• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1  /*
2   * Copyright (C) 2016 The Android Open Source Project
3   *
4   * Licensed under the Apache License, Version 2.0 (the "License");
5   * you may not use this file except in compliance with the License.
6   * You may obtain a copy of the License at
7   *
8   *      http://www.apache.org/licenses/LICENSE-2.0
9   *
10   * Unless required by applicable law or agreed to in writing, software
11   * distributed under the License is distributed on an "AS IS" BASIS,
12   * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13   * See the License for the specific language governing permissions and
14   * limitations under the License.
15   */
16  
17  #include "MetadataCrypt.h"
18  #include "KeyBuffer.h"
19  
20  #include <string>
21  
22  #include <fcntl.h>
23  #include <sys/param.h>
24  #include <sys/stat.h>
25  #include <sys/types.h>
26  
27  #include <android-base/logging.h>
28  #include <android-base/properties.h>
29  #include <android-base/strings.h>
30  #include <android-base/unique_fd.h>
31  #include <cutils/fs.h>
32  #include <fs_mgr.h>
33  #include <libdm/dm.h>
34  #include <libgsi/libgsi.h>
35  
36  #include "Checkpoint.h"
37  #include "CryptoType.h"
38  #include "EncryptInplace.h"
39  #include "KeyStorage.h"
40  #include "KeyUtil.h"
41  #include "Keystore.h"
42  #include "Utils.h"
43  #include "VoldUtil.h"
44  #include "fs/Ext4.h"
45  #include "fs/F2fs.h"
46  
47  namespace android {
48  namespace vold {
49  
50  using android::fs_mgr::FstabEntry;
51  using android::fs_mgr::GetEntryForMountPoint;
52  using android::fscrypt::GetFirstApiLevel;
53  using android::vold::KeyBuffer;
54  using namespace android::dm;
55  using namespace std::chrono_literals;
56  
57  // Parsed from metadata options
58  struct CryptoOptions {
59      struct CryptoType cipher = invalid_crypto_type;
60      bool use_legacy_options_format = false;
61      bool set_dun = true;  // Non-legacy driver always sets DUN
62      bool use_hw_wrapped_key = false;
63  };
64  
65  static const std::string kDmNameUserdata = "userdata";
66  static const std::string kDmNameUserdataZoned = "userdata_zoned";
67  
68  // The first entry in this table is the default crypto type.
69  constexpr CryptoType supported_crypto_types[] = {aes_256_xts, adiantum};
70  
71  static_assert(validateSupportedCryptoTypes(64, supported_crypto_types,
72                                             array_length(supported_crypto_types)),
73                "We have a CryptoType which was incompletely constructed.");
74  
75  constexpr CryptoType legacy_aes_256_xts =
76          CryptoType().set_config_name("aes-256-xts").set_kernel_name("AES-256-XTS").set_keysize(64);
77  
78  static_assert(isValidCryptoType(64, legacy_aes_256_xts),
79                "We have a CryptoType which was incompletely constructed.");
80  
81  // Returns KeyGeneration suitable for key as described in CryptoOptions
makeGen(const CryptoOptions & options)82  const KeyGeneration makeGen(const CryptoOptions& options) {
83      return KeyGeneration{options.cipher.get_keysize(), true, options.use_hw_wrapped_key};
84  }
85  
defaultkey_precreate_dm_device()86  void defaultkey_precreate_dm_device() {
87      auto& dm = DeviceMapper::Instance();
88      if (dm.GetState(kDmNameUserdata) != DmDeviceState::INVALID) {
89          LOG(INFO) << "Not pre-creating userdata encryption device; device already exists";
90          return;
91      }
92  
93      if (!dm.CreatePlaceholderDevice(kDmNameUserdata)) {
94          LOG(ERROR) << "Failed to pre-create userdata metadata encryption device";
95      }
96  }
97  
mount_via_fs_mgr(const char * mount_point,const char * blk_device,bool needs_encrypt)98  static bool mount_via_fs_mgr(const char* mount_point, const char* blk_device, bool needs_encrypt) {
99      // fs_mgr_do_mount runs fsck. Use setexeccon to run trusted
100      // partitions in the fsck domain.
101      if (setexeccon(android::vold::sFsckContext)) {
102          PLOG(ERROR) << "Failed to setexeccon";
103          return false;
104      }
105      auto mount_rc = fs_mgr_do_mount(&fstab_default, const_cast<char*>(mount_point),
106                                      const_cast<char*>(blk_device), nullptr,
107                                      needs_encrypt? false: android::vold::cp_needsCheckpoint(),
108                                      true);
109      if (setexeccon(nullptr)) {
110          PLOG(ERROR) << "Failed to clear setexeccon";
111          return false;
112      }
113      if (mount_rc != 0) {
114          LOG(ERROR) << "fs_mgr_do_mount failed with rc " << mount_rc;
115          return false;
116      }
117      LOG(DEBUG) << "Mounted " << mount_point;
118      return true;
119  }
120  
read_key(const std::string & metadata_key_dir,const KeyGeneration & gen,bool first_key,KeyBuffer * key)121  static bool read_key(const std::string& metadata_key_dir, const KeyGeneration& gen, bool first_key,
122                       KeyBuffer* key) {
123      if (metadata_key_dir.empty()) {
124          LOG(ERROR) << "Failed to get metadata_key_dir";
125          return false;
126      }
127      std::string sKey;
128      auto dir = metadata_key_dir + "/key";
129      LOG(DEBUG) << "metadata_key_dir/key: " << dir;
130      if (!MkdirsSync(dir, 0700)) return false;
131      auto in_dsu = android::base::GetBoolProperty("ro.gsid.image_running", false);
132      // !pathExists(dir) does not imply there's a factory reset when in DSU mode.
133      if (!pathExists(dir) && !in_dsu && first_key) {
134          auto delete_all = android::base::GetBoolProperty(
135                  "ro.crypto.metadata_init_delete_all_keys.enabled", false);
136          if (delete_all) {
137              LOG(INFO) << "Metadata key does not exist, calling deleteAllKeys";
138              Keystore::deleteAllKeys();
139          } else {
140              LOG(DEBUG) << "Metadata key does not exist but "
141                            "ro.crypto.metadata_init_delete_all_keys.enabled is false";
142          }
143      }
144      auto temp = metadata_key_dir + "/tmp";
145      return retrieveOrGenerateKey(dir, temp, kEmptyAuthentication, gen, key);
146  }
147  
get_number_of_sectors(const std::string & real_blkdev,uint64_t * nr_sec)148  static bool get_number_of_sectors(const std::string& real_blkdev, uint64_t* nr_sec) {
149      if (android::vold::GetBlockDev512Sectors(real_blkdev, nr_sec) != android::OK) {
150          PLOG(ERROR) << "Unable to measure size of " << real_blkdev;
151          return false;
152      }
153      return true;
154  }
155  
create_crypto_blk_dev(const std::string & dm_name,const std::string & blk_device,const KeyBuffer & key,const CryptoOptions & options,std::string * crypto_blkdev,uint64_t * nr_sec)156  static bool create_crypto_blk_dev(const std::string& dm_name, const std::string& blk_device,
157                                    const KeyBuffer& key, const CryptoOptions& options,
158                                    std::string* crypto_blkdev, uint64_t* nr_sec) {
159      if (!get_number_of_sectors(blk_device, nr_sec)) return false;
160      // TODO(paulcrowley): don't hardcode that DmTargetDefaultKey uses 4096-byte
161      // sectors
162      *nr_sec &= ~7;
163  
164      KeyBuffer module_key;
165      if (options.use_hw_wrapped_key) {
166          if (!exportWrappedStorageKey(key, &module_key)) {
167              LOG(ERROR) << "Failed to get ephemeral wrapped key";
168              return false;
169          }
170      } else {
171          module_key = key;
172      }
173  
174      KeyBuffer hex_key_buffer;
175      if (android::vold::StrToHex(module_key, hex_key_buffer) != android::OK) {
176          LOG(ERROR) << "Failed to turn key to hex";
177          return false;
178      }
179      std::string hex_key(hex_key_buffer.data(), hex_key_buffer.size());
180  
181      auto target = std::make_unique<DmTargetDefaultKey>(0, *nr_sec, options.cipher.get_kernel_name(),
182                                                         hex_key, blk_device, 0);
183      if (options.use_legacy_options_format) target->SetUseLegacyOptionsFormat();
184      if (options.set_dun) target->SetSetDun();
185      if (options.use_hw_wrapped_key) target->SetWrappedKeyV0();
186  
187      DmTable table;
188      table.AddTarget(std::move(target));
189  
190      auto& dm = DeviceMapper::Instance();
191      if (dm_name == kDmNameUserdata && dm.GetState(dm_name) == DmDeviceState::SUSPENDED) {
192          // The device was created in advance, populate it now.
193          if (!dm.LoadTableAndActivate(dm_name, table)) {
194              LOG(ERROR) << "Failed to populate default-key device " << dm_name;
195              return false;
196          }
197          if (!dm.WaitForDevice(dm_name, 20s, crypto_blkdev)) {
198              LOG(ERROR) << "Failed to wait for default-key device " << dm_name;
199              return false;
200          }
201      } else if (!dm.CreateDevice(dm_name, table, crypto_blkdev, 5s)) {
202          LOG(ERROR) << "Could not create default-key device " << dm_name;
203          return false;
204      }
205      return true;
206  }
207  
lookup_cipher(const std::string & cipher_name)208  static const CryptoType& lookup_cipher(const std::string& cipher_name) {
209      if (cipher_name.empty()) return supported_crypto_types[0];
210      for (size_t i = 0; i < array_length(supported_crypto_types); i++) {
211          if (cipher_name == supported_crypto_types[i].get_config_name()) {
212              return supported_crypto_types[i];
213          }
214      }
215      return invalid_crypto_type;
216  }
217  
parse_options(const std::string & options_string,CryptoOptions * options)218  static bool parse_options(const std::string& options_string, CryptoOptions* options) {
219      auto parts = android::base::Split(options_string, ":");
220      if (parts.size() < 1 || parts.size() > 2) {
221          LOG(ERROR) << "Invalid metadata encryption option: " << options_string;
222          return false;
223      }
224      std::string cipher_name = parts[0];
225      options->cipher = lookup_cipher(cipher_name);
226      if (options->cipher.get_kernel_name() == nullptr) {
227          LOG(ERROR) << "No metadata cipher named " << cipher_name << " found";
228          return false;
229      }
230  
231      if (parts.size() == 2) {
232          if (parts[1] == "wrappedkey_v0") {
233              options->use_hw_wrapped_key = true;
234          } else {
235              LOG(ERROR) << "Invalid metadata encryption flag: " << parts[1];
236              return false;
237          }
238      }
239      return true;
240  }
241  
fscrypt_mount_metadata_encrypted(const std::string & blk_device,const std::string & mount_point,bool needs_encrypt,bool should_format,const std::string & fs_type,const std::string & zoned_device)242  bool fscrypt_mount_metadata_encrypted(const std::string& blk_device, const std::string& mount_point,
243                                        bool needs_encrypt, bool should_format,
244                                        const std::string& fs_type, const std::string& zoned_device) {
245      LOG(DEBUG) << "fscrypt_mount_metadata_encrypted: " << mount_point
246                 << " encrypt: " << needs_encrypt << " format: " << should_format << " with "
247                 << fs_type << " block device: " << blk_device
248                 << " and zoned device: " << zoned_device;
249      auto encrypted_state = android::base::GetProperty("ro.crypto.state", "");
250      if (encrypted_state != "" && encrypted_state != "encrypted") {
251          LOG(ERROR) << "fscrypt_mount_metadata_encrypted got unexpected starting state: "
252                     << encrypted_state;
253          return false;
254      }
255  
256      auto data_rec = GetEntryForMountPoint(&fstab_default, mount_point);
257      if (!data_rec) {
258          LOG(ERROR) << "Failed to get data_rec for " << mount_point;
259          return false;
260      }
261  
262      unsigned int options_format_version = android::base::GetUintProperty<unsigned int>(
263              "ro.crypto.dm_default_key.options_format.version",
264              (GetFirstApiLevel() <= __ANDROID_API_Q__ ? 1 : 2));
265  
266      CryptoOptions options;
267      if (options_format_version == 1) {
268          if (!data_rec->metadata_encryption_options.empty()) {
269              LOG(ERROR) << "metadata_encryption options cannot be set in legacy mode";
270              return false;
271          }
272          options.cipher = legacy_aes_256_xts;
273          options.use_legacy_options_format = true;
274          options.set_dun = android::base::GetBoolProperty("ro.crypto.set_dun", false);
275          if (!options.set_dun && data_rec->fs_mgr_flags.checkpoint_blk) {
276              LOG(ERROR)
277                      << "Block checkpoints and metadata encryption require ro.crypto.set_dun option";
278              return false;
279          }
280      } else if (options_format_version == 2) {
281          if (!parse_options(data_rec->metadata_encryption_options, &options)) return false;
282      } else {
283          LOG(ERROR) << "Unknown options_format_version: " << options_format_version;
284          return false;
285      }
286  
287      auto default_metadata_key_dir = data_rec->metadata_key_dir;
288      if (!zoned_device.empty()) {
289          default_metadata_key_dir = default_metadata_key_dir + "/default";
290      }
291      auto gen = needs_encrypt ? makeGen(options) : neverGen();
292      KeyBuffer key;
293      if (!read_key(default_metadata_key_dir, gen, true, &key)) {
294          LOG(ERROR) << "read_key failed in mountFstab";
295          return false;
296      }
297  
298      std::string crypto_blkdev;
299      uint64_t nr_sec;
300      if (!create_crypto_blk_dev(kDmNameUserdata, blk_device, key, options, &crypto_blkdev,
301                                 &nr_sec)) {
302          LOG(ERROR) << "create_crypto_blk_dev failed in mountFstab";
303          return false;
304      }
305  
306      // create dm-default-key for zoned device
307      std::string crypto_zoned_blkdev;
308      if (!zoned_device.empty()) {
309          auto zoned_metadata_key_dir = data_rec->metadata_key_dir + "/zoned";
310  
311          if (!read_key(zoned_metadata_key_dir, gen, false, &key)) {
312              LOG(ERROR) << "read_key failed with zoned device: " << zoned_device;
313              return false;
314          }
315          if (!create_crypto_blk_dev(kDmNameUserdataZoned, zoned_device, key, options,
316                                     &crypto_zoned_blkdev, &nr_sec)) {
317              LOG(ERROR) << "fscrypt_mount_metadata_encrypted: failed with zoned device: "
318                         << zoned_device;
319              return false;
320          }
321      }
322  
323      if (needs_encrypt) {
324          if (should_format) {
325              status_t error;
326  
327              if (fs_type == "ext4") {
328                  error = ext4::Format(crypto_blkdev, 0, mount_point);
329              } else if (fs_type == "f2fs") {
330                  error = f2fs::Format(crypto_blkdev, crypto_zoned_blkdev);
331              } else {
332                  LOG(ERROR) << "Unknown filesystem type: " << fs_type;
333                  return false;
334              }
335              if (error != 0) {
336                  LOG(ERROR) << "Format of " << crypto_blkdev << " for " << mount_point
337                             << " failed (err=" << error << ").";
338                  return false;
339              }
340              LOG(DEBUG) << "Format of " << crypto_blkdev << " for " << mount_point << " succeeded.";
341          } else {
342              if (!zoned_device.empty()) {
343                  LOG(ERROR) << "encrypt_inplace cannot support zoned device; should format it.";
344                  return false;
345              }
346              if (!encrypt_inplace(crypto_blkdev, blk_device, nr_sec)) {
347                  LOG(ERROR) << "encrypt_inplace failed in mountFstab";
348                  return false;
349              }
350          }
351      }
352  
353      LOG(DEBUG) << "Mounting metadata-encrypted filesystem:" << mount_point;
354      mount_via_fs_mgr(mount_point.c_str(), crypto_blkdev.c_str(), needs_encrypt);
355  
356      // Record that there's at least one fstab entry with metadata encryption
357      if (!android::base::SetProperty("ro.crypto.metadata.enabled", "true")) {
358          LOG(WARNING) << "failed to set ro.crypto.metadata.enabled";  // This isn't fatal
359      }
360      return true;
361  }
362  
get_volume_options(CryptoOptions * options)363  static bool get_volume_options(CryptoOptions* options) {
364      return parse_options(android::base::GetProperty("ro.crypto.volume.metadata.encryption", ""),
365                           options);
366  }
367  
defaultkey_volume_keygen(KeyGeneration * gen)368  bool defaultkey_volume_keygen(KeyGeneration* gen) {
369      CryptoOptions options;
370      if (!get_volume_options(&options)) return false;
371      *gen = makeGen(options);
372      return true;
373  }
374  
defaultkey_setup_ext_volume(const std::string & label,const std::string & blk_device,const KeyBuffer & key,std::string * out_crypto_blkdev)375  bool defaultkey_setup_ext_volume(const std::string& label, const std::string& blk_device,
376                                   const KeyBuffer& key, std::string* out_crypto_blkdev) {
377      LOG(DEBUG) << "defaultkey_setup_ext_volume: " << label << " " << blk_device;
378  
379      CryptoOptions options;
380      if (!get_volume_options(&options)) return false;
381      uint64_t nr_sec;
382      return create_crypto_blk_dev(label, blk_device, key, options, out_crypto_blkdev, &nr_sec);
383  }
384  
destroy_dsu_metadata_key(const std::string & dsu_slot)385  bool destroy_dsu_metadata_key(const std::string& dsu_slot) {
386      LOG(DEBUG) << "destroy_dsu_metadata_key: " << dsu_slot;
387  
388      const auto dsu_metadata_key_dir = android::gsi::GetDsuMetadataKeyDir(dsu_slot);
389      if (!pathExists(dsu_metadata_key_dir)) {
390          LOG(DEBUG) << "DSU metadata_key_dir doesn't exist, nothing to remove: "
391                     << dsu_metadata_key_dir;
392          return true;
393      }
394  
395      // Ensure that the DSU key directory is different from the host OS'.
396      // Under normal circumstances, this should never happen, but handle it just in case.
397      if (auto data_rec = GetEntryForMountPoint(&fstab_default, "/data")) {
398          if (dsu_metadata_key_dir == data_rec->metadata_key_dir) {
399              LOG(ERROR) << "DSU metadata_key_dir is same as host OS: " << dsu_metadata_key_dir;
400              return false;
401          }
402      }
403  
404      bool ok = true;
405      for (auto suffix : {"/key", "/tmp"}) {
406          const auto key_path = dsu_metadata_key_dir + suffix;
407          if (pathExists(key_path)) {
408              LOG(DEBUG) << "Destroy key: " << key_path;
409              if (!android::vold::destroyKey(key_path)) {
410                  LOG(ERROR) << "Failed to destroyKey(): " << key_path;
411                  ok = false;
412              }
413          }
414      }
415      if (!ok) {
416          return false;
417      }
418  
419      LOG(DEBUG) << "Remove DSU metadata_key_dir: " << dsu_metadata_key_dir;
420      // DeleteDirContentsAndDir() already logged any error, so don't log repeatedly.
421      return android::vold::DeleteDirContentsAndDir(dsu_metadata_key_dir) == android::OK;
422  }
423  
424  }  // namespace vold
425  }  // namespace android
426