserved_memory();
285
286 return count;
287}
288
289CONFIGFS_ATTR(config_keys_, reuse);
290
291static struct configfs_attribute *config_keys_attrs[] = {
292 &config_keys_attr_count,
293 &config_keys_attr_reuse,
294 NULL,
295};
296
297/*
298 * Note that, since no extra work is required on ->drop_item(),
299 * no ->drop_item() is provided.
300 */
301static struct configfs_group_operations config_keys_group_ops = {
302 .make_item = config_keys_make_item,
303};
304
305static const struct config_item_type config_keys_type = {
306 .ct_group_ops = &config_keys_group_ops,
307 .ct_attrs = config_keys_attrs,
308 .ct_owner = THIS_MODULE,
309};
310
311static bool restore;
312
313static ssize_t config_keys_restore_show(struct config_item *item, char *page)
314{
315 return sprintf(buf: page, fmt: "%d\n", restore);
316}
317
318static ssize_t config_keys_restore_store(struct config_item *item,
319 const char *page, size_t count)
320{
321 if (!restore)
322 restore_dm_crypt_keys_to_thread_keyring();
323
324 if (kstrtobool(s: page, res: &restore))
325 return -EINVAL;
326
327 return count;
328}
329
330CONFIGFS_ATTR(config_keys_, restore);
331
332static struct configfs_attribute *kdump_config_keys_attrs[] = {
333 &config_keys_attr_restore,
334 NULL,
335};
336
337static const struct config_item_type kdump_config_keys_type = {
338 .ct_attrs = kdump_config_keys_attrs,
339 .ct_owner = THIS_MODULE,
340};
341
342static struct configfs_subsystem config_keys_subsys = {
343 .su_group = {
344 .cg_item = {
345 .ci_namebuf = "crash_dm_crypt_keys",
346 .ci_type = &config_keys_type,
347 },
348 },
349};
350
351static int build_keys_header(void)
352{
353 struct config_item *item = NULL;
354 struct config_key *key;
355 int i, r;
356
357 if (keys_header != NULL)
358 kvfree(addr: keys_header);
359
360 keys_header = kzalloc(get_keys_header_size(key_count), GFP_KERNEL);
361 if (!keys_header)
362 return -ENOMEM;
363
364 keys_header->total_keys = key_count;
365
366 i = 0;
367 list_for_each_entry(item, &config_keys_subsys.su_group.cg_children,
368 ci_entry) {
369 if (item->ci_type != &config_key_type)
370 continue;
371
372 key = to_config_key(item);
373
374 if (!key->description) {
375 pr_warn("No key description for key %s\n", item->ci_name);
376 return -EINVAL;
377 }
378
379 strscpy(keys_header->keys[i].key_desc, key->description,
380 KEY_DESC_MAX_LEN);
381 r = read_key_from_user_keying(dm_key: &keys_header->keys[i]);
382 if (r != 0) {
383 kexec_dprintk("Failed to read key %s\n",
384 keys_header->keys[i].key_desc);
385 return r;
386 }
387 i++;
388 kexec_dprintk("Found key: %s\n", item->ci_name);
389 }
390
391 return 0;
392}
393
394int crash_load_dm_crypt_keys(struct kimage *image)
395{
396 struct kexec_buf kbuf = {
397 .image = image,
398 .buf_min = 0,
399 .buf_max = ULONG_MAX,
400 .top_down = false,
401 .random = true,
402 };
403 int r;
404
405
406 if (key_count <= 0) {
407 kexec_dprintk("No dm-crypt keys\n");
408 return -ENOENT;
409 }
410
411 if (!is_dm_key_reused) {
412 image->dm_crypt_keys_addr = 0;
413 r = build_keys_header();
414 if (r)
415 return r;
416 }
417
418 kbuf.buffer = keys_header;
419 kbuf.bufsz = get_keys_header_size(total_keys: key_count);
420
421 kbuf.memsz = kbuf.bufsz;
422 kbuf.buf_align = ELF_CORE_HEADER_ALIGN;
423 kbuf.mem = KEXEC_BUF_MEM_UNKNOWN;
424 r = kexec_add_buffer(kbuf: &kbuf);
425 if (r) {
426 kvfree(addr: (void *)kbuf.buffer);
427 return r;
428 }
429 image->dm_crypt_keys_addr = kbuf.mem;
430 image->dm_crypt_keys_sz = kbuf.bufsz;
431 kexec_dprintk(
432 "Loaded dm crypt keys to kexec_buffer bufsz=0x%lx memsz=0x%lx\n",
433 kbuf.bufsz, kbuf.memsz);
434
435 return r;
436}
437
438static int __init configfs_dmcrypt_keys_init(void)
439{
440 int ret;
441
442 if (is_kdump_kernel()) {
443 config_keys_subsys.su_group.cg_item.ci_type =
444 &kdump_config_keys_type;
445 }
446
447 config_group_init(group: &config_keys_subsys.su_group);
448 mutex_init(&config_keys_subsys.su_mutex);
449 ret = configfs_register_subsystem(subsys: &config_keys_subsys);
450 if (ret) {
451 pr_err("Error %d while registering subsystem %s\n", ret,
452 config_keys_subsys.su_group.cg_item.ci_namebuf);
453 goto out_unregister;
454 }
455
456 return 0;
457
458out_unregister:
459 configfs_unregister_subsystem(subsys: &config_keys_subsys);
460
461 return ret;
462}
463
464module_init(configfs_dmcrypt_keys_init);
465

source code of linux/kernel/crash_dump_dm_crypt.c

Morty Proxy This is a proxified and sanitized view of the page, visit original site.