[RFC PATCH 2/2] dm-crypt: Use any key type which is registered

Maik Otto m.otto at phytec.de
Fri Jan 17 11:52:21 UTC 2020


Hi

little bug fix, because this version chrashed with access violation
on an i.MX6Quad with a Mainline Kernel 4.19.88

> There was only 2 key_type supported by dm-crypt which limits other
> implementations.
>
> This patch allows to use any key_type which is registered obtaining
> the key_type from key framework.
>
> This also remove the compilation dependency between dm-crypt and
> key implementations.
>
> Signed-off-by: Franck LENORMAND <franck.lenormand at nxp.com>
> ---
>   drivers/md/dm-crypt.c    | 11 ++++++-----
>   include/linux/key-type.h |  2 ++
>   security/keys/key.c      | 42 ++++++++++++++++++++++++++++++++++++++++++
>   3 files changed, 50 insertions(+), 5 deletions(-)
>
> diff --git a/drivers/md/dm-crypt.c b/drivers/md/dm-crypt.c
> index dd538e6..e25efc2 100644
> --- a/drivers/md/dm-crypt.c
> +++ b/drivers/md/dm-crypt.c
> @@ -35,6 +35,7 @@
>   #include <crypto/authenc.h>
>   #include <linux/rtnetlink.h> /* for struct rtattr and RTA macros only */
>   #include <keys/user-type.h>
> +#include <linux/key-type.h>
>   
>   #include <linux/device-mapper.h>
>   
> @@ -2010,6 +2011,7 @@ static int crypt_set_keyring_key(struct crypt_config *cc, const char *key_string
>   	int ret;
>   	struct key *key;
>   	const struct user_key_payload *ukp;
> +	struct key_type *type;
>   
>   	/*
>   	 * Reject key_string with whitespace. dm core currently lacks code for
> @@ -2025,16 +2027,15 @@ static int crypt_set_keyring_key(struct crypt_config *cc, const char *key_string
>   	if (!key_desc || key_desc == key_string || !strlen(key_desc + 1))
>   		return -EINVAL;
>   
> -	if (strncmp(key_string, "logon:", key_desc - key_string + 1) &&
> -	    strncmp(key_string, "user:", key_desc - key_string + 1))
> -		return -EINVAL;
> +	type = get_key_type(key_string, key_desc - key_string);
> +	if (!type)
> +		return -ENOENT;
>   
>   	new_key_string = kstrdup(key_string, GFP_KERNEL);
>   	if (!new_key_string)
>   		return -ENOMEM;
>   
> -	key = request_key(key_string[0] == 'l' ? &key_type_logon : &key_type_user,
> -			  key_desc + 1, NULL);
> +	key = request_key(type, key_desc + 1, NULL);
>   	if (IS_ERR(key)) {
>   		kzfree(new_key_string);
>   		return PTR_ERR(key);
> diff --git a/include/linux/key-type.h b/include/linux/key-type.h
> index bc9af55..2b2167b 100644
> --- a/include/linux/key-type.h
> +++ b/include/linux/key-type.h
> @@ -176,6 +176,8 @@ extern struct key_type key_type_keyring;
>   extern int register_key_type(struct key_type *ktype);
>   extern void unregister_key_type(struct key_type *ktype);
>   
> +extern struct key_type *get_key_type(const char *type_name, size_t string_size);
> +
>   extern int key_payload_reserve(struct key *key, size_t datalen);
>   extern int key_instantiate_and_link(struct key *key,
>   				    const void *data,
> diff --git a/security/keys/key.c b/security/keys/key.c
> index 44a80d6..ef76114 100644
> --- a/security/keys/key.c
> +++ b/security/keys/key.c
> @@ -1156,6 +1156,48 @@ void unregister_key_type(struct key_type *ktype)
>   }
>   EXPORT_SYMBOL(unregister_key_type);
>   
> +/**
> + * get_key_type - Get the type of key using its name
> + * @type_name: Name of the key type to get
> + * @string_size: Size of the string to match
> + *
> + * The functions support null ended string (string_size == 0) as well as
> + * pointer on a string matching a number of characters (string_size > 0)
> + *
> + * Returns a pointer on the key type if successful, -ENOENT if the key type
> + * is not registered.
> + */
> +struct key_type *get_key_type(const char *type_name, size_t string_size)
> +{
> +	struct key_type *p;
> +	struct key_type *ktype = ERR_PTR(-ENOENT);
> +
> +	if (!type_name)
> +		return ktype;
> +
> +	down_write(&key_types_sem);

down_write(&key_types_sem);  changed to down_read(&key_types_sem);

> +
> +	/* Search the key type in the list */
> +	list_for_each_entry(p, &key_types_list, link) {
> +		if (string_size) {
> +			if (strncmp(p->name, type_name, string_size) == 0) {
> +				ktype = p;
> +				break;
> +			}
> +		} else {
> +			if (strcmp(p->name, type_name) == 0) {
> +				ktype = p;
> +				break;
> +			}
> +		}
> +	}
> +
> +	up_read(&key_types_sem);
> +
> +	return ktype;
> +}
> +EXPORT_SYMBOL(get_key_type);
> +
>   /*
>    * Initialise the key management state.
>    */
>



More information about the Linux-security-module-archive mailing list