blob: 3dc5d8eebb71e897088e71cbe730254faa29cfe7 [file] [log] [blame]
// Copyright 2019 The Fuchsia Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "factory_reset.h"
#include <fcntl.h>
#include <fuchsia/device/llcpp/fidl.h>
#include <fuchsia/hardware/power/statecontrol/cpp/fidl.h>
#include <fuchsia/hardware/power/statecontrol/cpp/fidl_test_base.h>
#include <lib/async-loop/cpp/loop.h>
#include <lib/async-loop/default.h>
#include <lib/devmgr-integration-test/fixture.h>
#include <lib/fdio/cpp/caller.h>
#include <lib/fdio/fd.h>
#include <lib/fdio/fdio.h>
#include <lib/fidl/cpp/binding_set.h>
#include <lib/zx/vmo.h>
#include <zircon/hw/gpt.h>
#include <fbl/algorithm.h>
#include <fs-management/fvm.h>
#include <fs-management/mount.h>
#include <gtest/gtest.h>
#include <ramdevice-client/ramdisk.h>
#include "src/security/zxcrypt/fdio-volume.h"
namespace {
using devmgr_integration_test::IsolatedDevmgr;
using ::testing::Test;
const uint32_t kBlockCount = 1024 * 256;
const uint32_t kBlockSize = 512;
const uint32_t kSliceSize = (1 << 20);
const size_t kDeviceSize = kBlockCount * kBlockSize;
const char* kDataName = "fdr-data";
const char* kRamCtlPath = "misc/ramctl";
const size_t kKeyBytes = 32; // Generate a 256-bit key for the zxcrypt volume
class MockAdmin : public fuchsia::hardware::power::statecontrol::testing::Admin_TestBase {
public:
bool suspend_called() { return suspend_called_; }
private:
void NotImplemented_(const std::string& name) override {
printf("'%s' was called unexpectedly", name.c_str());
ASSERT_TRUE(false);
}
void Reboot(fuchsia::hardware::power::statecontrol::RebootReason req,
RebootCallback callback) override {
ASSERT_FALSE(suspend_called_);
suspend_called_ = true;
ASSERT_EQ(fuchsia::hardware::power::statecontrol::RebootReason::FACTORY_DATA_RESET, req);
callback(fuchsia::hardware::power::statecontrol::Admin_Reboot_Result::WithResponse(
fuchsia::hardware::power::statecontrol::Admin_Reboot_Response(ZX_OK)));
}
bool suspend_called_ = false;
};
class FactoryResetTest : public Test {
public:
// Create an IsolatedDevmgr that can load device drivers such as fvm,
// zxcrypt, etc.
void SetUp() override {
devmgr_.reset(new IsolatedDevmgr());
auto args = IsolatedDevmgr::DefaultArgs();
args.disable_block_watcher = true;
args.sys_device_driver = devmgr_integration_test::IsolatedDevmgr::kSysdevDriver;
args.load_drivers.push_back(devmgr_integration_test::IsolatedDevmgr::kSysdevDriver);
args.driver_search_paths.push_back("/boot/driver");
ASSERT_EQ(IsolatedDevmgr::Create(std::move(args), devmgr_.get()), ZX_OK);
CreateRamdisk();
CreateFvmPartition();
}
void TearDown() override { ASSERT_EQ(ramdisk_destroy(ramdisk_client_), ZX_OK); }
bool PartitionHasFormat(disk_format_t format) {
fbl::unique_fd fd(openat(devmgr_->devfs_root().get(), fvm_block_path_, O_RDONLY));
return detect_disk_format(fd.get()) == format;
}
void CreateZxcrypt() {
std::unique_ptr<zxcrypt::FdioVolume> zxcrypt_volume;
fbl::unique_fd fd;
WaitForDevice(fvm_block_path_, &fd);
// Use an explicit key for this test volume. Other key sources may not be
// available in the isolated test environment.
crypto::Secret key;
ASSERT_EQ(key.Generate(kKeyBytes), ZX_OK);
ASSERT_EQ(zxcrypt::FdioVolume::Create(fd.duplicate(), devfs_root(), key, &zxcrypt_volume),
ZX_OK);
zx::channel zxc_manager_chan;
ASSERT_EQ(zxcrypt_volume->OpenManager(zx::duration::infinite(),
zxc_manager_chan.reset_and_get_address()),
ZX_OK);
zxcrypt::FdioVolumeManager volume_manager(std::move(zxc_manager_chan));
ASSERT_EQ(volume_manager.Unseal(key.get(), key.len(), 0), ZX_OK);
WaitForZxcrypt();
}
void CreateCorruptedZxcrypt() {
fbl::unique_fd fd;
WaitForDevice(fvm_block_path_, &fd);
// Write just the zxcrypt magic at the start of the volume.
// It will not be possible to unseal this device, but we want to ensure that
// factory reset completes anyway and shreds what key material would reside
// in that block.
// Prepare a buffer of the native block size that starts with zxcrypt_magic.
// Block reads and writes via fds must match the block size.
ssize_t block_size;
GetBlockSize(fd, &block_size);
std::unique_ptr<uint8_t[]> block = std::make_unique<uint8_t[]>(block_size);
memset(block.get(), 0, block_size);
memcpy(block.get(), zxcrypt_magic, sizeof(zxcrypt_magic));
ssize_t res = write(fd.get(), block.get(), block_size);
ASSERT_EQ(res, block_size);
}
void CreateFakeBlobfs() {
// Writes just the blobfs magic at the start of the volume, just as something
// else we expect to detect so we can see if the block gets randomized later
// or not.
fbl::unique_fd fd;
WaitForDevice(fvm_block_path_, &fd);
// Prepare a buffer of the native block size that starts with blobfs_magic.
// Block reads and writes via fds must match the block size.
ssize_t block_size;
GetBlockSize(fd, &block_size);
std::unique_ptr<uint8_t[]> block = std::make_unique<uint8_t[]>(block_size);
memset(block.get(), 0, block_size);
memcpy(block.get(), blobfs_magic, sizeof(blobfs_magic));
ssize_t res = write(fd.get(), block.get(), block_size);
ASSERT_EQ(res, block_size);
}
fbl::unique_fd devfs_root() { return devmgr_->devfs_root().duplicate(); }
private:
void WaitForZxcrypt() {
char data_block_path[PATH_MAX];
// Second, wait for the data partition to be formatted.
snprintf(data_block_path, sizeof(data_block_path), "%s/zxcrypt/unsealed/block",
fvm_block_path_);
fbl::unique_fd fd;
WaitForDevice(data_block_path, &fd);
}
void GetBlockSize(const fbl::unique_fd& fd, ssize_t* out_size) {
zx_status_t call_status;
fdio_cpp::UnownedFdioCaller caller(fd.get());
ASSERT_TRUE(caller);
fuchsia_hardware_block_BlockInfo block_info;
ASSERT_EQ(
fuchsia_hardware_block_BlockGetInfo(caller.borrow_channel(), &call_status, &block_info),
ZX_OK);
ASSERT_EQ(call_status, ZX_OK);
*out_size = block_info.block_size;
}
void CreateRamdisk() {
zx::vmo disk;
ASSERT_EQ(zx::vmo::create(kDeviceSize, 0, &disk), ZX_OK);
int fd = -1;
ASSERT_EQ(fdio_fd_create(disk.get(), &fd), ZX_OK);
ASSERT_GE(fd, 0);
ASSERT_EQ(fvm_init_with_size(fd, kDeviceSize, kSliceSize), ZX_OK);
fbl::unique_fd ramctl;
WaitForDevice(kRamCtlPath, &ramctl);
ASSERT_EQ(ramdisk_create_at_from_vmo(devfs_root().get(), disk.release(), &ramdisk_client_),
ZX_OK);
}
zx_status_t AttachDriver(const fbl::unique_fd& fd, const fbl::StringPiece& driver) {
fdio_cpp::UnownedFdioCaller connection(fd.get());
zx_status_t call_status = ZX_OK;
auto resp = ::llcpp::fuchsia::device::Controller::Call::Bind(
zx::unowned_channel(connection.borrow_channel()),
::fidl::unowned_str(driver.data(), driver.length()));
zx_status_t io_status = resp.status();
if (io_status != ZX_OK) {
return io_status;
}
if (resp->result.is_err()) {
call_status = resp->result.err();
}
return call_status;
}
void BindFvm() {
fbl::unique_fd ramdisk_fd(ramdisk_get_block_fd(ramdisk_client_));
ASSERT_EQ(AttachDriver(ramdisk_fd, "/boot/driver/fvm.so"), ZX_OK);
}
void CreateFvmPartition() {
BindFvm();
fbl::unique_fd fvm_fd;
char fvm_path[PATH_MAX];
snprintf(fvm_path, PATH_MAX, "%s/fvm", ramdisk_get_path(ramdisk_client_));
WaitForDevice(fvm_path, &fvm_fd);
// Allocate a FVM partition with the data guid but don't actually format the
// partition.
alloc_req_t req;
memset(&req, 0, sizeof(alloc_req_t));
req.slice_count = 1;
static const uint8_t data_guid[GPT_GUID_LEN] = GUID_DATA_VALUE;
memcpy(req.type, data_guid, BLOCK_GUID_LEN);
fuchsia_hardware_block_partition_GUID type_guid;
memcpy(type_guid.value, req.type, BLOCK_GUID_LEN);
fuchsia_hardware_block_partition_GUID instance_guid;
memcpy(instance_guid.value, req.guid, BLOCK_GUID_LEN);
fdio_cpp::UnownedFdioCaller caller(fvm_fd.get());
zx_status_t status;
ASSERT_EQ(fuchsia_hardware_block_volume_VolumeManagerAllocatePartition(
caller.borrow_channel(), req.slice_count, &type_guid, &instance_guid, kDataName,
strlen(kDataName), req.flags, &status),
ZX_OK);
ASSERT_EQ(status, ZX_OK);
snprintf(fvm_block_path_, sizeof(fvm_block_path_), "%s/%s-p-1/block", fvm_path, kDataName);
fbl::unique_fd fd;
WaitForDevice(fvm_block_path_, &fd);
}
void WaitForDevice(const char* path, fbl::unique_fd* fd) {
printf("wait for device %s\n", path);
ASSERT_EQ(devmgr_integration_test::RecursiveWaitForFile(devfs_root(), path, fd), ZX_OK);
ASSERT_TRUE(*fd);
}
ramdisk_client_t* ramdisk_client_;
char fvm_block_path_[PATH_MAX];
std::unique_ptr<IsolatedDevmgr> devmgr_;
};
// Tests that FactoryReset can find the correct block device and overwrite its
// superblocks, causing it to look like an unknown partition (which upon reboot
// will cause recovery to happen).
TEST_F(FactoryResetTest, CanShredVolume) {
async::Loop loop(&kAsyncLoopConfigAttachToCurrentThread);
// Set up a normal zxcrypt superblock
CreateZxcrypt();
MockAdmin mock_admin;
fidl::BindingSet<fuchsia::hardware::power::statecontrol::Admin> binding;
fidl::InterfacePtr<fuchsia::hardware::power::statecontrol::Admin> admin =
binding.AddBinding(&mock_admin).Bind();
factory_reset::FactoryReset reset((fbl::unique_fd(devfs_root())), std::move(admin));
EXPECT_TRUE(PartitionHasFormat(DISK_FORMAT_ZXCRYPT));
zx_status_t status = ZX_ERR_BAD_STATE;
reset.Reset([&status](zx_status_t s) { status = s; });
loop.RunUntilIdle();
EXPECT_EQ(status, ZX_OK);
EXPECT_TRUE(mock_admin.suspend_called());
EXPECT_TRUE(PartitionHasFormat(DISK_FORMAT_UNKNOWN));
}
TEST_F(FactoryResetTest, ShredsVolumeWithInvalidSuperblockIfMagicPresent) {
// This test ensures that even if we can't unseal the zxcrypt device, we can
// still wipe it.
async::Loop loop(&kAsyncLoopConfigAttachToCurrentThread);
// Set up a corrupted zxcrypt superblock -- just enough to recognize the
// magic, but not enough to successfully unseal the device.
CreateCorruptedZxcrypt();
MockAdmin mock_admin;
fidl::BindingSet<fuchsia::hardware::power::statecontrol::Admin> binding;
fidl::InterfacePtr<fuchsia::hardware::power::statecontrol::Admin> admin =
binding.AddBinding(&mock_admin).Bind();
// Verify that we re-shred that superblock anyway when we run factory reset.
factory_reset::FactoryReset reset((fbl::unique_fd(devfs_root())), std::move(admin));
EXPECT_TRUE(PartitionHasFormat(DISK_FORMAT_ZXCRYPT));
zx_status_t status = ZX_ERR_BAD_STATE;
reset.Reset([&status](zx_status_t s) { status = s; });
loop.RunUntilIdle();
EXPECT_EQ(status, ZX_OK);
EXPECT_TRUE(mock_admin.suspend_called());
EXPECT_TRUE(PartitionHasFormat(DISK_FORMAT_UNKNOWN));
}
TEST_F(FactoryResetTest, DoesntShredVolumeIfNotZxcryptFormat) {
async::Loop loop(&kAsyncLoopConfigAttachToCurrentThread);
// Make this block device look like it contains blobfs.
CreateFakeBlobfs();
MockAdmin mock_admin;
fidl::BindingSet<fuchsia::hardware::power::statecontrol::Admin> binding;
fidl::InterfacePtr<fuchsia::hardware::power::statecontrol::Admin> admin =
binding.AddBinding(&mock_admin).Bind();
factory_reset::FactoryReset reset((fbl::unique_fd(devfs_root())), std::move(admin));
EXPECT_TRUE(PartitionHasFormat(DISK_FORMAT_BLOBFS));
zx_status_t status = ZX_ERR_BAD_STATE;
reset.Reset([&status](zx_status_t s) { status = s; });
loop.RunUntilIdle();
EXPECT_EQ(status, ZX_OK);
EXPECT_TRUE(mock_admin.suspend_called());
// Expect factory reset to still succeed, but to not touch the block device.
// In a world where fshost knew more about expected topology, we'd want to
// shred this block device anyway, but that won't happen until we have a
// clearer block device topology story.
EXPECT_TRUE(PartitionHasFormat(DISK_FORMAT_BLOBFS));
}
} // namespace