| .. | .. |
|---|
| 8 | 8 | */ |
|---|
| 9 | 9 | |
|---|
| 10 | 10 | #include <linux/elf.h> |
|---|
| 11 | +#include <linux/errno.h> |
|---|
| 11 | 12 | #include <linux/kexec.h> |
|---|
| 13 | +#include <linux/module_signature.h> |
|---|
| 14 | +#include <linux/verification.h> |
|---|
| 15 | +#include <linux/vmalloc.h> |
|---|
| 16 | +#include <asm/boot_data.h> |
|---|
| 17 | +#include <asm/ipl.h> |
|---|
| 12 | 18 | #include <asm/setup.h> |
|---|
| 13 | 19 | |
|---|
| 14 | 20 | const struct kexec_file_ops * const kexec_file_loaders[] = { |
|---|
| .. | .. |
|---|
| 17 | 23 | NULL, |
|---|
| 18 | 24 | }; |
|---|
| 19 | 25 | |
|---|
| 20 | | -int *kexec_file_update_kernel(struct kimage *image, |
|---|
| 21 | | - struct s390_load_data *data) |
|---|
| 26 | +#ifdef CONFIG_KEXEC_SIG |
|---|
| 27 | +int s390_verify_sig(const char *kernel, unsigned long kernel_len) |
|---|
| 22 | 28 | { |
|---|
| 23 | | - unsigned long *loc; |
|---|
| 29 | + const unsigned long marker_len = sizeof(MODULE_SIG_STRING) - 1; |
|---|
| 30 | + struct module_signature *ms; |
|---|
| 31 | + unsigned long sig_len; |
|---|
| 32 | + int ret; |
|---|
| 24 | 33 | |
|---|
| 25 | | - if (image->cmdline_buf_len >= ARCH_COMMAND_LINE_SIZE) |
|---|
| 26 | | - return ERR_PTR(-EINVAL); |
|---|
| 34 | + /* Skip signature verification when not secure IPLed. */ |
|---|
| 35 | + if (!ipl_secure_flag) |
|---|
| 36 | + return 0; |
|---|
| 27 | 37 | |
|---|
| 28 | | - if (image->cmdline_buf_len) |
|---|
| 29 | | - memcpy(data->kernel_buf + COMMAND_LINE_OFFSET, |
|---|
| 30 | | - image->cmdline_buf, image->cmdline_buf_len); |
|---|
| 38 | + if (marker_len > kernel_len) |
|---|
| 39 | + return -EKEYREJECTED; |
|---|
| 31 | 40 | |
|---|
| 32 | | - if (image->type == KEXEC_TYPE_CRASH) { |
|---|
| 33 | | - loc = (unsigned long *)(data->kernel_buf + OLDMEM_BASE_OFFSET); |
|---|
| 34 | | - *loc = crashk_res.start; |
|---|
| 41 | + if (memcmp(kernel + kernel_len - marker_len, MODULE_SIG_STRING, |
|---|
| 42 | + marker_len)) |
|---|
| 43 | + return -EKEYREJECTED; |
|---|
| 44 | + kernel_len -= marker_len; |
|---|
| 35 | 45 | |
|---|
| 36 | | - loc = (unsigned long *)(data->kernel_buf + OLDMEM_SIZE_OFFSET); |
|---|
| 37 | | - *loc = crashk_res.end - crashk_res.start + 1; |
|---|
| 46 | + ms = (void *)kernel + kernel_len - sizeof(*ms); |
|---|
| 47 | + kernel_len -= sizeof(*ms); |
|---|
| 48 | + |
|---|
| 49 | + sig_len = be32_to_cpu(ms->sig_len); |
|---|
| 50 | + if (sig_len >= kernel_len) |
|---|
| 51 | + return -EKEYREJECTED; |
|---|
| 52 | + kernel_len -= sig_len; |
|---|
| 53 | + |
|---|
| 54 | + if (ms->id_type != PKEY_ID_PKCS7) |
|---|
| 55 | + return -EKEYREJECTED; |
|---|
| 56 | + |
|---|
| 57 | + if (ms->algo != 0 || |
|---|
| 58 | + ms->hash != 0 || |
|---|
| 59 | + ms->signer_len != 0 || |
|---|
| 60 | + ms->key_id_len != 0 || |
|---|
| 61 | + ms->__pad[0] != 0 || |
|---|
| 62 | + ms->__pad[1] != 0 || |
|---|
| 63 | + ms->__pad[2] != 0) { |
|---|
| 64 | + return -EBADMSG; |
|---|
| 38 | 65 | } |
|---|
| 39 | 66 | |
|---|
| 40 | | - if (image->initrd_buf) { |
|---|
| 41 | | - loc = (unsigned long *)(data->kernel_buf + INITRD_START_OFFSET); |
|---|
| 42 | | - *loc = data->initrd_load_addr; |
|---|
| 43 | | - |
|---|
| 44 | | - loc = (unsigned long *)(data->kernel_buf + INITRD_SIZE_OFFSET); |
|---|
| 45 | | - *loc = image->initrd_buf_len; |
|---|
| 46 | | - } |
|---|
| 47 | | - |
|---|
| 48 | | - return NULL; |
|---|
| 67 | + ret = verify_pkcs7_signature(kernel, kernel_len, |
|---|
| 68 | + kernel + kernel_len, sig_len, |
|---|
| 69 | + VERIFY_USE_SECONDARY_KEYRING, |
|---|
| 70 | + VERIFYING_MODULE_SIGNATURE, |
|---|
| 71 | + NULL, NULL); |
|---|
| 72 | + if (ret == -ENOKEY && IS_ENABLED(CONFIG_INTEGRITY_PLATFORM_KEYRING)) |
|---|
| 73 | + ret = verify_pkcs7_signature(kernel, kernel_len, |
|---|
| 74 | + kernel + kernel_len, sig_len, |
|---|
| 75 | + VERIFY_USE_PLATFORM_KEYRING, |
|---|
| 76 | + VERIFYING_MODULE_SIGNATURE, |
|---|
| 77 | + NULL, NULL); |
|---|
| 78 | + return ret; |
|---|
| 49 | 79 | } |
|---|
| 80 | +#endif /* CONFIG_KEXEC_SIG */ |
|---|
| 50 | 81 | |
|---|
| 51 | | -static int kexec_file_update_purgatory(struct kimage *image) |
|---|
| 82 | +static int kexec_file_update_purgatory(struct kimage *image, |
|---|
| 83 | + struct s390_load_data *data) |
|---|
| 52 | 84 | { |
|---|
| 53 | 85 | u64 entry, type; |
|---|
| 54 | 86 | int ret; |
|---|
| .. | .. |
|---|
| 90 | 122 | return ret; |
|---|
| 91 | 123 | } |
|---|
| 92 | 124 | |
|---|
| 93 | | -int kexec_file_add_purgatory(struct kimage *image, struct s390_load_data *data) |
|---|
| 125 | +static int kexec_file_add_purgatory(struct kimage *image, |
|---|
| 126 | + struct s390_load_data *data) |
|---|
| 94 | 127 | { |
|---|
| 95 | 128 | struct kexec_buf buf; |
|---|
| 96 | 129 | int ret; |
|---|
| .. | .. |
|---|
| 105 | 138 | ret = kexec_load_purgatory(image, &buf); |
|---|
| 106 | 139 | if (ret) |
|---|
| 107 | 140 | return ret; |
|---|
| 141 | + data->memsz += buf.memsz; |
|---|
| 108 | 142 | |
|---|
| 109 | | - ret = kexec_file_update_purgatory(image); |
|---|
| 110 | | - return ret; |
|---|
| 143 | + return kexec_file_update_purgatory(image, data); |
|---|
| 111 | 144 | } |
|---|
| 112 | 145 | |
|---|
| 113 | | -int kexec_file_add_initrd(struct kimage *image, struct s390_load_data *data, |
|---|
| 114 | | - char *initrd, unsigned long initrd_len) |
|---|
| 146 | +static int kexec_file_add_initrd(struct kimage *image, |
|---|
| 147 | + struct s390_load_data *data) |
|---|
| 115 | 148 | { |
|---|
| 116 | 149 | struct kexec_buf buf; |
|---|
| 117 | 150 | int ret; |
|---|
| 118 | 151 | |
|---|
| 119 | 152 | buf.image = image; |
|---|
| 120 | 153 | |
|---|
| 121 | | - buf.buffer = initrd; |
|---|
| 122 | | - buf.bufsz = initrd_len; |
|---|
| 154 | + buf.buffer = image->initrd_buf; |
|---|
| 155 | + buf.bufsz = image->initrd_buf_len; |
|---|
| 123 | 156 | |
|---|
| 124 | 157 | data->memsz = ALIGN(data->memsz, PAGE_SIZE); |
|---|
| 125 | 158 | buf.mem = data->memsz; |
|---|
| .. | .. |
|---|
| 127 | 160 | buf.mem += crashk_res.start; |
|---|
| 128 | 161 | buf.memsz = buf.bufsz; |
|---|
| 129 | 162 | |
|---|
| 130 | | - data->initrd_load_addr = buf.mem; |
|---|
| 163 | + data->parm->initrd_start = data->memsz; |
|---|
| 164 | + data->parm->initrd_size = buf.memsz; |
|---|
| 131 | 165 | data->memsz += buf.memsz; |
|---|
| 132 | 166 | |
|---|
| 133 | 167 | ret = kexec_add_buffer(&buf); |
|---|
| 168 | + if (ret) |
|---|
| 169 | + return ret; |
|---|
| 170 | + |
|---|
| 171 | + return ipl_report_add_component(data->report, &buf, 0, 0); |
|---|
| 172 | +} |
|---|
| 173 | + |
|---|
| 174 | +static int kexec_file_add_ipl_report(struct kimage *image, |
|---|
| 175 | + struct s390_load_data *data) |
|---|
| 176 | +{ |
|---|
| 177 | + __u32 *lc_ipl_parmblock_ptr; |
|---|
| 178 | + unsigned int len, ncerts; |
|---|
| 179 | + struct kexec_buf buf; |
|---|
| 180 | + unsigned long addr; |
|---|
| 181 | + void *ptr, *end; |
|---|
| 182 | + int ret; |
|---|
| 183 | + |
|---|
| 184 | + buf.image = image; |
|---|
| 185 | + |
|---|
| 186 | + data->memsz = ALIGN(data->memsz, PAGE_SIZE); |
|---|
| 187 | + buf.mem = data->memsz; |
|---|
| 188 | + |
|---|
| 189 | + ptr = (void *)ipl_cert_list_addr; |
|---|
| 190 | + end = ptr + ipl_cert_list_size; |
|---|
| 191 | + ncerts = 0; |
|---|
| 192 | + while (ptr < end) { |
|---|
| 193 | + ncerts++; |
|---|
| 194 | + len = *(unsigned int *)ptr; |
|---|
| 195 | + ptr += sizeof(len); |
|---|
| 196 | + ptr += len; |
|---|
| 197 | + } |
|---|
| 198 | + |
|---|
| 199 | + addr = data->memsz + data->report->size; |
|---|
| 200 | + addr += ncerts * sizeof(struct ipl_rb_certificate_entry); |
|---|
| 201 | + ptr = (void *)ipl_cert_list_addr; |
|---|
| 202 | + while (ptr < end) { |
|---|
| 203 | + len = *(unsigned int *)ptr; |
|---|
| 204 | + ptr += sizeof(len); |
|---|
| 205 | + ipl_report_add_certificate(data->report, ptr, addr, len); |
|---|
| 206 | + addr += len; |
|---|
| 207 | + ptr += len; |
|---|
| 208 | + } |
|---|
| 209 | + |
|---|
| 210 | + ret = -ENOMEM; |
|---|
| 211 | + buf.buffer = ipl_report_finish(data->report); |
|---|
| 212 | + if (!buf.buffer) |
|---|
| 213 | + goto out; |
|---|
| 214 | + buf.bufsz = data->report->size; |
|---|
| 215 | + buf.memsz = buf.bufsz; |
|---|
| 216 | + image->arch.ipl_buf = buf.buffer; |
|---|
| 217 | + |
|---|
| 218 | + data->memsz += buf.memsz; |
|---|
| 219 | + |
|---|
| 220 | + lc_ipl_parmblock_ptr = |
|---|
| 221 | + data->kernel_buf + offsetof(struct lowcore, ipl_parmblock_ptr); |
|---|
| 222 | + *lc_ipl_parmblock_ptr = (__u32)buf.mem; |
|---|
| 223 | + |
|---|
| 224 | + if (image->type == KEXEC_TYPE_CRASH) |
|---|
| 225 | + buf.mem += crashk_res.start; |
|---|
| 226 | + |
|---|
| 227 | + ret = kexec_add_buffer(&buf); |
|---|
| 228 | +out: |
|---|
| 134 | 229 | return ret; |
|---|
| 135 | 230 | } |
|---|
| 136 | 231 | |
|---|
| 137 | | -/* |
|---|
| 138 | | - * The kernel is loaded to a fixed location. Turn off kexec_locate_mem_hole |
|---|
| 139 | | - * and provide kbuf->mem by hand. |
|---|
| 140 | | - */ |
|---|
| 141 | | -int arch_kexec_walk_mem(struct kexec_buf *kbuf, |
|---|
| 142 | | - int (*func)(struct resource *, void *)) |
|---|
| 232 | +void *kexec_file_add_components(struct kimage *image, |
|---|
| 233 | + int (*add_kernel)(struct kimage *image, |
|---|
| 234 | + struct s390_load_data *data)) |
|---|
| 143 | 235 | { |
|---|
| 144 | | - return 1; |
|---|
| 236 | + struct s390_load_data data = {0}; |
|---|
| 237 | + int ret; |
|---|
| 238 | + |
|---|
| 239 | + data.report = ipl_report_init(&ipl_block); |
|---|
| 240 | + if (IS_ERR(data.report)) |
|---|
| 241 | + return data.report; |
|---|
| 242 | + |
|---|
| 243 | + ret = add_kernel(image, &data); |
|---|
| 244 | + if (ret) |
|---|
| 245 | + goto out; |
|---|
| 246 | + |
|---|
| 247 | + if (image->cmdline_buf_len >= ARCH_COMMAND_LINE_SIZE) { |
|---|
| 248 | + ret = -EINVAL; |
|---|
| 249 | + goto out; |
|---|
| 250 | + } |
|---|
| 251 | + memcpy(data.parm->command_line, image->cmdline_buf, |
|---|
| 252 | + image->cmdline_buf_len); |
|---|
| 253 | + |
|---|
| 254 | + if (image->type == KEXEC_TYPE_CRASH) { |
|---|
| 255 | + data.parm->oldmem_base = crashk_res.start; |
|---|
| 256 | + data.parm->oldmem_size = crashk_res.end - crashk_res.start + 1; |
|---|
| 257 | + } |
|---|
| 258 | + |
|---|
| 259 | + if (image->initrd_buf) { |
|---|
| 260 | + ret = kexec_file_add_initrd(image, &data); |
|---|
| 261 | + if (ret) |
|---|
| 262 | + goto out; |
|---|
| 263 | + } |
|---|
| 264 | + |
|---|
| 265 | + ret = kexec_file_add_purgatory(image, &data); |
|---|
| 266 | + if (ret) |
|---|
| 267 | + goto out; |
|---|
| 268 | + |
|---|
| 269 | + if (data.kernel_mem == 0) { |
|---|
| 270 | + unsigned long restart_psw = 0x0008000080000000UL; |
|---|
| 271 | + restart_psw += image->start; |
|---|
| 272 | + memcpy(data.kernel_buf, &restart_psw, sizeof(restart_psw)); |
|---|
| 273 | + image->start = 0; |
|---|
| 274 | + } |
|---|
| 275 | + |
|---|
| 276 | + ret = kexec_file_add_ipl_report(image, &data); |
|---|
| 277 | +out: |
|---|
| 278 | + ipl_report_free(data.report); |
|---|
| 279 | + return ERR_PTR(ret); |
|---|
| 145 | 280 | } |
|---|
| 146 | 281 | |
|---|
| 147 | 282 | int arch_kexec_apply_relocations_add(struct purgatory_info *pi, |
|---|
| .. | .. |
|---|
| 150 | 285 | const Elf_Shdr *symtab) |
|---|
| 151 | 286 | { |
|---|
| 152 | 287 | Elf_Rela *relas; |
|---|
| 153 | | - int i; |
|---|
| 288 | + int i, r_type; |
|---|
| 289 | + int ret; |
|---|
| 154 | 290 | |
|---|
| 155 | 291 | relas = (void *)pi->ehdr + relsec->sh_offset; |
|---|
| 156 | 292 | |
|---|
| .. | .. |
|---|
| 184 | 320 | |
|---|
| 185 | 321 | addr = section->sh_addr + relas[i].r_offset; |
|---|
| 186 | 322 | |
|---|
| 187 | | - switch (ELF64_R_TYPE(relas[i].r_info)) { |
|---|
| 188 | | - case R_390_8: /* Direct 8 bit. */ |
|---|
| 189 | | - *(u8 *)loc = val; |
|---|
| 190 | | - break; |
|---|
| 191 | | - case R_390_12: /* Direct 12 bit. */ |
|---|
| 192 | | - *(u16 *)loc &= 0xf000; |
|---|
| 193 | | - *(u16 *)loc |= val & 0xfff; |
|---|
| 194 | | - break; |
|---|
| 195 | | - case R_390_16: /* Direct 16 bit. */ |
|---|
| 196 | | - *(u16 *)loc = val; |
|---|
| 197 | | - break; |
|---|
| 198 | | - case R_390_20: /* Direct 20 bit. */ |
|---|
| 199 | | - *(u32 *)loc &= 0xf00000ff; |
|---|
| 200 | | - *(u32 *)loc |= (val & 0xfff) << 16; /* DL */ |
|---|
| 201 | | - *(u32 *)loc |= (val & 0xff000) >> 4; /* DH */ |
|---|
| 202 | | - break; |
|---|
| 203 | | - case R_390_32: /* Direct 32 bit. */ |
|---|
| 204 | | - *(u32 *)loc = val; |
|---|
| 205 | | - break; |
|---|
| 206 | | - case R_390_64: /* Direct 64 bit. */ |
|---|
| 207 | | - *(u64 *)loc = val; |
|---|
| 208 | | - break; |
|---|
| 209 | | - case R_390_PC16: /* PC relative 16 bit. */ |
|---|
| 210 | | - *(u16 *)loc = (val - addr); |
|---|
| 211 | | - break; |
|---|
| 212 | | - case R_390_PC16DBL: /* PC relative 16 bit shifted by 1. */ |
|---|
| 213 | | - *(u16 *)loc = (val - addr) >> 1; |
|---|
| 214 | | - break; |
|---|
| 215 | | - case R_390_PC32DBL: /* PC relative 32 bit shifted by 1. */ |
|---|
| 216 | | - *(u32 *)loc = (val - addr) >> 1; |
|---|
| 217 | | - break; |
|---|
| 218 | | - case R_390_PC32: /* PC relative 32 bit. */ |
|---|
| 219 | | - *(u32 *)loc = (val - addr); |
|---|
| 220 | | - break; |
|---|
| 221 | | - case R_390_PC64: /* PC relative 64 bit. */ |
|---|
| 222 | | - *(u64 *)loc = (val - addr); |
|---|
| 223 | | - break; |
|---|
| 224 | | - default: |
|---|
| 225 | | - break; |
|---|
| 323 | + r_type = ELF64_R_TYPE(relas[i].r_info); |
|---|
| 324 | + ret = arch_kexec_do_relocs(r_type, loc, val, addr); |
|---|
| 325 | + if (ret) { |
|---|
| 326 | + pr_err("Unknown rela relocation: %d\n", r_type); |
|---|
| 327 | + return -ENOEXEC; |
|---|
| 226 | 328 | } |
|---|
| 227 | 329 | } |
|---|
| 228 | 330 | return 0; |
|---|
| .. | .. |
|---|
| 235 | 337 | * load memory in head.S will be accessed, e.g. to register the next |
|---|
| 236 | 338 | * command line. If the next kernel were smaller the current kernel |
|---|
| 237 | 339 | * will panic at load. |
|---|
| 238 | | - * |
|---|
| 239 | | - * 0x11000 = sizeof(head.S) |
|---|
| 240 | 340 | */ |
|---|
| 241 | | - if (buf_len < 0x11000) |
|---|
| 341 | + if (buf_len < HEAD_END) |
|---|
| 242 | 342 | return -ENOEXEC; |
|---|
| 243 | 343 | |
|---|
| 244 | 344 | return kexec_image_probe_default(image, buf, buf_len); |
|---|
| 245 | 345 | } |
|---|
| 346 | + |
|---|
| 347 | +int arch_kimage_file_post_load_cleanup(struct kimage *image) |
|---|
| 348 | +{ |
|---|
| 349 | + vfree(image->arch.ipl_buf); |
|---|
| 350 | + image->arch.ipl_buf = NULL; |
|---|
| 351 | + |
|---|
| 352 | + return kexec_image_post_load_cleanup_default(image); |
|---|
| 353 | +} |
|---|