Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp21848imu; Thu, 3 Jan 2019 13:12:09 -0800 (PST) X-Google-Smtp-Source: ALg8bN6tcaVlqz8/go7SjclHNyH2Iv6gfXP6COEuqfwWEngQbPP5RrqfKIPoBAQkmPSH71LCoRxO X-Received: by 2002:a17:902:9691:: with SMTP id n17mr25784018plp.9.1546549929546; Thu, 03 Jan 2019 13:12:09 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546549929; cv=none; d=google.com; s=arc-20160816; b=eESDX995k+LAoVXO1RHNWp6GgjY7nw3mC8Brc+iL7CiqsF9OH0Gc+51Q3As+uVT/mc FEMyJNVR8b/v9cEfYu32mjtb7vUa1cqU8BmBBBBUyY+CuG9q0nJ3RqiJEQI5ibz9Ukb4 P44FSCr5HazPqBYr8nGah+usTBrUxUdYmMWoAtxDMkHIoT3RT8L+4jbTpbacVRMTu/n6 3vGZgs1wzX4eS4qDytAcq6Vro028KoARGgHNCecshuooAzodqmIVb+hkwTXtqJiAPekC vIlv2Rlo0cJQA9g6PnkgqfZ3wHD8JsBfwwTKaFErQGBpGxEXkuTQacNOIIND52nYmObe DWtA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature; bh=JGhtKGi3o8lk8X2ye6RGCUPzf2p6fpMW9sxGqwlivHw=; b=UBEyhrOFTeiG18ftTiwSS5l7IiW8XjTBL3mloAAEvrLO/yinl4SjloRlfm1UqsFDQ1 pNwV/31Ed3758TlRm7uOJiiapP30XTG7XTU1j+iULIJjWwyEEmSBFJ4Vm5smYd2MuV7F r6x+VCEYS62Xesb9ShvIVN0gg0+8DYxz/hOQjQfM5TcJor4GTBiRxByAOEMYDfneKPYk 3KrPlEM3uT52Uc6RzT+xkYqHOKL1hyswYfq1qsb83nGG/aA7C0WtSBp5EL8CH4MAX5ab qNPH6fIaA5yaHkYo3w0m9KqWf61AoY6XAeJoNs5fORSoWfRoNkKDeg6430Uq+VJ/x6Ab r34Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=YeUWqNO5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w5si50454941plz.419.2019.01.03.13.11.49; Thu, 03 Jan 2019 13:12:09 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=YeUWqNO5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731979AbfACOdf (ORCPT + 99 others); Thu, 3 Jan 2019 09:33:35 -0500 Received: from mail-pg1-f194.google.com ([209.85.215.194]:44102 "EHLO mail-pg1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727436AbfACOdf (ORCPT ); Thu, 3 Jan 2019 09:33:35 -0500 Received: by mail-pg1-f194.google.com with SMTP id t13so16073201pgr.11; Thu, 03 Jan 2019 06:33:34 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=JGhtKGi3o8lk8X2ye6RGCUPzf2p6fpMW9sxGqwlivHw=; b=YeUWqNO5YGPX03UrjdMkd0phQpBkPzwsK8He+lX0G64SV6BVODvlGvtDks+YUTGptW TvEYY9U+HwQ7q9tJbqFLCwGv8Yif5JQsdsBromE8koWLOo6LZTZa/I2bA8WR2VGF13RF mpQfi+PPHxaS8Qq8Xf0BYeAiBj7tEIAMuMcNjfF8HzG7EzFD1B5YoP9Qpz4iYoFXV6oI zKeeTy1sQLVgkdS4mTKYuP0W3FNJgrmdQtHQ5pGeoMi2vxLUugCwxKtyFmnVmv+mDdi3 qzZsxFcNFfhFVmEbnp/ExtehrneCcscsynIOC6DvemQZ6HJ8FObSt/ALzxqkgwbZTTy/ MEXw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=JGhtKGi3o8lk8X2ye6RGCUPzf2p6fpMW9sxGqwlivHw=; b=JCNWKCgYgXSw004XHInIZsrMhsp7yrjcrth0bh83wDbwA17Y4zx7DRXCKekQXHhugR jyxe8Ehq7cdxGD5M55LySPlDHXduLtipEsHDaI7tvXkD5y1KVehkSvw/+bjeIxrrJorr PJNTgTDZDMwqjWv7h94Vf3nHuo9WIv+uvqWIWQOKbx1yxshrex3ZMWGKLrGKNJlfxGTE ecblgkXZ7Eg4MOKeOQXXpY2Wfuaq3p6WMl9YePkmtjQyJC31MohH5a6YN+rVL3MpwAR6 94H5TLP588nv1tV2VQfPnmurNpX+W0i5CWINVYdK06YFaoDwZ/cWCIWGlSysZnchS/1e LbkA== X-Gm-Message-State: AJcUukdPgjtCWMX2cU8u26L20Cxeyu0jgfkFSwxYVHhWp8JUKHtIC75P BtNO6vCZs80dyca++/OOWo0= X-Received: by 2002:a63:4819:: with SMTP id v25mr17098768pga.308.1546526014050; Thu, 03 Jan 2019 06:33:34 -0800 (PST) Received: from linux-l9pv.suse ([124.11.22.254]) by smtp.gmail.com with ESMTPSA id x3sm184403100pgt.45.2019.01.03.06.33.25 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Thu, 03 Jan 2019 06:33:33 -0800 (PST) From: "Lee, Chun-Yi" X-Google-Original-From: "Lee, Chun-Yi" To: "Rafael J . Wysocki" , Pavel Machek Cc: linux-kernel@vger.kernel.org, linux-pm@vger.kernel.org, keyrings@vger.kernel.org, "Lee, Chun-Yi" , "Rafael J. Wysocki" , Chen Yu , Oliver Neukum , Ryan Chen , David Howells , Giovanni Gherdovich , Randy Dunlap , Jann Horn , Andy Lutomirski Subject: [PATCH 4/5 v2] PM / hibernate: Erase the snapshot master key in snapshot pages Date: Thu, 3 Jan 2019 22:32:26 +0800 Message-Id: <20190103143227.9138-5-jlee@suse.com> X-Mailer: git-send-email 2.12.3 In-Reply-To: <20190103143227.9138-1-jlee@suse.com> References: <20190103143227.9138-1-jlee@suse.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org If the encryption key be guessed then the snapshot master key can also be grabbed from snapshot image. Which means that the authentication key can also be calculated. So kernel erases master key in snapshot pages. Because the master key in image kernel be erased, kernel uses the trampoline page to forward snapshot master key to image kernel. v2: - Add memory barrier after cleaning key initialized flag. Cc: "Rafael J. Wysocki" Cc: Pavel Machek Cc: Chen Yu Cc: Oliver Neukum Cc: Ryan Chen Cc: David Howells Cc: Giovanni Gherdovich Cc: Randy Dunlap Cc: Jann Horn Cc: Andy Lutomirski Signed-off-by: "Lee, Chun-Yi" --- kernel/power/power.h | 6 ++++ kernel/power/snapshot.c | 5 ++++ kernel/power/snapshot_key.c | 67 +++++++++++++++++++++++++++++++++++++++++++++ 3 files changed, 78 insertions(+) diff --git a/kernel/power/power.h b/kernel/power/power.h index 41263fdd3a54..d2fc73b2e200 100644 --- a/kernel/power/power.h +++ b/kernel/power/power.h @@ -36,6 +36,7 @@ struct swsusp_info { struct trampoline { bool snapshot_key_valid; int sig_verify_ret; + u8 snapshot_key[SNAPSHOT_KEY_SIZE]; } __aligned(PAGE_SIZE); #ifdef CONFIG_HIBERNATION @@ -55,6 +56,9 @@ extern int snapshot_key_init(void); extern bool snapshot_key_initialized(void); extern int snapshot_get_auth_key(u8 *auth_key, bool may_sleep); extern int snapshot_get_enc_key(u8 *enc_key, bool may_sleep); +extern void snapshot_key_page_erase(unsigned long pfn, void *buff_addr); +extern void snapshot_key_trampoline_backup(struct trampoline *t); +extern void snapshot_key_trampoline_restore(struct trampoline *t); #else static inline int snapshot_image_verify_decrypt(void) { return 0; } static inline int snapshot_prepare_crypto(bool may_sleep, bool create_iv) { return 0; } @@ -62,6 +66,8 @@ static inline void snapshot_finish_crypto(void) {} static inline int snapshot_prepare_hash(bool may_sleep) { return 0; } static inline void snapshot_finish_hash(void) {} static inline int snapshot_key_init(void) { return 0; } +static inline void snapshot_key_trampoline_backup(struct trampoline *t) {} +static inline void snapshot_key_trampoline_restore(struct trampoline *t) {} #endif /* !CONFIG_HIBERNATION_ENC_AUTH */ #ifdef CONFIG_ARCH_HIBERNATION_HEADER diff --git a/kernel/power/snapshot.c b/kernel/power/snapshot.c index cd10ab5e4850..80ed8e7c5ed8 100644 --- a/kernel/power/snapshot.c +++ b/kernel/power/snapshot.c @@ -1697,6 +1697,9 @@ __copy_data_pages(struct memory_bitmap *copy_bm, struct memory_bitmap *orig_bm) crypto_buffer = page_address(d_page); } + /* Erase key data in snapshot */ + snapshot_key_page_erase(pfn, crypto_buffer); + /* Encrypt hashed page */ encrypt_data_page(crypto_buffer); @@ -2482,6 +2485,7 @@ void snapshot_init_trampoline(void) t = (struct trampoline *)trampoline_buff; init_sig_verify(t); + snapshot_key_trampoline_backup(t); pr_info("Hibernation trampoline page prepared\n"); } @@ -2505,6 +2509,7 @@ void snapshot_restore_trampoline(void) t = (struct trampoline *)trampoline_virt; handle_sig_verify(t); + snapshot_key_trampoline_restore(t); snapshot_free_trampoline(); } diff --git a/kernel/power/snapshot_key.c b/kernel/power/snapshot_key.c index 3a569b505d8d..9d478c27d6b9 100644 --- a/kernel/power/snapshot_key.c +++ b/kernel/power/snapshot_key.c @@ -29,11 +29,27 @@ static struct snapshot_key { const char *key_name; bool initialized; unsigned int key_len; + unsigned long pfn; /* pfn of keyblob */ + unsigned long addr_offset; /* offset in page for keyblob */ u8 key[SNAPSHOT_KEY_SIZE]; + u8 fingerprint[SHA512_DIGEST_SIZE]; /* fingerprint of keyblob */ } skey = { .key_name = "swsusp-kmk", }; +static void snapshot_key_clean(void) +{ + crypto_free_shash(hash_tfm); + hash_tfm = NULL; + skey.initialized = false; + barrier(); + skey.pfn = 0; + skey.key_len = 0; + skey.addr_offset = 0; + memzero_explicit(skey.key, SNAPSHOT_KEY_SIZE); + memzero_explicit(skey.fingerprint, SHA512_DIGEST_SIZE); +} + static int calc_hash(u8 *digest, const u8 *buf, unsigned int buflen, bool may_sleep) { @@ -81,6 +97,53 @@ static int calc_key_hash(u8 *key, unsigned int key_len, const char *salt, return ret; } +static int get_key_fingerprint(u8 *fingerprint, u8 *key, unsigned int key_len, + bool may_sleep) +{ + return calc_key_hash(key, key_len, "FINGERPRINT", fingerprint, may_sleep); +} + +void snapshot_key_page_erase(unsigned long pfn, void *buff_addr) +{ + if (!skey.initialized || pfn != skey.pfn) + return; + + /* erase key data from snapshot buffer page */ + if (!memcmp(skey.key, buff_addr + skey.addr_offset, skey.key_len)) { + memzero_explicit(buff_addr + skey.addr_offset, skey.key_len); + pr_info("Erased swsusp key in snapshot pages.\n"); + } +} + +/* this function may sleeps because snapshot_key_init() */ +void snapshot_key_trampoline_backup(struct trampoline *t) +{ + if (!t || snapshot_key_init()) + return; + + memcpy(t->snapshot_key, skey.key, skey.key_len); +} + +/* Be called after snapshot image restored success */ +void snapshot_key_trampoline_restore(struct trampoline *t) +{ + u8 fingerprint[SHA512_DIGEST_SIZE]; + + if (!skey.initialized || !t) + return; + + /* check key fingerprint before restore */ + get_key_fingerprint(fingerprint, t->snapshot_key, skey.key_len, true); + if (memcmp(skey.fingerprint, fingerprint, SHA512_DIGEST_SIZE)) { + pr_warn("Restored swsusp key failed, fingerprint mismatch.\n"); + snapshot_key_clean(); + return; + } + + memcpy(skey.key, t->snapshot_key, skey.key_len); + memzero_explicit(t->snapshot_key, SNAPSHOT_KEY_SIZE); +} + /* Derive authentication/encryption key */ static int get_derived_key(u8 *derived_key, const char *derived_type_str, bool may_sleep) @@ -230,10 +293,14 @@ int snapshot_key_init(void) if (err) goto key_fail; + skey.pfn = page_to_pfn(virt_to_page(skey.key)); + skey.addr_offset = (unsigned long) skey.key & ~PAGE_MASK; + get_key_fingerprint(skey.fingerprint, skey.key, skey.key_len, true); barrier(); skey.initialized = true; pr_info("Snapshot key is initialled.\n"); + pr_debug("Fingerprint %*phN\n", SHA512_DIGEST_SIZE, skey.fingerprint); return 0; -- 2.13.6