blob: 0a367c5b99629697f0b8b19835fb9d7e61083f63 [file] [log] [blame]
Alan Stokesea1f0462024-02-19 16:25:47 +00001// Copyright 2024 The Android Open Source Project
2//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7// http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14
David Drysdale79af2662024-02-19 14:50:31 +000015use android_hardware_security_secretkeeper::aidl::android::hardware::security::secretkeeper::{
16 ISecretkeeper::ISecretkeeper, SecretId::SecretId,
Alan Stokesea1f0462024-02-19 16:25:47 +000017};
David Drysdalee64de8e2024-02-29 11:54:29 +000018use anyhow::{Context, Result};
David Drysdale79af2662024-02-19 14:50:31 +000019use log::{error, info, warn};
Alan Stokesea1f0462024-02-19 16:25:47 +000020
David Drysdale79af2662024-02-19 14:50:31 +000021mod vmdb;
22use vmdb::{VmId, VmIdDb};
23
24/// Interface name for the Secretkeeper HAL.
25const SECRETKEEPER_SERVICE: &str = "android.hardware.security.secretkeeper.ISecretkeeper/default";
26
27/// Directory in which to write persistent state.
28const PERSISTENT_DIRECTORY: &str = "/data/misc/apexdata/com.android.virt";
29
30/// Maximum number of VM IDs to delete at once. Needs to be smaller than both the maximum
31/// number of SQLite parameters (999) and also small enough that an ISecretkeeper::deleteIds
32/// parcel fits within max AIDL message size.
33const DELETE_MAX_BATCH_SIZE: usize = 100;
34
35/// State related to VM secrets.
36pub struct State {
37 sk: binder::Strong<dyn ISecretkeeper>,
38 /// Database of VM IDs,
39 vm_id_db: VmIdDb,
40 batch_size: usize,
Alan Stokesea1f0462024-02-19 16:25:47 +000041}
42
David Drysdale79af2662024-02-19 14:50:31 +000043impl State {
44 pub fn new() -> Option<Self> {
45 let sk = match Self::find_sk() {
46 Some(sk) => sk,
47 None => {
48 warn!("failed to find a Secretkeeper instance; skipping secret management");
49 return None;
50 }
51 };
52 let (vm_id_db, created) = match VmIdDb::new(PERSISTENT_DIRECTORY) {
53 Ok(v) => v,
54 Err(e) => {
55 error!("skipping secret management, failed to connect to database: {e:?}");
56 return None;
57 }
58 };
59 if created {
60 // If the database did not previously exist, then this appears to be the first run of
61 // `virtualizationservice` since device setup or factory reset. In case of the latter,
62 // delete any secrets that may be left over from before reset, thus ensuring that the
63 // local database state matches that of the TA (i.e. empty).
64 warn!("no existing VM ID DB; clearing any previous secrets to match fresh DB");
65 if let Err(e) = sk.deleteAll() {
66 error!("failed to delete previous secrets, dropping database: {e:?}");
67 vm_id_db.delete_db_file(PERSISTENT_DIRECTORY);
68 return None;
69 }
70 } else {
71 info!("re-using existing VM ID DB");
72 }
73 Some(Self { sk, vm_id_db, batch_size: DELETE_MAX_BATCH_SIZE })
Alan Stokesea1f0462024-02-19 16:25:47 +000074 }
75
David Drysdale79af2662024-02-19 14:50:31 +000076 fn find_sk() -> Option<binder::Strong<dyn ISecretkeeper>> {
77 if let Ok(true) = binder::is_declared(SECRETKEEPER_SERVICE) {
78 match binder::get_interface(SECRETKEEPER_SERVICE) {
79 Ok(sk) => Some(sk),
80 Err(e) => {
81 error!("failed to connect to {SECRETKEEPER_SERVICE}: {e:?}");
82 None
83 }
84 }
85 } else {
86 info!("instance {SECRETKEEPER_SERVICE} not declared");
87 None
88 }
89 }
90
David Drysdalee64de8e2024-02-29 11:54:29 +000091 /// Record a new VM ID.
92 pub fn add_id(&mut self, vm_id: &VmId, user_id: u32, app_id: u32) -> Result<()> {
93 let user_id: i32 = user_id.try_into().context(format!("user_id {user_id} out of range"))?;
94 let app_id: i32 = app_id.try_into().context(format!("app_id {app_id} out of range"))?;
95 self.vm_id_db.add_vm_id(vm_id, user_id, app_id)
96 }
97
David Drysdale79af2662024-02-19 14:50:31 +000098 /// Delete the VM IDs associated with Android user ID `user_id`.
99 pub fn delete_ids_for_user(&mut self, user_id: i32) -> Result<()> {
100 let vm_ids = self.vm_id_db.vm_ids_for_user(user_id)?;
101 info!(
102 "delete_ids_for_user(user_id={user_id}) triggers deletion of {} secrets",
103 vm_ids.len()
104 );
105 self.delete_ids(&vm_ids);
106 Ok(())
107 }
108
109 /// Delete the VM IDs associated with `(user_id, app_id)`.
110 pub fn delete_ids_for_app(&mut self, user_id: i32, app_id: i32) -> Result<()> {
111 let vm_ids = self.vm_id_db.vm_ids_for_app(user_id, app_id)?;
112 info!(
113 "delete_ids_for_app(user_id={user_id}, app_id={app_id}) removes {} secrets",
114 vm_ids.len()
115 );
116 self.delete_ids(&vm_ids);
117 Ok(())
118 }
119
120 /// Delete the provided VM IDs from both Secretkeeper and the database.
121 pub fn delete_ids(&mut self, mut vm_ids: &[VmId]) {
122 while !vm_ids.is_empty() {
123 let len = std::cmp::min(vm_ids.len(), self.batch_size);
124 let batch = &vm_ids[..len];
125 self.delete_ids_batch(batch);
126 vm_ids = &vm_ids[len..];
127 }
128 }
129
130 /// Delete a batch of VM IDs from both Secretkeeper and the database. The batch is assumed
131 /// to be smaller than both:
132 /// - the corresponding limit for number of database parameters
133 /// - the corresponding limit for maximum size of a single AIDL message for `ISecretkeeper`.
134 fn delete_ids_batch(&mut self, vm_ids: &[VmId]) {
135 let secret_ids: Vec<SecretId> = vm_ids.iter().map(|id| SecretId { id: *id }).collect();
136 if let Err(e) = self.sk.deleteIds(&secret_ids) {
137 error!("failed to delete all secrets from Secretkeeper: {e:?}");
138 }
139 if let Err(e) = self.vm_id_db.delete_vm_ids(vm_ids) {
140 error!("failed to remove secret IDs from database: {e:?}");
141 }
142 }
143}
144
145#[cfg(test)]
146mod tests {
147 use super::*;
148 use std::sync::{Arc, Mutex};
149 use android_hardware_security_authgraph::aidl::android::hardware::security::authgraph::{
150 IAuthGraphKeyExchange::IAuthGraphKeyExchange,
151 };
152 use android_hardware_security_secretkeeper::aidl::android::hardware::security::secretkeeper::{
153 ISecretkeeper::BnSecretkeeper
154 };
155
156 /// Fake implementation of Secretkeeper that keeps a history of what operations were invoked.
157 #[derive(Default)]
158 struct FakeSk {
159 history: Arc<Mutex<Vec<SkOp>>>,
160 }
161
162 #[derive(Clone, PartialEq, Eq, Debug)]
163 enum SkOp {
164 Management,
165 DeleteIds(Vec<VmId>),
166 DeleteAll,
167 }
168
169 impl ISecretkeeper for FakeSk {
170 fn processSecretManagementRequest(&self, _req: &[u8]) -> binder::Result<Vec<u8>> {
171 self.history.lock().unwrap().push(SkOp::Management);
172 Ok(vec![])
173 }
174
175 fn getAuthGraphKe(&self) -> binder::Result<binder::Strong<dyn IAuthGraphKeyExchange>> {
176 unimplemented!()
177 }
178
179 fn deleteIds(&self, ids: &[SecretId]) -> binder::Result<()> {
180 self.history.lock().unwrap().push(SkOp::DeleteIds(ids.iter().map(|s| s.id).collect()));
181 Ok(())
182 }
183
184 fn deleteAll(&self) -> binder::Result<()> {
185 self.history.lock().unwrap().push(SkOp::DeleteAll);
186 Ok(())
187 }
188 }
189 impl binder::Interface for FakeSk {}
190
191 fn new_test_state(history: Arc<Mutex<Vec<SkOp>>>, batch_size: usize) -> State {
192 let vm_id_db = vmdb::new_test_db();
193 let sk = FakeSk { history };
194 let sk = BnSecretkeeper::new_binder(sk, binder::BinderFeatures::default());
195 State { sk, vm_id_db, batch_size }
196 }
197
198 const VM_ID1: VmId = [1u8; 64];
199 const VM_ID2: VmId = [2u8; 64];
200 const VM_ID3: VmId = [3u8; 64];
201 const VM_ID4: VmId = [4u8; 64];
202 const VM_ID5: VmId = [5u8; 64];
203
204 #[test]
205 fn test_sk_state_batching() {
206 let history = Arc::new(Mutex::new(Vec::new()));
207 let mut sk_state = new_test_state(history.clone(), 2);
208 sk_state.delete_ids(&[VM_ID1, VM_ID2, VM_ID3, VM_ID4, VM_ID5]);
209 let got = (*history.lock().unwrap()).clone();
210 assert_eq!(
211 got,
212 vec![
213 SkOp::DeleteIds(vec![VM_ID1, VM_ID2]),
214 SkOp::DeleteIds(vec![VM_ID3, VM_ID4]),
215 SkOp::DeleteIds(vec![VM_ID5]),
216 ]
217 );
218 }
219
220 #[test]
221 fn test_sk_state_no_batching() {
222 let history = Arc::new(Mutex::new(Vec::new()));
223 let mut sk_state = new_test_state(history.clone(), 6);
224 sk_state.delete_ids(&[VM_ID1, VM_ID2, VM_ID3, VM_ID4, VM_ID5]);
225 let got = (*history.lock().unwrap()).clone();
226 assert_eq!(got, vec![SkOp::DeleteIds(vec![VM_ID1, VM_ID2, VM_ID3, VM_ID4, VM_ID5])]);
227 }
228
229 #[test]
230 fn test_sk_state() {
231 const USER1: i32 = 1;
232 const USER2: i32 = 2;
233 const USER3: i32 = 3;
234 const APP_A: i32 = 50;
235 const APP_B: i32 = 60;
236 const APP_C: i32 = 70;
237
238 let history = Arc::new(Mutex::new(Vec::new()));
239 let mut sk_state = new_test_state(history.clone(), 2);
240
241 sk_state.vm_id_db.add_vm_id(&VM_ID1, USER1, APP_A).unwrap();
242 sk_state.vm_id_db.add_vm_id(&VM_ID2, USER1, APP_A).unwrap();
243 sk_state.vm_id_db.add_vm_id(&VM_ID3, USER2, APP_B).unwrap();
244 sk_state.vm_id_db.add_vm_id(&VM_ID4, USER3, APP_A).unwrap();
245 sk_state.vm_id_db.add_vm_id(&VM_ID5, USER3, APP_C).unwrap();
246 assert_eq!((*history.lock().unwrap()).clone(), vec![]);
247
248 sk_state.delete_ids_for_app(USER2, APP_B).unwrap();
249 assert_eq!((*history.lock().unwrap()).clone(), vec![SkOp::DeleteIds(vec![VM_ID3])]);
250
251 sk_state.delete_ids_for_user(USER3).unwrap();
252 assert_eq!(
253 (*history.lock().unwrap()).clone(),
254 vec![SkOp::DeleteIds(vec![VM_ID3]), SkOp::DeleteIds(vec![VM_ID4, VM_ID5]),]
255 );
256
257 assert_eq!(vec![VM_ID1, VM_ID2], sk_state.vm_id_db.vm_ids_for_user(USER1).unwrap());
258 assert_eq!(vec![VM_ID1, VM_ID2], sk_state.vm_id_db.vm_ids_for_app(USER1, APP_A).unwrap());
259 let empty: Vec<VmId> = Vec::new();
260 assert_eq!(empty, sk_state.vm_id_db.vm_ids_for_app(USER2, APP_B).unwrap());
261 assert_eq!(empty, sk_state.vm_id_db.vm_ids_for_user(USER3).unwrap());
Alan Stokesea1f0462024-02-19 16:25:47 +0000262 }
263}