kpmcore/src/fs/luks.cpp

651 lines
19 KiB
C++
Raw Normal View History

/*************************************************************************
* Copyright (C) 2012 by Volker Lanz <vl@fidra.de> *
* Copyright (C) 2013 by Andrius Štikonas <andrius@stikonas.eu> *
2016-04-15 14:43:21 +01:00
* Copyright (C) 2015-2016 by Teo Mrnjavac <teo@kde.org> *
* *
* This program is free software; you can redistribute it and/or *
* modify it under the terms of the GNU General Public License as *
* published by the Free Software Foundation; either version 3 of *
* the License, or (at your option) any later version. *
* *
* This program is distributed in the hope that it will be useful, *
* but WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
* GNU General Public License for more details. *
* *
* You should have received a copy of the GNU General Public License *
* along with this program. If not, see <http://www.gnu.org/licenses/>.*
*************************************************************************/
#include "fs/luks.h"
#include "fs/filesystemfactory.h"
#include "util/capacity.h"
#include "util/externalcommand.h"
#include "util/report.h"
#include <QDebug>
2015-08-04 16:04:30 +01:00
#include <QDialog>
#include <QPointer>
#include <QRegularExpression>
#include <QString>
#include <QUuid>
#include <KDiskFreeSpaceInfo>
#include <KLocalizedString>
#include <KPasswordDialog>
namespace FS
{
FileSystem::CommandSupportType luks::m_GetUsed = FileSystem::cmdSupportNone;
FileSystem::CommandSupportType luks::m_GetLabel = FileSystem::cmdSupportNone;
FileSystem::CommandSupportType luks::m_Create = FileSystem::cmdSupportNone;
FileSystem::CommandSupportType luks::m_Grow = FileSystem::cmdSupportNone;
FileSystem::CommandSupportType luks::m_Shrink = FileSystem::cmdSupportNone;
FileSystem::CommandSupportType luks::m_Move = FileSystem::cmdSupportNone;
FileSystem::CommandSupportType luks::m_Check = FileSystem::cmdSupportNone;
FileSystem::CommandSupportType luks::m_Copy = FileSystem::cmdSupportNone;
FileSystem::CommandSupportType luks::m_Backup = FileSystem::cmdSupportNone;
FileSystem::CommandSupportType luks::m_SetLabel = FileSystem::cmdSupportNone;
FileSystem::CommandSupportType luks::m_UpdateUUID = FileSystem::cmdSupportNone;
FileSystem::CommandSupportType luks::m_GetUUID = FileSystem::cmdSupportNone;
luks::luks(qint64 firstsector,
qint64 lastsector,
qint64 sectorsused,
const QString& label)
: FileSystem(firstsector, lastsector, sectorsused, label, FileSystem::Luks)
, m_innerFs(nullptr)
, m_isCryptOpen(false)
, m_cryptsetupFound(false)
, m_isMounted(false)
, m_logicalSectorSize(1)
{
}
luks::~luks()
{
delete m_innerFs;
}
void luks::init()
{
CommandSupportType cryptsetupFound = findExternal(QStringLiteral("cryptsetup")) ? cmdSupportFileSystem : cmdSupportNone;
m_Create = cryptsetupFound;
m_UpdateUUID = cryptsetupFound;
m_GetUUID = cryptsetupFound;
m_Grow = cryptsetupFound;
m_Shrink = cryptsetupFound;
2016-05-17 17:38:17 +01:00
m_SetLabel = cmdSupportNone;
m_GetLabel = cmdSupportFileSystem;
m_Check = cmdSupportCore;
m_Copy = cmdSupportCore;
m_Move = cmdSupportCore;
m_Backup = cmdSupportCore;
m_GetUsed = cmdSupportNone; // libparted does not support LUKS, we do this as a special case
}
void luks::scan(const QString& deviceNode)
{
getMapperName(deviceNode);
getCipherName(deviceNode);
getCipherMode(deviceNode);
getHashName(deviceNode);
getKeySize(deviceNode);
getPayloadOffset(deviceNode);
}
bool luks::supportToolFound() const
{
m_cryptsetupFound = findExternal(QStringLiteral("cryptsetup")) ? cmdSupportFileSystem : cmdSupportNone;
return m_cryptsetupFound &&
2016-04-27 14:22:00 +01:00
((m_isCryptOpen && m_innerFs) ? m_innerFs->supportToolFound() : true);
}
FileSystem::SupportTool luks::supportToolName() const
{
if (m_isCryptOpen && m_innerFs && m_cryptsetupFound)
return m_innerFs->supportToolName();
return SupportTool(QStringLiteral("cryptsetup"),
QUrl(QStringLiteral("https://code.google.com/p/cryptsetup/")));
}
2016-04-12 10:26:07 +01:00
bool luks::create(Report& report, const QString& deviceNode) const
{
Q_ASSERT(m_innerFs);
Q_ASSERT(!m_passphrase.isEmpty());
2016-04-12 10:26:07 +01:00
ExternalCommand createCmd(report, QStringLiteral("cryptsetup"),
{ QStringLiteral("-s"),
QStringLiteral("512"),
QStringLiteral("--batch-mode"),
QStringLiteral("luksFormat"),
deviceNode });
if (!( createCmd.start(-1) &&
createCmd.write(m_passphrase.toUtf8() + '\n') == m_passphrase.toUtf8().length() + 1 &&
createCmd.waitFor() && createCmd.exitCode() == 0))
{
2016-04-12 10:26:07 +01:00
return false;
}
ExternalCommand openCmd(report, QStringLiteral("cryptsetup"),
{ QStringLiteral("open"),
deviceNode,
suggestedMapperName(deviceNode) });
2016-04-12 10:26:07 +01:00
2016-05-09 11:07:31 +01:00
if (!( openCmd.start(-1) && openCmd.write(m_passphrase.toUtf8() + '\n') == m_passphrase.toUtf8().length() + 1 && openCmd.waitFor()))
2016-04-12 10:26:07 +01:00
return false;
if (mapperName().isEmpty())
2016-04-12 10:26:07 +01:00
return false;
// FIXME scan(deviceNode);
if (!m_innerFs->create(report, mapperName()))
return false;
2016-04-12 10:26:07 +01:00
return true;
2016-04-12 10:26:07 +01:00
}
2015-08-04 16:04:30 +01:00
QString luks::mountTitle() const
{
return xi18nc("@title:menu", "Mount");
}
2015-09-16 14:18:13 +01:00
QString luks::unmountTitle() const
{
return xi18nc("@title:menu", "Unmount");
}
QString luks::cryptOpenTitle() const
{
return xi18nc("@title:menu", "Decrypt");
}
QString luks::cryptCloseTitle() const
2015-07-13 15:16:36 +01:00
{
return xi18nc("@title:menu", "Deactivate");
2015-07-13 15:16:36 +01:00
}
void luks::setPassphrase(const QString& passphrase)
{
m_passphrase = passphrase;
}
2016-05-06 15:50:03 +01:00
QString luks::passphrase() const
{
return m_passphrase;
}
bool luks::canMount(const QString&, const QString& mountPoint) const
2015-08-04 16:04:30 +01:00
{
return m_isCryptOpen &&
!m_isMounted &&
m_innerFs &&
m_innerFs->canMount(mapperName(), mountPoint);
}
bool luks::canUnmount(const QString&) const
{
return m_isCryptOpen &&
m_isMounted &&
m_innerFs &&
m_innerFs->canUnmount(mapperName());
}
bool luks::isMounted() const
{
return m_isCryptOpen && m_isMounted;
}
void luks::setMounted(bool mounted)
{
m_isMounted = mounted;
}
bool luks::canCryptOpen(const QString&) const
{
return !m_isCryptOpen && !m_isMounted && supportToolFound();
}
bool luks::canCryptClose(const QString&) const
{
return m_isCryptOpen && !m_isMounted && m_cryptsetupFound;
}
bool luks::isCryptOpen() const
{
return m_isCryptOpen;
}
void luks::setCryptOpen(bool cryptOpen)
{
m_isCryptOpen = cryptOpen;
}
bool luks::cryptOpen(QWidget* parent, const QString& deviceNode)
{
if (m_isCryptOpen)
{
if (!mapperName().isEmpty())
{
qWarning() << "LUKS device" << deviceNode
<< "already decrypted."
<< "Cannot decrypt again.";
return false;
}
else
{
qWarning() << "LUKS device" << deviceNode
<< "reportedly decrypted but mapper node not found."
<< "Marking device as NOT decrypted and trying to "
"decrypt again anyway.";
m_isCryptOpen = false;
}
}
KPasswordDialog dlg( parent );
dlg.setPrompt(i18n("Enter passphrase for %1:", deviceNode));
if( !dlg.exec() )
return false;
2015-08-04 16:04:30 +01:00
QString passphrase = dlg.password();
ExternalCommand openCmd(QStringLiteral("cryptsetup"),
{ QStringLiteral("open"),
deviceNode,
suggestedMapperName(deviceNode) });
if (!( openCmd.start(-1) &&
2016-05-09 11:07:31 +01:00
openCmd.write(passphrase.toUtf8() + '\n') == passphrase.toUtf8().length() + 1 &&
openCmd.waitFor() && openCmd.exitCode() == 0) )
return false;
if (m_innerFs) {
delete m_innerFs;
m_innerFs = nullptr;
}
scan(deviceNode);
if (mapperName().isEmpty())
return false;
loadInnerFileSystem(mapperName());
m_isCryptOpen = (m_innerFs != nullptr);
if (!m_isCryptOpen)
return false;
m_passphrase = passphrase;
return true;
}
bool luks::cryptClose(const QString& deviceNode)
{
if (!m_isCryptOpen)
{
qWarning() << "Cannot close LUKS device" << deviceNode
<< "because it's not open.";
return false;
}
if (m_isMounted)
{
qWarning() << "Cannot close LUKS device" << deviceNode
<< "because the filesystem is mounted.";
return false;
}
ExternalCommand cmd(QStringLiteral("cryptsetup"),
{ QStringLiteral("close"), mapperName() });
if (!(cmd.run(-1) && cmd.exitCode() == 0))
return false;
delete m_innerFs;
m_innerFs = nullptr;
m_passphrase.clear();
setLabel({});
setUUID(readUUID(deviceNode));
setSectorsUsed(-1);
m_isCryptOpen = (m_innerFs != nullptr);
if (m_isCryptOpen)
return false;
return true;
}
void luks::loadInnerFileSystem(const QString& mapperNode)
{
Q_ASSERT(!m_innerFs);
FileSystem::Type innerFsType = detectFileSystem(mapperNode);
m_innerFs = FileSystemFactory::cloneWithNewType(innerFsType,
*this);
setLabel(m_innerFs->readLabel(mapperNode));
setUUID(m_innerFs->readUUID(mapperNode));
if (m_innerFs->supportGetUsed() == FileSystem::cmdSupportFileSystem)
setSectorsUsed((m_innerFs->readUsedCapacity(mapperNode) + payloadOffset()) / m_logicalSectorSize );
}
void luks::createInnerFileSystem(FileSystem::Type type)
{
Q_ASSERT(!m_innerFs);
m_innerFs = FileSystemFactory::cloneWithNewType(type, *this);
}
bool luks::check(Report& report, const QString&) const
2016-04-26 13:26:40 +01:00
{
Q_ASSERT(m_innerFs);
if (mapperName().isEmpty())
2016-04-26 13:26:40 +01:00
return false;
return m_innerFs->check(report, mapperName());
2016-04-26 13:26:40 +01:00
}
qint64 luks::readUsedCapacity(const QString& deviceNode) const
{
if (!m_isCryptOpen)
return -1;
if (m_innerFs)
return m_innerFs->readUsedCapacity(deviceNode);
return -1;
}
bool luks::mount(Report& report, const QString& deviceNode, const QString& mountPoint)
{
if (!m_isCryptOpen)
{
qWarning() << "Cannot mount device" << deviceNode
<< "before decrypting it first.";
return false;
}
if (m_isMounted)
{
qWarning() << "Cannot mount device" << deviceNode
<< "because it's already mounted.";
return false;
}
Q_ASSERT(m_innerFs);
if (mapperName().isEmpty())
return false;
if (m_innerFs->canMount(mapperName(), mountPoint))
{
if (m_innerFs->mount(report, mapperName(), mountPoint))
{
m_isMounted = true;
const KDiskFreeSpaceInfo freeSpaceInfo = KDiskFreeSpaceInfo::freeSpaceInfo(mountPoint);
if (freeSpaceInfo.isValid() && mountPoint != QString())
setSectorsUsed((freeSpaceInfo.used() + payloadOffset()) / m_logicalSectorSize);
return true;
}
}
else {
ExternalCommand mountCmd(
report,
QStringLiteral("mount"),
{ QStringLiteral("--verbose"), mapperName(), mountPoint });
if (mountCmd.run() && mountCmd.exitCode() == 0)
{
m_isMounted = true;
return true;
}
}
return false;
}
bool luks::unmount(Report& report, const QString& deviceNode)
{
if (!m_isCryptOpen)
{
qWarning() << "Cannot unmount device" << deviceNode
<< "before decrypting it first.";
return false;
}
if (!m_isMounted)
{
qWarning() << "Cannot unmount device" << deviceNode
<< "because it's not mounted.";
return false;
}
Q_ASSERT(m_innerFs);
if (mapperName().isEmpty())
return false;
if (m_innerFs->canUnmount(mapperName()))
{
if (m_innerFs->unmount(report, mapperName()))
{
m_isMounted = false;
return true;
}
}
else {
ExternalCommand unmountCmd( report,
2016-05-06 14:34:40 +01:00
QStringLiteral("umount"),
{ QStringLiteral("--verbose"), QStringLiteral("--all-targets"), mapperName() });
if (unmountCmd.run() && unmountCmd.exitCode() == 0)
{
m_isMounted = false;
return true;
}
}
return false;
2015-07-13 15:16:36 +01:00
}
FileSystem::Type luks::type() const
{
if (m_isCryptOpen && m_innerFs)
return m_innerFs->type();
return FileSystem::Luks;
}
QString luks::suggestedMapperName(const QString& deviceNode) const
{
2016-05-05 13:15:39 +01:00
return QStringLiteral("luks-") + readOuterUUID(deviceNode);
}
QString luks::readLabel(const QString&) const
{
if (m_isCryptOpen && m_innerFs)
return m_innerFs->readLabel(mapperName());
return QString();
}
bool luks::writeLabel(Report& report, const QString&, const QString& newLabel)
{
Q_ASSERT(m_innerFs);
return m_innerFs->writeLabel(report, mapperName(), newLabel);
}
2016-04-29 17:55:55 +01:00
bool luks::resize(Report& report, const QString& deviceNode, qint64 newLength) const
{
Q_ASSERT(m_innerFs);
if (mapperName().isEmpty())
return false;
qint64 payloadLength = newLength - payloadOffset();
if ( newLength - length() * m_logicalSectorSize > 0 )
2016-04-29 17:55:55 +01:00
{
ExternalCommand cryptResizeCmd(report, QStringLiteral("cryptsetup"), { QStringLiteral("resize"), mapperName() });
report.line() << xi18nc("@info:progress", "Resizing LUKS crypt on partition <filename>%1</filename>.", deviceNode);
if (cryptResizeCmd.run(-1) && cryptResizeCmd.exitCode() == 0)
2016-04-29 17:55:55 +01:00
{
return m_innerFs->resize(report, mapperName(), payloadLength);
2016-04-29 17:55:55 +01:00
}
}
else if (m_innerFs->resize(report, mapperName(), payloadLength))
{
2016-07-29 15:46:00 +01:00
ExternalCommand cryptResizeCmd(report, QStringLiteral("cryptsetup"),
{ QStringLiteral("--size"), QString::number(payloadLength / /*m_logicalSectorSize*/ 512), // LUKS assume 512 bytes sector
QStringLiteral("resize"), mapperName() });
report.line() << xi18nc("@info:progress", "Resizing LUKS crypt on partition <filename>%1</filename>.", deviceNode);
if (cryptResizeCmd.run(-1) && cryptResizeCmd.exitCode() == 0)
2016-04-29 17:55:55 +01:00
{
return true;
}
}
report.line() << xi18nc("@info:progress", "Resizing encrypted file system on partition <filename>%1</filename> failed.", deviceNode);
2016-04-29 17:55:55 +01:00
return false;
}
2015-07-13 15:16:36 +01:00
QString luks::readUUID(const QString& deviceNode) const
{
if (m_isCryptOpen && m_innerFs)
return m_innerFs->readUUID(mapperName());
2016-05-05 13:15:39 +01:00
return readOuterUUID(deviceNode);
}
QString luks::readOuterUUID(const QString &deviceNode) const
{
ExternalCommand cmd(QStringLiteral("cryptsetup"),
{ QStringLiteral("luksUUID"), deviceNode });
2015-07-13 15:16:36 +01:00
if (cmd.run()) {
2016-05-05 12:46:27 +01:00
return cmd.output().trimmed();
2015-07-13 15:16:36 +01:00
}
return QStringLiteral("---");
}
bool luks::updateUUID(Report& report, const QString& deviceNode) const
{
const QString uuid = QUuid::createUuid().toString().remove(QRegularExpression(QStringLiteral("\\{|\\}")));
2015-07-13 15:16:36 +01:00
ExternalCommand cmd(report,
QStringLiteral("cryptsetup"),
{ QStringLiteral("luksUUID"),
deviceNode,
QStringLiteral("--uuid"),
uuid });
2015-07-13 15:16:36 +01:00
return cmd.run(-1) && cmd.exitCode() == 0;
}
void luks::getMapperName(const QString& deviceNode)
2015-07-13 15:16:36 +01:00
{
ExternalCommand cmd(QStringLiteral("lsblk"),
{ QStringLiteral("--list"),
QStringLiteral("--noheadings"),
QStringLiteral("--output"),
QStringLiteral("name"),
deviceNode });
if (cmd.run(-1) && cmd.exitCode() == 0) {
QStringList output=cmd.output().split(QStringLiteral("\n"));
output.removeFirst();
if (!output.first().isEmpty())
m_MapperName = QStringLiteral("/dev/mapper/") + output.first();
2015-07-13 15:16:36 +01:00
}
else
m_MapperName = QString();
2015-07-13 15:16:36 +01:00
}
void luks::getCipherName(const QString& deviceNode)
2015-07-13 15:16:36 +01:00
{
ExternalCommand cmd(QStringLiteral("cryptsetup"),
{ QStringLiteral("luksDump"), deviceNode });
if (cmd.run(-1) && cmd.exitCode() == 0) {
QRegularExpression re(QStringLiteral("Cipher name:\\s+(\\w+)"));
QRegularExpressionMatch reCipherName = re.match(cmd.output());
if (reCipherName.hasMatch())
m_CipherName = reCipherName.captured(1);
2015-07-13 15:16:36 +01:00
}
else
m_CipherName = QStringLiteral("---");
2015-07-13 15:16:36 +01:00
}
void luks::getCipherMode(const QString& deviceNode)
2015-07-13 15:16:36 +01:00
{
ExternalCommand cmd(QStringLiteral("cryptsetup"),
{ QStringLiteral("luksDump"), deviceNode });
if (cmd.run(-1) && cmd.exitCode() == 0) {
QRegularExpression re(QStringLiteral("Cipher mode:\\s+(\\w+)"));
QRegularExpressionMatch reCipherMode = re.match(cmd.output());
if (reCipherMode.hasMatch())
m_CipherMode = reCipherMode.captured(1);
2015-07-13 15:16:36 +01:00
}
else
m_CipherMode = QStringLiteral("---");
2015-07-13 15:16:36 +01:00
}
void luks::getHashName(const QString& deviceNode)
2015-07-13 15:16:36 +01:00
{
ExternalCommand cmd(QStringLiteral("cryptsetup"),
{ QStringLiteral("luksDump"), deviceNode });
if (cmd.run(-1) && cmd.exitCode() == 0) {
QRegularExpression re(QStringLiteral("Hash spec:\\s+(\\w+)"));
QRegularExpressionMatch reHash = re.match(cmd.output());
if (reHash.hasMatch())
m_HashName = reHash.captured(1);
2015-07-13 15:16:36 +01:00
}
m_HashName = QStringLiteral("---");
2015-07-13 15:16:36 +01:00
}
void luks::getKeySize(const QString& deviceNode)
2015-07-13 15:16:36 +01:00
{
ExternalCommand cmd(QStringLiteral("cryptsetup"),
{ QStringLiteral("luksDump"), deviceNode });
if (cmd.run(-1) && cmd.exitCode() == 0) {
QRegularExpression re(QStringLiteral("MK bits:\\s+(\\d+)"));
QRegularExpressionMatch reKeySize = re.match(cmd.output());
if (reKeySize.hasMatch())
m_KeySize = reKeySize.captured(1).toLongLong();
2015-07-13 15:16:36 +01:00
}
else
m_KeySize = -1;
2015-07-13 15:16:36 +01:00
}
/*
* @return size of payload offset in bytes.
*/
void luks::getPayloadOffset(const QString& deviceNode)
2015-07-13 15:16:36 +01:00
{
2016-08-06 11:41:33 +01:00
ExternalCommand cmd(QStringLiteral("cryptsetup"),
{ QStringLiteral("luksDump"), deviceNode });
if (cmd.run(-1) && cmd.exitCode() == 0) {
QRegularExpression re(QStringLiteral("Payload offset:\\s+(\\d+)"));
QRegularExpressionMatch rePayloadOffset = re.match(cmd.output());
if (rePayloadOffset.hasMatch())
m_KeySize = rePayloadOffset.captured(1).toLongLong() * 512; // assuming LUKS sector size is 512
2016-08-06 11:41:33 +01:00
}
else
m_KeySize = -1;
2015-07-13 15:16:36 +01:00
}
bool luks::canEncryptType(FileSystem::Type type)
{
switch (type)
{
case Btrfs:
case F2fs:
case Ext2:
case Ext3:
case Ext4:
case Jfs:
case LinuxSwap:
case Lvm2_PV:
case Nilfs2:
case ReiserFS:
case Reiser4:
case Xfs:
case Zfs:
return true;
default:
return false;
}
}
}