machine_kexec_file.c 9.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389
  1. // SPDX-License-Identifier: GPL-2.0
  2. /*
  3. * s390 code for kexec_file_load system call
  4. *
  5. * Copyright IBM Corp. 2018
  6. *
  7. * Author(s): Philipp Rudo <prudo@linux.vnet.ibm.com>
  8. */
  9. #define pr_fmt(fmt) "kexec: " fmt
  10. #include <linux/elf.h>
  11. #include <linux/errno.h>
  12. #include <linux/kexec.h>
  13. #include <linux/module_signature.h>
  14. #include <linux/verification.h>
  15. #include <linux/vmalloc.h>
  16. #include <asm/boot_data.h>
  17. #include <asm/ipl.h>
  18. #include <asm/setup.h>
  19. const struct kexec_file_ops * const kexec_file_loaders[] = {
  20. &s390_kexec_elf_ops,
  21. &s390_kexec_image_ops,
  22. NULL,
  23. };
  24. #ifdef CONFIG_KEXEC_SIG
  25. int s390_verify_sig(const char *kernel, unsigned long kernel_len)
  26. {
  27. const unsigned long marker_len = sizeof(MODULE_SIG_STRING) - 1;
  28. struct module_signature *ms;
  29. unsigned long sig_len;
  30. int ret;
  31. /* Skip signature verification when not secure IPLed. */
  32. if (!ipl_secure_flag)
  33. return 0;
  34. if (marker_len > kernel_len)
  35. return -EKEYREJECTED;
  36. if (memcmp(kernel + kernel_len - marker_len, MODULE_SIG_STRING,
  37. marker_len))
  38. return -EKEYREJECTED;
  39. kernel_len -= marker_len;
  40. ms = (void *)kernel + kernel_len - sizeof(*ms);
  41. kernel_len -= sizeof(*ms);
  42. sig_len = be32_to_cpu(ms->sig_len);
  43. if (sig_len >= kernel_len)
  44. return -EKEYREJECTED;
  45. kernel_len -= sig_len;
  46. if (ms->id_type != PKEY_ID_PKCS7)
  47. return -EKEYREJECTED;
  48. if (ms->algo != 0 ||
  49. ms->hash != 0 ||
  50. ms->signer_len != 0 ||
  51. ms->key_id_len != 0 ||
  52. ms->__pad[0] != 0 ||
  53. ms->__pad[1] != 0 ||
  54. ms->__pad[2] != 0) {
  55. return -EBADMSG;
  56. }
  57. ret = verify_pkcs7_signature(kernel, kernel_len,
  58. kernel + kernel_len, sig_len,
  59. VERIFY_USE_SECONDARY_KEYRING,
  60. VERIFYING_MODULE_SIGNATURE,
  61. NULL, NULL);
  62. if (ret == -ENOKEY && IS_ENABLED(CONFIG_INTEGRITY_PLATFORM_KEYRING))
  63. ret = verify_pkcs7_signature(kernel, kernel_len,
  64. kernel + kernel_len, sig_len,
  65. VERIFY_USE_PLATFORM_KEYRING,
  66. VERIFYING_MODULE_SIGNATURE,
  67. NULL, NULL);
  68. return ret;
  69. }
  70. #endif /* CONFIG_KEXEC_SIG */
  71. static int kexec_file_update_purgatory(struct kimage *image,
  72. struct s390_load_data *data)
  73. {
  74. u64 entry, type;
  75. int ret;
  76. if (image->type == KEXEC_TYPE_CRASH) {
  77. entry = STARTUP_KDUMP_OFFSET;
  78. type = KEXEC_TYPE_CRASH;
  79. } else {
  80. entry = STARTUP_NORMAL_OFFSET;
  81. type = KEXEC_TYPE_DEFAULT;
  82. }
  83. ret = kexec_purgatory_get_set_symbol(image, "kernel_entry", &entry,
  84. sizeof(entry), false);
  85. if (ret)
  86. return ret;
  87. ret = kexec_purgatory_get_set_symbol(image, "kernel_type", &type,
  88. sizeof(type), false);
  89. if (ret)
  90. return ret;
  91. #ifdef CONFIG_CRASH_DUMP
  92. if (image->type == KEXEC_TYPE_CRASH) {
  93. u64 crash_size;
  94. ret = kexec_purgatory_get_set_symbol(image, "crash_start",
  95. &crashk_res.start,
  96. sizeof(crashk_res.start),
  97. false);
  98. if (ret)
  99. return ret;
  100. crash_size = crashk_res.end - crashk_res.start + 1;
  101. ret = kexec_purgatory_get_set_symbol(image, "crash_size",
  102. &crash_size,
  103. sizeof(crash_size),
  104. false);
  105. }
  106. #endif
  107. return ret;
  108. }
  109. static int kexec_file_add_purgatory(struct kimage *image,
  110. struct s390_load_data *data)
  111. {
  112. struct kexec_buf buf;
  113. int ret;
  114. buf.image = image;
  115. data->memsz = ALIGN(data->memsz, PAGE_SIZE);
  116. buf.mem = data->memsz;
  117. #ifdef CONFIG_CRASH_DUMP
  118. if (image->type == KEXEC_TYPE_CRASH)
  119. buf.mem += crashk_res.start;
  120. #endif
  121. ret = kexec_load_purgatory(image, &buf);
  122. if (ret)
  123. return ret;
  124. data->memsz += buf.memsz;
  125. return kexec_file_update_purgatory(image, data);
  126. }
  127. static int kexec_file_add_initrd(struct kimage *image,
  128. struct s390_load_data *data)
  129. {
  130. struct kexec_buf buf;
  131. int ret;
  132. buf.image = image;
  133. buf.buffer = image->initrd_buf;
  134. buf.bufsz = image->initrd_buf_len;
  135. data->memsz = ALIGN(data->memsz, PAGE_SIZE);
  136. buf.mem = data->memsz;
  137. #ifdef CONFIG_CRASH_DUMP
  138. if (image->type == KEXEC_TYPE_CRASH)
  139. buf.mem += crashk_res.start;
  140. #endif
  141. buf.memsz = buf.bufsz;
  142. data->parm->initrd_start = data->memsz;
  143. data->parm->initrd_size = buf.memsz;
  144. data->memsz += buf.memsz;
  145. ret = kexec_add_buffer(&buf);
  146. if (ret)
  147. return ret;
  148. return ipl_report_add_component(data->report, &buf, 0, 0);
  149. }
  150. static int kexec_file_add_ipl_report(struct kimage *image,
  151. struct s390_load_data *data)
  152. {
  153. __u32 *lc_ipl_parmblock_ptr;
  154. unsigned int len, ncerts;
  155. struct kexec_buf buf;
  156. unsigned long addr;
  157. void *ptr, *end;
  158. int ret;
  159. buf.image = image;
  160. data->memsz = ALIGN(data->memsz, PAGE_SIZE);
  161. buf.mem = data->memsz;
  162. ptr = __va(ipl_cert_list_addr);
  163. end = ptr + ipl_cert_list_size;
  164. ncerts = 0;
  165. while (ptr < end) {
  166. ncerts++;
  167. len = *(unsigned int *)ptr;
  168. ptr += sizeof(len);
  169. ptr += len;
  170. }
  171. addr = data->memsz + data->report->size;
  172. addr += ncerts * sizeof(struct ipl_rb_certificate_entry);
  173. ptr = __va(ipl_cert_list_addr);
  174. while (ptr < end) {
  175. len = *(unsigned int *)ptr;
  176. ptr += sizeof(len);
  177. ipl_report_add_certificate(data->report, ptr, addr, len);
  178. addr += len;
  179. ptr += len;
  180. }
  181. ret = -ENOMEM;
  182. buf.buffer = ipl_report_finish(data->report);
  183. if (!buf.buffer)
  184. goto out;
  185. buf.bufsz = data->report->size;
  186. buf.memsz = buf.bufsz;
  187. image->arch.ipl_buf = buf.buffer;
  188. data->memsz += buf.memsz;
  189. lc_ipl_parmblock_ptr =
  190. data->kernel_buf + offsetof(struct lowcore, ipl_parmblock_ptr);
  191. *lc_ipl_parmblock_ptr = (__u32)buf.mem;
  192. #ifdef CONFIG_CRASH_DUMP
  193. if (image->type == KEXEC_TYPE_CRASH)
  194. buf.mem += crashk_res.start;
  195. #endif
  196. ret = kexec_add_buffer(&buf);
  197. out:
  198. return ret;
  199. }
  200. void *kexec_file_add_components(struct kimage *image,
  201. int (*add_kernel)(struct kimage *image,
  202. struct s390_load_data *data))
  203. {
  204. unsigned long max_command_line_size = LEGACY_COMMAND_LINE_SIZE;
  205. struct s390_load_data data = {0};
  206. unsigned long minsize;
  207. int ret;
  208. data.report = ipl_report_init(&ipl_block);
  209. if (IS_ERR(data.report))
  210. return data.report;
  211. ret = add_kernel(image, &data);
  212. if (ret)
  213. goto out;
  214. ret = -EINVAL;
  215. minsize = PARMAREA + offsetof(struct parmarea, command_line);
  216. if (image->kernel_buf_len < minsize)
  217. goto out;
  218. if (data.parm->max_command_line_size)
  219. max_command_line_size = data.parm->max_command_line_size;
  220. if (minsize + max_command_line_size < minsize)
  221. goto out;
  222. if (image->kernel_buf_len < minsize + max_command_line_size)
  223. goto out;
  224. if (image->cmdline_buf_len >= max_command_line_size)
  225. goto out;
  226. memcpy(data.parm->command_line, image->cmdline_buf,
  227. image->cmdline_buf_len);
  228. #ifdef CONFIG_CRASH_DUMP
  229. if (image->type == KEXEC_TYPE_CRASH) {
  230. data.parm->oldmem_base = crashk_res.start;
  231. data.parm->oldmem_size = crashk_res.end - crashk_res.start + 1;
  232. }
  233. #endif
  234. if (image->initrd_buf) {
  235. ret = kexec_file_add_initrd(image, &data);
  236. if (ret)
  237. goto out;
  238. }
  239. ret = kexec_file_add_purgatory(image, &data);
  240. if (ret)
  241. goto out;
  242. if (data.kernel_mem == 0) {
  243. unsigned long restart_psw = 0x0008000080000000UL;
  244. restart_psw += image->start;
  245. memcpy(data.kernel_buf, &restart_psw, sizeof(restart_psw));
  246. image->start = 0;
  247. }
  248. ret = kexec_file_add_ipl_report(image, &data);
  249. out:
  250. ipl_report_free(data.report);
  251. return ERR_PTR(ret);
  252. }
  253. int arch_kexec_apply_relocations_add(struct purgatory_info *pi,
  254. Elf_Shdr *section,
  255. const Elf_Shdr *relsec,
  256. const Elf_Shdr *symtab)
  257. {
  258. const char *strtab, *name, *shstrtab;
  259. const Elf_Shdr *sechdrs;
  260. Elf_Rela *relas;
  261. int i, r_type;
  262. int ret;
  263. /* String & section header string table */
  264. sechdrs = (void *)pi->ehdr + pi->ehdr->e_shoff;
  265. strtab = (char *)pi->ehdr + sechdrs[symtab->sh_link].sh_offset;
  266. shstrtab = (char *)pi->ehdr + sechdrs[pi->ehdr->e_shstrndx].sh_offset;
  267. relas = (void *)pi->ehdr + relsec->sh_offset;
  268. for (i = 0; i < relsec->sh_size / sizeof(*relas); i++) {
  269. const Elf_Sym *sym; /* symbol to relocate */
  270. unsigned long addr; /* final location after relocation */
  271. unsigned long val; /* relocated symbol value */
  272. void *loc; /* tmp location to modify */
  273. sym = (void *)pi->ehdr + symtab->sh_offset;
  274. sym += ELF64_R_SYM(relas[i].r_info);
  275. if (sym->st_name)
  276. name = strtab + sym->st_name;
  277. else
  278. name = shstrtab + sechdrs[sym->st_shndx].sh_name;
  279. if (sym->st_shndx == SHN_UNDEF) {
  280. pr_err("Undefined symbol: %s\n", name);
  281. return -ENOEXEC;
  282. }
  283. if (sym->st_shndx == SHN_COMMON) {
  284. pr_err("symbol '%s' in common section\n", name);
  285. return -ENOEXEC;
  286. }
  287. if (sym->st_shndx >= pi->ehdr->e_shnum &&
  288. sym->st_shndx != SHN_ABS) {
  289. pr_err("Invalid section %d for symbol %s\n",
  290. sym->st_shndx, name);
  291. return -ENOEXEC;
  292. }
  293. loc = pi->purgatory_buf;
  294. loc += section->sh_offset;
  295. loc += relas[i].r_offset;
  296. val = sym->st_value;
  297. if (sym->st_shndx != SHN_ABS)
  298. val += pi->sechdrs[sym->st_shndx].sh_addr;
  299. val += relas[i].r_addend;
  300. addr = section->sh_addr + relas[i].r_offset;
  301. r_type = ELF64_R_TYPE(relas[i].r_info);
  302. if (r_type == R_390_PLT32DBL)
  303. r_type = R_390_PC32DBL;
  304. ret = arch_kexec_do_relocs(r_type, loc, val, addr);
  305. if (ret) {
  306. pr_err("Unknown rela relocation: %d\n", r_type);
  307. return -ENOEXEC;
  308. }
  309. }
  310. return 0;
  311. }
  312. int arch_kimage_file_post_load_cleanup(struct kimage *image)
  313. {
  314. vfree(image->arch.ipl_buf);
  315. image->arch.ipl_buf = NULL;
  316. return kexec_image_post_load_cleanup_default(image);
  317. }