1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /* Large capacity key type
4 * Copyright (C) 2017-2020 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
5 * Copyright (C) 2013 Red Hat, Inc. All Rights Reserved.
6 * Written by David Howells (dhowells@redhat.com)
9 #define pr_fmt(fmt) "big_key: "fmt
10 #include <linux/init.h>
11 #include <linux/seq_file.h>
12 #include <linux/file.h>
13 #include <linux/shmem_fs.h>
14 #include <linux/err.h>
15 #include <linux/random.h>
16 #include <keys/user-type.h>
17 #include <keys/big_key-type.h>
18 #include <crypto/chacha20poly1305.h>
21 * Layout of key payload words.
26 big_key_path_2nd_part
,
31 * If the data is under this limit, there's no point creating a shm file to
32 * hold it as the permanently resident metadata for the shmem fs will be at
33 * least as large as the data.
35 #define BIG_KEY_FILE_THRESHOLD (sizeof(struct inode) + sizeof(struct dentry))
38 * big_key defined keys take an arbitrary string as the description and an
39 * arbitrary blob of data as the payload
41 struct key_type key_type_big_key
= {
43 .preparse
= big_key_preparse
,
44 .free_preparse
= big_key_free_preparse
,
45 .instantiate
= generic_key_instantiate
,
46 .revoke
= big_key_revoke
,
47 .destroy
= big_key_destroy
,
48 .describe
= big_key_describe
,
50 .update
= big_key_update
,
56 int big_key_preparse(struct key_preparsed_payload
*prep
)
58 struct path
*path
= (struct path
*)&prep
->payload
.data
[big_key_path
];
62 size_t datalen
= prep
->datalen
;
63 size_t enclen
= datalen
+ CHACHA20POLY1305_AUTHTAG_SIZE
;
66 if (datalen
<= 0 || datalen
> 1024 * 1024 || !prep
->data
)
69 /* Set an arbitrary quota */
72 prep
->payload
.data
[big_key_len
] = (void *)(unsigned long)datalen
;
74 if (datalen
> BIG_KEY_FILE_THRESHOLD
) {
75 /* Create a shmem file to store the data in. This will permit the data
76 * to be swapped out if needed.
78 * File content is stored encrypted with randomly generated key.
79 * Since the key is random for each file, we can set the nonce
80 * to zero, provided we never define a ->update() call.
84 buf
= kvmalloc(enclen
, GFP_KERNEL
);
88 /* generate random key */
89 enckey
= kmalloc(CHACHA20POLY1305_KEY_SIZE
, GFP_KERNEL
);
94 ret
= get_random_bytes_wait(enckey
, CHACHA20POLY1305_KEY_SIZE
);
99 chacha20poly1305_encrypt(buf
, prep
->data
, datalen
, NULL
, 0,
102 /* save aligned data to file */
103 file
= shmem_kernel_file_setup("", enclen
, 0);
109 written
= kernel_write(file
, buf
, enclen
, &pos
);
110 if (written
!= enclen
) {
117 /* Pin the mount and dentry to the key so that we can open it again
120 prep
->payload
.data
[big_key_data
] = enckey
;
121 *path
= file
->f_path
;
124 memzero_explicit(buf
, enclen
);
127 /* Just store the data in a buffer */
128 void *data
= kmalloc(datalen
, GFP_KERNEL
);
133 prep
->payload
.data
[big_key_data
] = data
;
134 memcpy(data
, prep
->data
, prep
->datalen
);
141 kfree_sensitive(enckey
);
143 memzero_explicit(buf
, enclen
);
149 * Clear preparsement.
151 void big_key_free_preparse(struct key_preparsed_payload
*prep
)
153 if (prep
->datalen
> BIG_KEY_FILE_THRESHOLD
) {
154 struct path
*path
= (struct path
*)&prep
->payload
.data
[big_key_path
];
158 kfree_sensitive(prep
->payload
.data
[big_key_data
]);
162 * dispose of the links from a revoked keyring
163 * - called with the key sem write-locked
165 void big_key_revoke(struct key
*key
)
167 struct path
*path
= (struct path
*)&key
->payload
.data
[big_key_path
];
169 /* clear the quota */
170 key_payload_reserve(key
, 0);
171 if (key_is_positive(key
) &&
172 (size_t)key
->payload
.data
[big_key_len
] > BIG_KEY_FILE_THRESHOLD
)
173 vfs_truncate(path
, 0);
177 * dispose of the data dangling from the corpse of a big_key key
179 void big_key_destroy(struct key
*key
)
181 size_t datalen
= (size_t)key
->payload
.data
[big_key_len
];
183 if (datalen
> BIG_KEY_FILE_THRESHOLD
) {
184 struct path
*path
= (struct path
*)&key
->payload
.data
[big_key_path
];
190 kfree_sensitive(key
->payload
.data
[big_key_data
]);
191 key
->payload
.data
[big_key_data
] = NULL
;
197 int big_key_update(struct key
*key
, struct key_preparsed_payload
*prep
)
201 ret
= key_payload_reserve(key
, prep
->datalen
);
205 if (key_is_positive(key
))
206 big_key_destroy(key
);
208 return generic_key_instantiate(key
, prep
);
212 * describe the big_key key
214 void big_key_describe(const struct key
*key
, struct seq_file
*m
)
216 size_t datalen
= (size_t)key
->payload
.data
[big_key_len
];
218 seq_puts(m
, key
->description
);
220 if (key_is_positive(key
))
221 seq_printf(m
, ": %zu [%s]",
223 datalen
> BIG_KEY_FILE_THRESHOLD
? "file" : "buff");
228 * - the key's semaphore is read-locked
230 long big_key_read(const struct key
*key
, char *buffer
, size_t buflen
)
232 size_t datalen
= (size_t)key
->payload
.data
[big_key_len
];
235 if (!buffer
|| buflen
< datalen
)
238 if (datalen
> BIG_KEY_FILE_THRESHOLD
) {
239 struct path
*path
= (struct path
*)&key
->payload
.data
[big_key_path
];
241 u8
*buf
, *enckey
= (u8
*)key
->payload
.data
[big_key_data
];
242 size_t enclen
= datalen
+ CHACHA20POLY1305_AUTHTAG_SIZE
;
245 buf
= kvmalloc(enclen
, GFP_KERNEL
);
249 file
= dentry_open(path
, O_RDONLY
, current_cred());
255 /* read file to kernel and decrypt */
256 ret
= kernel_read(file
, buf
, enclen
, &pos
);
263 ret
= chacha20poly1305_decrypt(buf
, buf
, enclen
, NULL
, 0, 0,
264 enckey
) ? 0 : -EBADMSG
;
270 /* copy out decrypted data */
271 memcpy(buffer
, buf
, datalen
);
276 memzero_explicit(buf
, enclen
);
280 memcpy(buffer
, key
->payload
.data
[big_key_data
], datalen
);
289 static int __init
big_key_init(void)
291 return register_key_type(&key_type_big_key
);
294 late_initcall(big_key_init
);