dm-default-key.c 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436
  1. // SPDX-License-Identifier: GPL-2.0
  2. /*
  3. * Copyright (C) 2017 Google, Inc.
  4. */
  5. #include <linux/blk-crypto.h>
  6. #include <linux/device-mapper.h>
  7. #include <linux/module.h>
  8. #define DM_MSG_PREFIX "default-key"
  9. static const struct dm_default_key_cipher {
  10. const char *name;
  11. enum blk_crypto_mode_num mode_num;
  12. int key_size;
  13. } dm_default_key_ciphers[] = {
  14. {
  15. .name = "aes-xts-plain64",
  16. .mode_num = BLK_ENCRYPTION_MODE_AES_256_XTS,
  17. .key_size = 64,
  18. }, {
  19. .name = "xchacha12,aes-adiantum-plain64",
  20. .mode_num = BLK_ENCRYPTION_MODE_ADIANTUM,
  21. .key_size = 32,
  22. },
  23. };
  24. /**
  25. * struct dm_default_c - private data of a default-key target
  26. * @dev: the underlying device
  27. * @start: starting sector of the range of @dev which this target actually maps.
  28. * For this purpose a "sector" is 512 bytes.
  29. * @cipher_string: the name of the encryption algorithm being used
  30. * @iv_offset: starting offset for IVs. IVs are generated as if the target were
  31. * preceded by @iv_offset 512-byte sectors.
  32. * @sector_size: crypto sector size in bytes (usually 4096)
  33. * @sector_bits: log2(sector_size)
  34. * @key: the encryption key to use
  35. * @max_dun: the maximum DUN that may be used (computed from other params)
  36. */
  37. struct default_key_c {
  38. struct dm_dev *dev;
  39. sector_t start;
  40. const char *cipher_string;
  41. u64 iv_offset;
  42. unsigned int sector_size;
  43. unsigned int sector_bits;
  44. struct blk_crypto_key key;
  45. enum blk_crypto_key_type key_type;
  46. u64 max_dun;
  47. };
  48. static const struct dm_default_key_cipher *
  49. lookup_cipher(const char *cipher_string)
  50. {
  51. int i;
  52. for (i = 0; i < ARRAY_SIZE(dm_default_key_ciphers); i++) {
  53. if (strcmp(cipher_string, dm_default_key_ciphers[i].name) == 0)
  54. return &dm_default_key_ciphers[i];
  55. }
  56. return NULL;
  57. }
  58. static void default_key_dtr(struct dm_target *ti)
  59. {
  60. struct default_key_c *dkc = ti->private;
  61. if (dkc->dev) {
  62. blk_crypto_evict_key(dkc->dev->bdev, &dkc->key);
  63. dm_put_device(ti, dkc->dev);
  64. }
  65. kfree_sensitive(dkc->cipher_string);
  66. kfree_sensitive(dkc);
  67. }
  68. static int default_key_ctr_optional(struct dm_target *ti,
  69. unsigned int argc, char **argv)
  70. {
  71. struct default_key_c *dkc = ti->private;
  72. struct dm_arg_set as;
  73. static const struct dm_arg _args[] = {
  74. {0, 4, "Invalid number of feature args"},
  75. };
  76. unsigned int opt_params;
  77. const char *opt_string;
  78. bool iv_large_sectors = false;
  79. char dummy;
  80. int err;
  81. as.argc = argc;
  82. as.argv = argv;
  83. err = dm_read_arg_group(_args, &as, &opt_params, &ti->error);
  84. if (err)
  85. return err;
  86. while (opt_params--) {
  87. opt_string = dm_shift_arg(&as);
  88. if (!opt_string) {
  89. ti->error = "Not enough feature arguments";
  90. return -EINVAL;
  91. }
  92. if (!strcmp(opt_string, "allow_discards")) {
  93. ti->num_discard_bios = 1;
  94. } else if (sscanf(opt_string, "sector_size:%u%c",
  95. &dkc->sector_size, &dummy) == 1) {
  96. if (dkc->sector_size < SECTOR_SIZE ||
  97. dkc->sector_size > 4096 ||
  98. !is_power_of_2(dkc->sector_size)) {
  99. ti->error = "Invalid sector_size";
  100. return -EINVAL;
  101. }
  102. } else if (!strcmp(opt_string, "iv_large_sectors")) {
  103. iv_large_sectors = true;
  104. } else if (!strcmp(opt_string, "wrappedkey_v0")) {
  105. dkc->key_type = BLK_CRYPTO_KEY_TYPE_HW_WRAPPED;
  106. } else {
  107. ti->error = "Invalid feature arguments";
  108. return -EINVAL;
  109. }
  110. }
  111. /* dm-default-key doesn't implement iv_large_sectors=false. */
  112. if (dkc->sector_size != SECTOR_SIZE && !iv_large_sectors) {
  113. ti->error = "iv_large_sectors must be specified";
  114. return -EINVAL;
  115. }
  116. return 0;
  117. }
  118. /*
  119. * Construct a default-key mapping:
  120. * <cipher> <key> <iv_offset> <dev_path> <start>
  121. *
  122. * This syntax matches dm-crypt's, but lots of unneeded functionality has been
  123. * removed. Also, dm-default-key requires that the "iv_large_sectors" option be
  124. * given whenever a non-default sector size is used.
  125. */
  126. static int default_key_ctr(struct dm_target *ti, unsigned int argc, char **argv)
  127. {
  128. struct default_key_c *dkc;
  129. const struct dm_default_key_cipher *cipher;
  130. u8 raw_key[BLK_CRYPTO_MAX_ANY_KEY_SIZE];
  131. unsigned int raw_key_size;
  132. unsigned int dun_bytes;
  133. unsigned long long tmpll;
  134. char dummy;
  135. int err;
  136. if (argc < 5) {
  137. ti->error = "Not enough arguments";
  138. return -EINVAL;
  139. }
  140. dkc = kzalloc(sizeof(*dkc), GFP_KERNEL);
  141. if (!dkc) {
  142. ti->error = "Out of memory";
  143. return -ENOMEM;
  144. }
  145. ti->private = dkc;
  146. dkc->key_type = BLK_CRYPTO_KEY_TYPE_STANDARD;
  147. /* <cipher> */
  148. dkc->cipher_string = kstrdup(argv[0], GFP_KERNEL);
  149. if (!dkc->cipher_string) {
  150. ti->error = "Out of memory";
  151. err = -ENOMEM;
  152. goto bad;
  153. }
  154. cipher = lookup_cipher(dkc->cipher_string);
  155. if (!cipher) {
  156. ti->error = "Unsupported cipher";
  157. err = -EINVAL;
  158. goto bad;
  159. }
  160. /* <key> */
  161. raw_key_size = strlen(argv[1]);
  162. if (raw_key_size > 2 * BLK_CRYPTO_MAX_ANY_KEY_SIZE ||
  163. raw_key_size % 2) {
  164. ti->error = "Invalid keysize";
  165. err = -EINVAL;
  166. goto bad;
  167. }
  168. raw_key_size /= 2;
  169. if (hex2bin(raw_key, argv[1], raw_key_size) != 0) {
  170. ti->error = "Malformed key string";
  171. err = -EINVAL;
  172. goto bad;
  173. }
  174. /* <iv_offset> */
  175. if (sscanf(argv[2], "%llu%c", &dkc->iv_offset, &dummy) != 1) {
  176. ti->error = "Invalid iv_offset sector";
  177. err = -EINVAL;
  178. goto bad;
  179. }
  180. /* <dev_path> */
  181. err = dm_get_device(ti, argv[3], dm_table_get_mode(ti->table),
  182. &dkc->dev);
  183. if (err) {
  184. ti->error = "Device lookup failed";
  185. goto bad;
  186. }
  187. /* <start> */
  188. if (sscanf(argv[4], "%llu%c", &tmpll, &dummy) != 1 ||
  189. tmpll != (sector_t)tmpll) {
  190. ti->error = "Invalid start sector";
  191. err = -EINVAL;
  192. goto bad;
  193. }
  194. dkc->start = tmpll;
  195. /* optional arguments */
  196. dkc->sector_size = SECTOR_SIZE;
  197. if (argc > 5) {
  198. err = default_key_ctr_optional(ti, argc - 5, &argv[5]);
  199. if (err)
  200. goto bad;
  201. }
  202. dkc->sector_bits = ilog2(dkc->sector_size);
  203. if (ti->len & ((dkc->sector_size >> SECTOR_SHIFT) - 1)) {
  204. ti->error = "Device size is not a multiple of sector_size";
  205. err = -EINVAL;
  206. goto bad;
  207. }
  208. dkc->max_dun = (dkc->iv_offset + ti->len - 1) >>
  209. (dkc->sector_bits - SECTOR_SHIFT);
  210. dun_bytes = DIV_ROUND_UP(fls64(dkc->max_dun), 8);
  211. err = blk_crypto_init_key(&dkc->key, raw_key, raw_key_size,
  212. dkc->key_type, cipher->mode_num,
  213. dun_bytes, dkc->sector_size);
  214. if (err) {
  215. ti->error = "Error initializing blk-crypto key";
  216. goto bad;
  217. }
  218. err = blk_crypto_start_using_key(dkc->dev->bdev, &dkc->key);
  219. if (err) {
  220. ti->error = "Error starting to use blk-crypto";
  221. goto bad;
  222. }
  223. ti->num_flush_bios = 1;
  224. err = 0;
  225. goto out;
  226. bad:
  227. default_key_dtr(ti);
  228. out:
  229. memzero_explicit(raw_key, sizeof(raw_key));
  230. return err;
  231. }
  232. static int default_key_map(struct dm_target *ti, struct bio *bio)
  233. {
  234. const struct default_key_c *dkc = ti->private;
  235. sector_t sector_in_target;
  236. u64 dun[BLK_CRYPTO_DUN_ARRAY_SIZE] = { 0 };
  237. bio_set_dev(bio, dkc->dev->bdev);
  238. /*
  239. * If the bio is a device-level request which doesn't target a specific
  240. * sector, there's nothing more to do.
  241. */
  242. if (bio_sectors(bio) == 0)
  243. return DM_MAPIO_REMAPPED;
  244. /* Map the bio's sector to the underlying device. (512-byte sectors) */
  245. sector_in_target = dm_target_offset(ti, bio->bi_iter.bi_sector);
  246. bio->bi_iter.bi_sector = dkc->start + sector_in_target;
  247. /*
  248. * If the bio should skip dm-default-key (i.e. if it's for an encrypted
  249. * file's contents), or if it doesn't have any data (e.g. if it's a
  250. * DISCARD request), there's nothing more to do.
  251. */
  252. if (bio_should_skip_dm_default_key(bio) || !bio_has_data(bio))
  253. return DM_MAPIO_REMAPPED;
  254. /*
  255. * Else, dm-default-key needs to set this bio's encryption context.
  256. * It must not already have one.
  257. */
  258. if (WARN_ON_ONCE(bio_has_crypt_ctx(bio)))
  259. return DM_MAPIO_KILL;
  260. /* Calculate the DUN and enforce data-unit (crypto sector) alignment. */
  261. dun[0] = dkc->iv_offset + sector_in_target; /* 512-byte sectors */
  262. if (dun[0] & ((dkc->sector_size >> SECTOR_SHIFT) - 1))
  263. return DM_MAPIO_KILL;
  264. dun[0] >>= dkc->sector_bits - SECTOR_SHIFT; /* crypto sectors */
  265. /*
  266. * This check isn't necessary as we should have calculated max_dun
  267. * correctly, but be safe.
  268. */
  269. if (WARN_ON_ONCE(dun[0] > dkc->max_dun))
  270. return DM_MAPIO_KILL;
  271. bio_crypt_set_ctx(bio, &dkc->key, dun, GFP_NOIO);
  272. return DM_MAPIO_REMAPPED;
  273. }
  274. static void default_key_status(struct dm_target *ti, status_type_t type,
  275. unsigned int status_flags, char *result,
  276. unsigned int maxlen)
  277. {
  278. const struct default_key_c *dkc = ti->private;
  279. unsigned int sz = 0;
  280. int num_feature_args = 0;
  281. switch (type) {
  282. case STATUSTYPE_INFO:
  283. case STATUSTYPE_IMA:
  284. result[0] = '\0';
  285. break;
  286. case STATUSTYPE_TABLE:
  287. /* Omit the key for now. */
  288. DMEMIT("%s - %llu %s %llu", dkc->cipher_string, dkc->iv_offset,
  289. dkc->dev->name, (unsigned long long)dkc->start);
  290. num_feature_args += !!ti->num_discard_bios;
  291. if (dkc->sector_size != SECTOR_SIZE)
  292. num_feature_args += 2;
  293. if (dkc->key_type == BLK_CRYPTO_KEY_TYPE_HW_WRAPPED)
  294. num_feature_args += 1;
  295. if (num_feature_args != 0) {
  296. DMEMIT(" %d", num_feature_args);
  297. if (ti->num_discard_bios)
  298. DMEMIT(" allow_discards");
  299. if (dkc->sector_size != SECTOR_SIZE) {
  300. DMEMIT(" sector_size:%u", dkc->sector_size);
  301. DMEMIT(" iv_large_sectors");
  302. }
  303. if (dkc->key_type == BLK_CRYPTO_KEY_TYPE_HW_WRAPPED)
  304. DMEMIT(" wrappedkey_v0");
  305. }
  306. break;
  307. }
  308. }
  309. static int default_key_prepare_ioctl(struct dm_target *ti,
  310. struct block_device **bdev)
  311. {
  312. const struct default_key_c *dkc = ti->private;
  313. const struct dm_dev *dev = dkc->dev;
  314. *bdev = dev->bdev;
  315. /* Only pass ioctls through if the device sizes match exactly. */
  316. if (dkc->start != 0 ||
  317. ti->len != i_size_read(dev->bdev->bd_inode) >> SECTOR_SHIFT)
  318. return 1;
  319. return 0;
  320. }
  321. static int default_key_iterate_devices(struct dm_target *ti,
  322. iterate_devices_callout_fn fn,
  323. void *data)
  324. {
  325. const struct default_key_c *dkc = ti->private;
  326. return fn(ti, dkc->dev, dkc->start, ti->len, data);
  327. }
  328. static void default_key_io_hints(struct dm_target *ti,
  329. struct queue_limits *limits)
  330. {
  331. const struct default_key_c *dkc = ti->private;
  332. const unsigned int sector_size = dkc->sector_size;
  333. limits->logical_block_size =
  334. max_t(unsigned int, limits->logical_block_size, sector_size);
  335. limits->physical_block_size =
  336. max_t(unsigned int, limits->physical_block_size, sector_size);
  337. limits->io_min = max_t(unsigned int, limits->io_min, sector_size);
  338. }
  339. #ifdef CONFIG_BLK_DEV_ZONED
  340. static int default_key_report_zones(struct dm_target *ti,
  341. struct dm_report_zones_args *args, unsigned int nr_zones)
  342. {
  343. struct default_key_c *dkc = ti->private;
  344. return dm_report_zones(dkc->dev->bdev, dkc->start,
  345. dkc->start + dm_target_offset(ti, args->next_sector),
  346. args, nr_zones);
  347. }
  348. #else
  349. #define default_key_report_zones NULL
  350. #endif
  351. static struct target_type default_key_target = {
  352. .name = "default-key",
  353. .version = {2, 1, 0},
  354. .features = DM_TARGET_PASSES_CRYPTO | DM_TARGET_ZONED_HM,
  355. .report_zones = default_key_report_zones,
  356. .module = THIS_MODULE,
  357. .ctr = default_key_ctr,
  358. .dtr = default_key_dtr,
  359. .map = default_key_map,
  360. .status = default_key_status,
  361. .prepare_ioctl = default_key_prepare_ioctl,
  362. .iterate_devices = default_key_iterate_devices,
  363. .io_hints = default_key_io_hints,
  364. };
  365. static int __init dm_default_key_init(void)
  366. {
  367. return dm_register_target(&default_key_target);
  368. }
  369. static void __exit dm_default_key_exit(void)
  370. {
  371. dm_unregister_target(&default_key_target);
  372. }
  373. module_init(dm_default_key_init);
  374. module_exit(dm_default_key_exit);
  375. MODULE_AUTHOR("Paul Lawrence <[email protected]>");
  376. MODULE_AUTHOR("Paul Crowley <[email protected]>");
  377. MODULE_AUTHOR("Eric Biggers <[email protected]>");
  378. MODULE_DESCRIPTION(DM_NAME " target for encrypting filesystem metadata");
  379. MODULE_LICENSE("GPL");