1 /* SPDX-License-Identifier: LGPL-2.1+ */
3 This file is part of systemd.
5 Copyright 2016 Lennart Poettering
7 systemd is free software; you can redistribute it and/or modify it
8 under the terms of the GNU Lesser General Public License as published by
9 the Free Software Foundation; either version 2.1 of the License, or
10 (at your option) any later version.
12 systemd is distributed in the hope that it will be useful, but
13 WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 Lesser General Public License for more details.
17 You should have received a copy of the GNU Lesser General Public License
18 along with systemd; If not, see <http://www.gnu.org/licenses/>.
27 #include "alloc-util.h"
30 #include "fstab-util.h"
31 #include "generator.h"
32 #include "hexdecoct.h"
33 #include "id128-util.h"
35 #include "parse-util.h"
36 #include "proc-cmdline.h"
37 #include "specifier.h"
38 #include "string-util.h"
39 #include "unit-name.h"
41 #define SYSTEMD_VERITYSETUP_SERVICE "systemd-veritysetup@root.service"
43 static char *arg_dest
= NULL
;
44 static bool arg_enabled
= true;
45 static char *arg_root_hash
= NULL
;
46 static char *arg_data_what
= NULL
;
47 static char *arg_hash_what
= NULL
;
49 static int create_device(void) {
50 _cleanup_free_
char *u
= NULL
, *v
= NULL
, *d
= NULL
, *e
= NULL
, *u_escaped
= NULL
, *v_escaped
= NULL
, *root_hash_escaped
= NULL
;
51 _cleanup_fclose_
FILE *f
= NULL
;
55 /* If all three pieces of information are missing, then verity is turned off */
56 if (!arg_root_hash
&& !arg_data_what
&& !arg_hash_what
)
59 /* if one of them is missing however, the data is simply incomplete and this is an error */
61 log_error("Verity information incomplete, root hash unspecified.");
63 log_error("Verity information incomplete, root data device unspecified.");
65 log_error("Verity information incomplete, root hash device unspecified.");
67 if (!arg_root_hash
|| !arg_data_what
|| !arg_hash_what
)
70 log_debug("Using root verity data device %s,\n"
72 " and root hash %s.", arg_data_what
, arg_hash_what
, arg_root_hash
);
74 u
= fstab_node_to_udev_node(arg_data_what
);
77 v
= fstab_node_to_udev_node(arg_hash_what
);
81 u_escaped
= specifier_escape(u
);
84 v_escaped
= specifier_escape(v
);
88 r
= unit_name_from_path(u
, ".device", &d
);
90 return log_error_errno(r
, "Failed to generate unit name: %m");
91 r
= unit_name_from_path(v
, ".device", &e
);
93 return log_error_errno(r
, "Failed to generate unit name: %m");
95 root_hash_escaped
= specifier_escape(arg_root_hash
);
96 if (!root_hash_escaped
)
99 r
= generator_open_unit_file(arg_dest
, NULL
, SYSTEMD_VERITYSETUP_SERVICE
, &f
);
105 "Description=Integrity Protection Setup for %%I\n"
106 "Documentation=man:systemd-veritysetup-generator(8) man:systemd-veritysetup@.service(8)\n"
107 "SourcePath=/proc/cmdline\n"
108 "DefaultDependencies=no\n"
109 "Conflicts=umount.target\n"
111 "IgnoreOnIsolate=true\n"
112 "After=cryptsetup-pre.target %s %s\n"
113 "Before=cryptsetup.target umount.target\n"
116 "RemainAfterExit=yes\n"
117 "ExecStart=" ROOTLIBEXECDIR
"/systemd-veritysetup attach root '%s' '%s' '%s'\n"
118 "ExecStop=" ROOTLIBEXECDIR
"/systemd-veritysetup detach root\n",
121 u_escaped
, v_escaped
, root_hash_escaped
);
123 r
= fflush_and_check(f
);
125 return log_error_errno(r
, "Failed to write file unit "SYSTEMD_VERITYSETUP_SERVICE
": %m");
127 to
= strjoina(arg_dest
, "/cryptsetup.target.requires/" SYSTEMD_VERITYSETUP_SERVICE
);
129 (void) mkdir_parents(to
, 0755);
130 if (symlink("../" SYSTEMD_VERITYSETUP_SERVICE
, to
) < 0)
131 return log_error_errno(errno
, "Failed to create symlink %s: %m", to
);
136 static int parse_proc_cmdline_item(const char *key
, const char *value
, void *data
) {
139 if (streq(key
, "systemd.verity")) {
141 r
= value
? parse_boolean(value
) : 1;
143 log_warning("Failed to parse verity= kernel command line switch %s. Ignoring.", value
);
147 } else if (streq(key
, "roothash")) {
149 if (proc_cmdline_value_missing(key
, value
))
152 r
= free_and_strdup(&arg_root_hash
, value
);
156 } else if (streq(key
, "systemd.verity_root_data")) {
158 if (proc_cmdline_value_missing(key
, value
))
161 r
= free_and_strdup(&arg_data_what
, value
);
165 } else if (streq(key
, "systemd.verity_root_hash")) {
167 if (proc_cmdline_value_missing(key
, value
))
170 r
= free_and_strdup(&arg_hash_what
, value
);
178 static int determine_devices(void) {
179 _cleanup_free_
void *m
= NULL
;
180 sd_id128_t root_uuid
, verity_uuid
;
185 /* Try to automatically derive the root data and hash device paths from the root hash */
190 if (arg_data_what
&& arg_hash_what
)
193 r
= unhexmem(arg_root_hash
, strlen(arg_root_hash
), &m
, &l
);
195 return log_error_errno(r
, "Failed to parse root hash: %s", arg_root_hash
);
196 if (l
< sizeof(sd_id128_t
)) {
197 log_debug("Root hash is shorter than 128 bits (32 characters), ignoring for discovering verity partition.");
201 if (!arg_data_what
) {
202 memcpy(&root_uuid
, m
, sizeof(root_uuid
));
204 arg_data_what
= strjoin("/dev/disk/by-partuuid/", id128_to_uuid_string(root_uuid
, ids
));
209 if (!arg_hash_what
) {
210 memcpy(&verity_uuid
, (uint8_t*) m
+ l
- sizeof(verity_uuid
), sizeof(verity_uuid
));
212 arg_hash_what
= strjoin("/dev/disk/by-partuuid/", id128_to_uuid_string(verity_uuid
, ids
));
220 int main(int argc
, char *argv
[]) {
223 if (argc
> 1 && argc
!= 4) {
224 log_error("This program takes three or no arguments.");
231 log_set_target(LOG_TARGET_SAFE
);
232 log_parse_environment();
237 r
= proc_cmdline_parse(parse_proc_cmdline_item
, NULL
, PROC_CMDLINE_STRIP_RD_PREFIX
);
239 log_warning_errno(r
, "Failed to parse kernel command line: %m");
243 /* For now we only support the root device on verity. Later on we might want to add support for /etc/veritytab
244 * or similar to define additional mappings */
251 r
= determine_devices();
266 return r
< 0 ? EXIT_FAILURE
: EXIT_SUCCESS
;