machine_kexec_file.c 8.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379
  1. // SPDX-License-Identifier: GPL-2.0
  2. /*
  3. * s390 code for kexec_file_load system call
  4. *
  5. * Copyright IBM Corp. 2018
  6. *
  7. * Author(s): Philipp Rudo <[email protected]>
  8. */
  9. #define pr_fmt(fmt) "kexec: " fmt
  10. #include <linux/elf.h>
  11. #include <linux/errno.h>
  12. #include <linux/kexec.h>
  13. #include <linux/module_signature.h>
  14. #include <linux/verification.h>
  15. #include <linux/vmalloc.h>
  16. #include <asm/boot_data.h>
  17. #include <asm/ipl.h>
  18. #include <asm/setup.h>
  19. const struct kexec_file_ops * const kexec_file_loaders[] = {
  20. &s390_kexec_elf_ops,
  21. &s390_kexec_image_ops,
  22. NULL,
  23. };
  24. #ifdef CONFIG_KEXEC_SIG
  25. int s390_verify_sig(const char *kernel, unsigned long kernel_len)
  26. {
  27. const unsigned long marker_len = sizeof(MODULE_SIG_STRING) - 1;
  28. struct module_signature *ms;
  29. unsigned long sig_len;
  30. int ret;
  31. /* Skip signature verification when not secure IPLed. */
  32. if (!ipl_secure_flag)
  33. return 0;
  34. if (marker_len > kernel_len)
  35. return -EKEYREJECTED;
  36. if (memcmp(kernel + kernel_len - marker_len, MODULE_SIG_STRING,
  37. marker_len))
  38. return -EKEYREJECTED;
  39. kernel_len -= marker_len;
  40. ms = (void *)kernel + kernel_len - sizeof(*ms);
  41. kernel_len -= sizeof(*ms);
  42. sig_len = be32_to_cpu(ms->sig_len);
  43. if (sig_len >= kernel_len)
  44. return -EKEYREJECTED;
  45. kernel_len -= sig_len;
  46. if (ms->id_type != PKEY_ID_PKCS7)
  47. return -EKEYREJECTED;
  48. if (ms->algo != 0 ||
  49. ms->hash != 0 ||
  50. ms->signer_len != 0 ||
  51. ms->key_id_len != 0 ||
  52. ms->__pad[0] != 0 ||
  53. ms->__pad[1] != 0 ||
  54. ms->__pad[2] != 0) {
  55. return -EBADMSG;
  56. }
  57. ret = verify_pkcs7_signature(kernel, kernel_len,
  58. kernel + kernel_len, sig_len,
  59. VERIFY_USE_SECONDARY_KEYRING,
  60. VERIFYING_MODULE_SIGNATURE,
  61. NULL, NULL);
  62. if (ret == -ENOKEY && IS_ENABLED(CONFIG_INTEGRITY_PLATFORM_KEYRING))
  63. ret = verify_pkcs7_signature(kernel, kernel_len,
  64. kernel + kernel_len, sig_len,
  65. VERIFY_USE_PLATFORM_KEYRING,
  66. VERIFYING_MODULE_SIGNATURE,
  67. NULL, NULL);
  68. return ret;
  69. }
  70. #endif /* CONFIG_KEXEC_SIG */
  71. static int kexec_file_update_purgatory(struct kimage *image,
  72. struct s390_load_data *data)
  73. {
  74. u64 entry, type;
  75. int ret;
  76. if (image->type == KEXEC_TYPE_CRASH) {
  77. entry = STARTUP_KDUMP_OFFSET;
  78. type = KEXEC_TYPE_CRASH;
  79. } else {
  80. entry = STARTUP_NORMAL_OFFSET;
  81. type = KEXEC_TYPE_DEFAULT;
  82. }
  83. ret = kexec_purgatory_get_set_symbol(image, "kernel_entry", &entry,
  84. sizeof(entry), false);
  85. if (ret)
  86. return ret;
  87. ret = kexec_purgatory_get_set_symbol(image, "kernel_type", &type,
  88. sizeof(type), false);
  89. if (ret)
  90. return ret;
  91. if (image->type == KEXEC_TYPE_CRASH) {
  92. u64 crash_size;
  93. ret = kexec_purgatory_get_set_symbol(image, "crash_start",
  94. &crashk_res.start,
  95. sizeof(crashk_res.start),
  96. false);
  97. if (ret)
  98. return ret;
  99. crash_size = crashk_res.end - crashk_res.start + 1;
  100. ret = kexec_purgatory_get_set_symbol(image, "crash_size",
  101. &crash_size,
  102. sizeof(crash_size),
  103. false);
  104. }
  105. return ret;
  106. }
  107. static int kexec_file_add_purgatory(struct kimage *image,
  108. struct s390_load_data *data)
  109. {
  110. struct kexec_buf buf;
  111. int ret;
  112. buf.image = image;
  113. data->memsz = ALIGN(data->memsz, PAGE_SIZE);
  114. buf.mem = data->memsz;
  115. if (image->type == KEXEC_TYPE_CRASH)
  116. buf.mem += crashk_res.start;
  117. ret = kexec_load_purgatory(image, &buf);
  118. if (ret)
  119. return ret;
  120. data->memsz += buf.memsz;
  121. return kexec_file_update_purgatory(image, data);
  122. }
  123. static int kexec_file_add_initrd(struct kimage *image,
  124. struct s390_load_data *data)
  125. {
  126. struct kexec_buf buf;
  127. int ret;
  128. buf.image = image;
  129. buf.buffer = image->initrd_buf;
  130. buf.bufsz = image->initrd_buf_len;
  131. data->memsz = ALIGN(data->memsz, PAGE_SIZE);
  132. buf.mem = data->memsz;
  133. if (image->type == KEXEC_TYPE_CRASH)
  134. buf.mem += crashk_res.start;
  135. buf.memsz = buf.bufsz;
  136. data->parm->initrd_start = data->memsz;
  137. data->parm->initrd_size = buf.memsz;
  138. data->memsz += buf.memsz;
  139. ret = kexec_add_buffer(&buf);
  140. if (ret)
  141. return ret;
  142. return ipl_report_add_component(data->report, &buf, 0, 0);
  143. }
  144. static int kexec_file_add_ipl_report(struct kimage *image,
  145. struct s390_load_data *data)
  146. {
  147. __u32 *lc_ipl_parmblock_ptr;
  148. unsigned int len, ncerts;
  149. struct kexec_buf buf;
  150. unsigned long addr;
  151. void *ptr, *end;
  152. int ret;
  153. buf.image = image;
  154. data->memsz = ALIGN(data->memsz, PAGE_SIZE);
  155. buf.mem = data->memsz;
  156. ptr = (void *)ipl_cert_list_addr;
  157. end = ptr + ipl_cert_list_size;
  158. ncerts = 0;
  159. while (ptr < end) {
  160. ncerts++;
  161. len = *(unsigned int *)ptr;
  162. ptr += sizeof(len);
  163. ptr += len;
  164. }
  165. addr = data->memsz + data->report->size;
  166. addr += ncerts * sizeof(struct ipl_rb_certificate_entry);
  167. ptr = (void *)ipl_cert_list_addr;
  168. while (ptr < end) {
  169. len = *(unsigned int *)ptr;
  170. ptr += sizeof(len);
  171. ipl_report_add_certificate(data->report, ptr, addr, len);
  172. addr += len;
  173. ptr += len;
  174. }
  175. ret = -ENOMEM;
  176. buf.buffer = ipl_report_finish(data->report);
  177. if (!buf.buffer)
  178. goto out;
  179. buf.bufsz = data->report->size;
  180. buf.memsz = buf.bufsz;
  181. image->arch.ipl_buf = buf.buffer;
  182. data->memsz += buf.memsz;
  183. lc_ipl_parmblock_ptr =
  184. data->kernel_buf + offsetof(struct lowcore, ipl_parmblock_ptr);
  185. *lc_ipl_parmblock_ptr = (__u32)buf.mem;
  186. if (image->type == KEXEC_TYPE_CRASH)
  187. buf.mem += crashk_res.start;
  188. ret = kexec_add_buffer(&buf);
  189. out:
  190. return ret;
  191. }
  192. void *kexec_file_add_components(struct kimage *image,
  193. int (*add_kernel)(struct kimage *image,
  194. struct s390_load_data *data))
  195. {
  196. unsigned long max_command_line_size = LEGACY_COMMAND_LINE_SIZE;
  197. struct s390_load_data data = {0};
  198. unsigned long minsize;
  199. int ret;
  200. data.report = ipl_report_init(&ipl_block);
  201. if (IS_ERR(data.report))
  202. return data.report;
  203. ret = add_kernel(image, &data);
  204. if (ret)
  205. goto out;
  206. ret = -EINVAL;
  207. minsize = PARMAREA + offsetof(struct parmarea, command_line);
  208. if (image->kernel_buf_len < minsize)
  209. goto out;
  210. if (data.parm->max_command_line_size)
  211. max_command_line_size = data.parm->max_command_line_size;
  212. if (minsize + max_command_line_size < minsize)
  213. goto out;
  214. if (image->kernel_buf_len < minsize + max_command_line_size)
  215. goto out;
  216. if (image->cmdline_buf_len >= max_command_line_size)
  217. goto out;
  218. memcpy(data.parm->command_line, image->cmdline_buf,
  219. image->cmdline_buf_len);
  220. if (image->type == KEXEC_TYPE_CRASH) {
  221. data.parm->oldmem_base = crashk_res.start;
  222. data.parm->oldmem_size = crashk_res.end - crashk_res.start + 1;
  223. }
  224. if (image->initrd_buf) {
  225. ret = kexec_file_add_initrd(image, &data);
  226. if (ret)
  227. goto out;
  228. }
  229. ret = kexec_file_add_purgatory(image, &data);
  230. if (ret)
  231. goto out;
  232. if (data.kernel_mem == 0) {
  233. unsigned long restart_psw = 0x0008000080000000UL;
  234. restart_psw += image->start;
  235. memcpy(data.kernel_buf, &restart_psw, sizeof(restart_psw));
  236. image->start = 0;
  237. }
  238. ret = kexec_file_add_ipl_report(image, &data);
  239. out:
  240. ipl_report_free(data.report);
  241. return ERR_PTR(ret);
  242. }
  243. int arch_kexec_apply_relocations_add(struct purgatory_info *pi,
  244. Elf_Shdr *section,
  245. const Elf_Shdr *relsec,
  246. const Elf_Shdr *symtab)
  247. {
  248. const char *strtab, *name, *shstrtab;
  249. const Elf_Shdr *sechdrs;
  250. Elf_Rela *relas;
  251. int i, r_type;
  252. int ret;
  253. /* String & section header string table */
  254. sechdrs = (void *)pi->ehdr + pi->ehdr->e_shoff;
  255. strtab = (char *)pi->ehdr + sechdrs[symtab->sh_link].sh_offset;
  256. shstrtab = (char *)pi->ehdr + sechdrs[pi->ehdr->e_shstrndx].sh_offset;
  257. relas = (void *)pi->ehdr + relsec->sh_offset;
  258. for (i = 0; i < relsec->sh_size / sizeof(*relas); i++) {
  259. const Elf_Sym *sym; /* symbol to relocate */
  260. unsigned long addr; /* final location after relocation */
  261. unsigned long val; /* relocated symbol value */
  262. void *loc; /* tmp location to modify */
  263. sym = (void *)pi->ehdr + symtab->sh_offset;
  264. sym += ELF64_R_SYM(relas[i].r_info);
  265. if (sym->st_name)
  266. name = strtab + sym->st_name;
  267. else
  268. name = shstrtab + sechdrs[sym->st_shndx].sh_name;
  269. if (sym->st_shndx == SHN_UNDEF) {
  270. pr_err("Undefined symbol: %s\n", name);
  271. return -ENOEXEC;
  272. }
  273. if (sym->st_shndx == SHN_COMMON) {
  274. pr_err("symbol '%s' in common section\n", name);
  275. return -ENOEXEC;
  276. }
  277. if (sym->st_shndx >= pi->ehdr->e_shnum &&
  278. sym->st_shndx != SHN_ABS) {
  279. pr_err("Invalid section %d for symbol %s\n",
  280. sym->st_shndx, name);
  281. return -ENOEXEC;
  282. }
  283. loc = pi->purgatory_buf;
  284. loc += section->sh_offset;
  285. loc += relas[i].r_offset;
  286. val = sym->st_value;
  287. if (sym->st_shndx != SHN_ABS)
  288. val += pi->sechdrs[sym->st_shndx].sh_addr;
  289. val += relas[i].r_addend;
  290. addr = section->sh_addr + relas[i].r_offset;
  291. r_type = ELF64_R_TYPE(relas[i].r_info);
  292. if (r_type == R_390_PLT32DBL)
  293. r_type = R_390_PC32DBL;
  294. ret = arch_kexec_do_relocs(r_type, loc, val, addr);
  295. if (ret) {
  296. pr_err("Unknown rela relocation: %d\n", r_type);
  297. return -ENOEXEC;
  298. }
  299. }
  300. return 0;
  301. }
  302. int arch_kimage_file_post_load_cleanup(struct kimage *image)
  303. {
  304. vfree(image->arch.ipl_buf);
  305. image->arch.ipl_buf = NULL;
  306. return kexec_image_post_load_cleanup_default(image);
  307. }