123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469 |
- // SPDX-License-Identifier: GPL-2.0-only
- /*
- * POWER LPAR Platform KeyStore(PLPKS)
- * Copyright (C) 2022 IBM Corporation
- * Author: Nayna Jain <[email protected]>
- *
- * Provides access to variables stored in Power LPAR Platform KeyStore(PLPKS).
- */
- #define pr_fmt(fmt) "plpks: " fmt
- #include <linux/delay.h>
- #include <linux/errno.h>
- #include <linux/io.h>
- #include <linux/printk.h>
- #include <linux/slab.h>
- #include <linux/string.h>
- #include <linux/types.h>
- #include <asm/hvcall.h>
- #include <asm/machdep.h>
- #include "plpks.h"
- #define PKS_FW_OWNER 0x1
- #define PKS_BOOTLOADER_OWNER 0x2
- #define PKS_OS_OWNER 0x3
- #define LABEL_VERSION 0
- #define MAX_LABEL_ATTR_SIZE 16
- #define MAX_NAME_SIZE 239
- #define MAX_DATA_SIZE 4000
- #define PKS_FLUSH_MAX_TIMEOUT 5000 //msec
- #define PKS_FLUSH_SLEEP 10 //msec
- #define PKS_FLUSH_SLEEP_RANGE 400
- static u8 *ospassword;
- static u16 ospasswordlength;
- // Retrieved with H_PKS_GET_CONFIG
- static u16 maxpwsize;
- static u16 maxobjsize;
- struct plpks_auth {
- u8 version;
- u8 consumer;
- __be64 rsvd0;
- __be32 rsvd1;
- __be16 passwordlength;
- u8 password[];
- } __packed __aligned(16);
- struct label_attr {
- u8 prefix[8];
- u8 version;
- u8 os;
- u8 length;
- u8 reserved[5];
- };
- struct label {
- struct label_attr attr;
- u8 name[MAX_NAME_SIZE];
- size_t size;
- };
- static int pseries_status_to_err(int rc)
- {
- int err;
- switch (rc) {
- case H_SUCCESS:
- err = 0;
- break;
- case H_FUNCTION:
- err = -ENXIO;
- break;
- case H_PARAMETER:
- case H_P2:
- case H_P3:
- case H_P4:
- case H_P5:
- case H_P6:
- err = -EINVAL;
- break;
- case H_NOT_FOUND:
- err = -ENOENT;
- break;
- case H_BUSY:
- err = -EBUSY;
- break;
- case H_AUTHORITY:
- err = -EPERM;
- break;
- case H_NO_MEM:
- err = -ENOMEM;
- break;
- case H_RESOURCE:
- err = -EEXIST;
- break;
- case H_TOO_BIG:
- err = -EFBIG;
- break;
- case H_STATE:
- err = -EIO;
- break;
- case H_R_STATE:
- err = -EIO;
- break;
- case H_IN_USE:
- err = -EEXIST;
- break;
- case H_ABORTED:
- err = -EIO;
- break;
- default:
- err = -EINVAL;
- }
- return err;
- }
- static int plpks_gen_password(void)
- {
- unsigned long retbuf[PLPAR_HCALL_BUFSIZE] = { 0 };
- u8 *password, consumer = PKS_OS_OWNER;
- int rc;
- password = kzalloc(maxpwsize, GFP_KERNEL);
- if (!password)
- return -ENOMEM;
- rc = plpar_hcall(H_PKS_GEN_PASSWORD, retbuf, consumer, 0,
- virt_to_phys(password), maxpwsize);
- if (!rc) {
- ospasswordlength = maxpwsize;
- ospassword = kzalloc(maxpwsize, GFP_KERNEL);
- if (!ospassword) {
- kfree(password);
- return -ENOMEM;
- }
- memcpy(ospassword, password, ospasswordlength);
- } else {
- if (rc == H_IN_USE) {
- pr_warn("Password is already set for POWER LPAR Platform KeyStore\n");
- rc = 0;
- } else {
- goto out;
- }
- }
- out:
- kfree(password);
- return pseries_status_to_err(rc);
- }
- static struct plpks_auth *construct_auth(u8 consumer)
- {
- struct plpks_auth *auth;
- if (consumer > PKS_OS_OWNER)
- return ERR_PTR(-EINVAL);
- auth = kmalloc(struct_size(auth, password, maxpwsize), GFP_KERNEL);
- if (!auth)
- return ERR_PTR(-ENOMEM);
- auth->version = 1;
- auth->consumer = consumer;
- auth->rsvd0 = 0;
- auth->rsvd1 = 0;
- if (consumer == PKS_FW_OWNER || consumer == PKS_BOOTLOADER_OWNER) {
- auth->passwordlength = 0;
- return auth;
- }
- memcpy(auth->password, ospassword, ospasswordlength);
- auth->passwordlength = cpu_to_be16(ospasswordlength);
- return auth;
- }
- /**
- * Label is combination of label attributes + name.
- * Label attributes are used internally by kernel and not exposed to the user.
- */
- static struct label *construct_label(char *component, u8 varos, u8 *name,
- u16 namelen)
- {
- struct label *label;
- size_t slen;
- if (!name || namelen > MAX_NAME_SIZE)
- return ERR_PTR(-EINVAL);
- slen = strlen(component);
- if (component && slen > sizeof(label->attr.prefix))
- return ERR_PTR(-EINVAL);
- label = kzalloc(sizeof(*label), GFP_KERNEL);
- if (!label)
- return ERR_PTR(-ENOMEM);
- if (component)
- memcpy(&label->attr.prefix, component, slen);
- label->attr.version = LABEL_VERSION;
- label->attr.os = varos;
- label->attr.length = MAX_LABEL_ATTR_SIZE;
- memcpy(&label->name, name, namelen);
- label->size = sizeof(struct label_attr) + namelen;
- return label;
- }
- static int _plpks_get_config(void)
- {
- unsigned long retbuf[PLPAR_HCALL_BUFSIZE] = { 0 };
- struct {
- u8 version;
- u8 flags;
- __be32 rsvd0;
- __be16 maxpwsize;
- __be16 maxobjlabelsize;
- __be16 maxobjsize;
- __be32 totalsize;
- __be32 usedspace;
- __be32 supportedpolicies;
- __be64 rsvd1;
- } __packed config;
- size_t size;
- int rc;
- size = sizeof(config);
- rc = plpar_hcall(H_PKS_GET_CONFIG, retbuf, virt_to_phys(&config), size);
- if (rc != H_SUCCESS)
- return pseries_status_to_err(rc);
- maxpwsize = be16_to_cpu(config.maxpwsize);
- maxobjsize = be16_to_cpu(config.maxobjsize);
- return 0;
- }
- static int plpks_confirm_object_flushed(struct label *label,
- struct plpks_auth *auth)
- {
- unsigned long retbuf[PLPAR_HCALL_BUFSIZE] = { 0 };
- u64 timeout = 0;
- u8 status;
- int rc;
- do {
- rc = plpar_hcall(H_PKS_CONFIRM_OBJECT_FLUSHED, retbuf,
- virt_to_phys(auth), virt_to_phys(label),
- label->size);
- status = retbuf[0];
- if (rc) {
- if (rc == H_NOT_FOUND && status == 1)
- rc = 0;
- break;
- }
- if (!rc && status == 1)
- break;
- usleep_range(PKS_FLUSH_SLEEP,
- PKS_FLUSH_SLEEP + PKS_FLUSH_SLEEP_RANGE);
- timeout = timeout + PKS_FLUSH_SLEEP;
- } while (timeout < PKS_FLUSH_MAX_TIMEOUT);
- rc = pseries_status_to_err(rc);
- return rc;
- }
- int plpks_write_var(struct plpks_var var)
- {
- unsigned long retbuf[PLPAR_HCALL_BUFSIZE] = { 0 };
- struct plpks_auth *auth;
- struct label *label;
- int rc;
- if (!var.component || !var.data || var.datalen <= 0 ||
- var.namelen > MAX_NAME_SIZE || var.datalen > MAX_DATA_SIZE)
- return -EINVAL;
- if (var.policy & SIGNEDUPDATE)
- return -EINVAL;
- auth = construct_auth(PKS_OS_OWNER);
- if (IS_ERR(auth))
- return PTR_ERR(auth);
- label = construct_label(var.component, var.os, var.name, var.namelen);
- if (IS_ERR(label)) {
- rc = PTR_ERR(label);
- goto out;
- }
- rc = plpar_hcall(H_PKS_WRITE_OBJECT, retbuf, virt_to_phys(auth),
- virt_to_phys(label), label->size, var.policy,
- virt_to_phys(var.data), var.datalen);
- if (!rc)
- rc = plpks_confirm_object_flushed(label, auth);
- if (rc)
- pr_err("Failed to write variable %s for component %s with error %d\n",
- var.name, var.component, rc);
- rc = pseries_status_to_err(rc);
- kfree(label);
- out:
- kfree(auth);
- return rc;
- }
- int plpks_remove_var(char *component, u8 varos, struct plpks_var_name vname)
- {
- unsigned long retbuf[PLPAR_HCALL_BUFSIZE] = { 0 };
- struct plpks_auth *auth;
- struct label *label;
- int rc;
- if (!component || vname.namelen > MAX_NAME_SIZE)
- return -EINVAL;
- auth = construct_auth(PKS_OS_OWNER);
- if (IS_ERR(auth))
- return PTR_ERR(auth);
- label = construct_label(component, varos, vname.name, vname.namelen);
- if (IS_ERR(label)) {
- rc = PTR_ERR(label);
- goto out;
- }
- rc = plpar_hcall(H_PKS_REMOVE_OBJECT, retbuf, virt_to_phys(auth),
- virt_to_phys(label), label->size);
- if (!rc)
- rc = plpks_confirm_object_flushed(label, auth);
- if (rc)
- pr_err("Failed to remove variable %s for component %s with error %d\n",
- vname.name, component, rc);
- rc = pseries_status_to_err(rc);
- kfree(label);
- out:
- kfree(auth);
- return rc;
- }
- static int plpks_read_var(u8 consumer, struct plpks_var *var)
- {
- unsigned long retbuf[PLPAR_HCALL_BUFSIZE] = { 0 };
- struct plpks_auth *auth;
- struct label *label = NULL;
- u8 *output;
- int rc;
- if (var->namelen > MAX_NAME_SIZE)
- return -EINVAL;
- auth = construct_auth(consumer);
- if (IS_ERR(auth))
- return PTR_ERR(auth);
- if (consumer == PKS_OS_OWNER) {
- label = construct_label(var->component, var->os, var->name,
- var->namelen);
- if (IS_ERR(label)) {
- rc = PTR_ERR(label);
- goto out_free_auth;
- }
- }
- output = kzalloc(maxobjsize, GFP_KERNEL);
- if (!output) {
- rc = -ENOMEM;
- goto out_free_label;
- }
- if (consumer == PKS_OS_OWNER)
- rc = plpar_hcall(H_PKS_READ_OBJECT, retbuf, virt_to_phys(auth),
- virt_to_phys(label), label->size, virt_to_phys(output),
- maxobjsize);
- else
- rc = plpar_hcall(H_PKS_READ_OBJECT, retbuf, virt_to_phys(auth),
- virt_to_phys(var->name), var->namelen, virt_to_phys(output),
- maxobjsize);
- if (rc != H_SUCCESS) {
- pr_err("Failed to read variable %s for component %s with error %d\n",
- var->name, var->component, rc);
- rc = pseries_status_to_err(rc);
- goto out_free_output;
- }
- if (var->datalen == 0 || var->datalen > retbuf[0])
- var->datalen = retbuf[0];
- var->data = kzalloc(var->datalen, GFP_KERNEL);
- if (!var->data) {
- rc = -ENOMEM;
- goto out_free_output;
- }
- var->policy = retbuf[1];
- memcpy(var->data, output, var->datalen);
- rc = 0;
- out_free_output:
- kfree(output);
- out_free_label:
- kfree(label);
- out_free_auth:
- kfree(auth);
- return rc;
- }
- int plpks_read_os_var(struct plpks_var *var)
- {
- return plpks_read_var(PKS_OS_OWNER, var);
- }
- int plpks_read_fw_var(struct plpks_var *var)
- {
- return plpks_read_var(PKS_FW_OWNER, var);
- }
- int plpks_read_bootloader_var(struct plpks_var *var)
- {
- return plpks_read_var(PKS_BOOTLOADER_OWNER, var);
- }
- static __init int pseries_plpks_init(void)
- {
- int rc;
- rc = _plpks_get_config();
- if (rc) {
- pr_err("POWER LPAR Platform KeyStore is not supported or enabled\n");
- return rc;
- }
- rc = plpks_gen_password();
- if (rc)
- pr_err("Failed setting POWER LPAR Platform KeyStore Password\n");
- else
- pr_info("POWER LPAR Platform KeyStore initialized successfully\n");
- return rc;
- }
- machine_arch_initcall(pseries, pseries_plpks_init);
|