| // SPDX-License-Identifier: GPL-2.0-only |
| /* |
| * POWER LPAR Platform KeyStore(PLPKS) |
| * Copyright (C) 2022 IBM Corporation |
| * Author: Nayna Jain <nayna@linux.ibm.com> |
| * |
| * Provides access to variables stored in Power LPAR Platform KeyStore(PLPKS). |
| */ |
| |
| #define pr_fmt(fmt) "plpks: " fmt |
| |
| #define PLPKS_WRAPKEY_COMPONENT "PLPKSWR" |
| #define PLPKS_WRAPKEY_NAME "default-wrapping-key" |
| |
| /* |
| * To 4K align the {input, output} buffers to the {UN}WRAP H_CALLs |
| */ |
| #define PLPKS_WRAPPING_BUF_ALIGN 4096 |
| |
| /* |
| * To ensure the output buffer's length is at least 1024 bytes greater |
| * than the input buffer's length during the WRAP H_CALL |
| */ |
| #define PLPKS_WRAPPING_BUF_DIFF 1024 |
| |
| #define PLPKS_WRAP_INTERFACE_BIT 3 |
| #define PLPKS_WRAPPING_KEY_LENGTH 32 |
| |
| #define WRAPFLAG_BE_BIT_SET(be_bit) \ |
| BIT_ULL(63 - (be_bit)) |
| |
| #define WRAPFLAG_BE_GENMASK(be_bit_hi, be_bit_lo) \ |
| GENMASK_ULL(63 - (be_bit_hi), 63 - (be_bit_lo)) |
| |
| #define WRAPFLAG_BE_FIELD_PREP(be_bit_hi, be_bit_lo, val) \ |
| FIELD_PREP(WRAPFLAG_BE_GENMASK(be_bit_hi, be_bit_lo), (val)) |
| |
| #include <linux/delay.h> |
| #include <linux/errno.h> |
| #include <linux/io.h> |
| #include <linux/printk.h> |
| #include <linux/slab.h> |
| #include <linux/string.h> |
| #include <linux/types.h> |
| #include <linux/of_fdt.h> |
| #include <linux/libfdt.h> |
| #include <linux/memblock.h> |
| #include <linux/bitfield.h> |
| #include <asm/hvcall.h> |
| #include <asm/machdep.h> |
| #include <asm/plpks.h> |
| #include <asm/firmware.h> |
| |
| static u8 *ospassword; |
| static u16 ospasswordlength; |
| |
| // Retrieved with H_PKS_GET_CONFIG |
| static u8 version; |
| static u16 objoverhead; |
| static u16 maxpwsize; |
| static u16 maxobjsize; |
| static s16 maxobjlabelsize; |
| static u32 totalsize; |
| static u32 usedspace; |
| static u32 supportedpolicies; |
| static u32 maxlargeobjectsize; |
| static u64 signedupdatealgorithms; |
| static u64 wrappingfeatures; |
| static bool wrapsupport; |
| |
| struct plpks_auth { |
| u8 version; |
| u8 consumer; |
| __be64 rsvd0; |
| __be32 rsvd1; |
| __be16 passwordlength; |
| u8 password[]; |
| } __packed __aligned(16); |
| |
| struct label_attr { |
| u8 prefix[8]; |
| u8 version; |
| u8 os; |
| u8 length; |
| u8 reserved[5]; |
| }; |
| |
| struct label { |
| struct label_attr attr; |
| u8 name[PLPKS_MAX_NAME_SIZE]; |
| size_t size; |
| }; |
| |
| static int pseries_status_to_err(int rc) |
| { |
| int err; |
| |
| switch (rc) { |
| case H_SUCCESS: |
| err = 0; |
| break; |
| case H_FUNCTION: |
| err = -ENXIO; |
| break; |
| case H_PARAMETER: |
| case H_P2: |
| case H_P3: |
| case H_P4: |
| case H_P5: |
| case H_P6: |
| err = -EINVAL; |
| break; |
| case H_NOT_FOUND: |
| err = -ENOENT; |
| break; |
| case H_BUSY: |
| case H_LONG_BUSY_ORDER_1_MSEC: |
| case H_LONG_BUSY_ORDER_10_MSEC: |
| case H_LONG_BUSY_ORDER_100_MSEC: |
| case H_LONG_BUSY_ORDER_1_SEC: |
| case H_LONG_BUSY_ORDER_10_SEC: |
| case H_LONG_BUSY_ORDER_100_SEC: |
| err = -EBUSY; |
| break; |
| case H_AUTHORITY: |
| err = -EPERM; |
| break; |
| case H_NO_MEM: |
| err = -ENOMEM; |
| break; |
| case H_RESOURCE: |
| err = -EEXIST; |
| break; |
| case H_TOO_BIG: |
| err = -EFBIG; |
| break; |
| case H_STATE: |
| err = -EIO; |
| break; |
| case H_R_STATE: |
| err = -EIO; |
| break; |
| case H_IN_USE: |
| err = -EEXIST; |
| break; |
| case H_ABORTED: |
| err = -EIO; |
| break; |
| default: |
| err = -EINVAL; |
| } |
| |
| pr_debug("Converted hypervisor code %d to Linux %d\n", rc, err); |
| |
| return err; |
| } |
| |
| static int plpks_gen_password(void) |
| { |
| unsigned long retbuf[PLPAR_HCALL_BUFSIZE] = { 0 }; |
| u8 *password, consumer = PLPKS_OS_OWNER; |
| int rc; |
| |
| // If we booted from kexec, we could be reusing an existing password already |
| if (ospassword) { |
| pr_debug("Password of length %u already in use\n", ospasswordlength); |
| return 0; |
| } |
| |
| // The password must not cross a page boundary, so we align to the next power of 2 |
| password = kzalloc(roundup_pow_of_two(maxpwsize), GFP_KERNEL); |
| if (!password) |
| return -ENOMEM; |
| |
| rc = plpar_hcall(H_PKS_GEN_PASSWORD, retbuf, consumer, 0, |
| virt_to_phys(password), maxpwsize); |
| |
| if (!rc) { |
| ospasswordlength = maxpwsize; |
| ospassword = kzalloc(maxpwsize, GFP_KERNEL); |
| if (!ospassword) { |
| kfree_sensitive(password); |
| return -ENOMEM; |
| } |
| memcpy(ospassword, password, ospasswordlength); |
| } else { |
| if (rc == H_IN_USE) { |
| pr_warn("Password already set - authenticated operations will fail\n"); |
| rc = 0; |
| } else { |
| goto out; |
| } |
| } |
| out: |
| kfree_sensitive(password); |
| |
| return pseries_status_to_err(rc); |
| } |
| |
| static struct plpks_auth *construct_auth(u8 consumer) |
| { |
| struct plpks_auth *auth; |
| |
| if (consumer > PLPKS_OS_OWNER) |
| return ERR_PTR(-EINVAL); |
| |
| // The auth structure must not cross a page boundary and must be |
| // 16 byte aligned. We align to the next largest power of 2 |
| auth = kzalloc(roundup_pow_of_two(struct_size(auth, password, maxpwsize)), GFP_KERNEL); |
| if (!auth) |
| return ERR_PTR(-ENOMEM); |
| |
| auth->version = 1; |
| auth->consumer = consumer; |
| |
| if (consumer == PLPKS_FW_OWNER || consumer == PLPKS_BOOTLOADER_OWNER) |
| return auth; |
| |
| memcpy(auth->password, ospassword, ospasswordlength); |
| |
| auth->passwordlength = cpu_to_be16(ospasswordlength); |
| |
| return auth; |
| } |
| |
| /* |
| * Label is combination of label attributes + name. |
| * Label attributes are used internally by kernel and not exposed to the user. |
| */ |
| static struct label *construct_label(char *component, u8 varos, u8 *name, |
| u16 namelen) |
| { |
| struct label *label; |
| size_t slen = 0; |
| |
| if (!name || namelen > PLPKS_MAX_NAME_SIZE) |
| return ERR_PTR(-EINVAL); |
| |
| // Support NULL component for signed updates |
| if (component) { |
| slen = strlen(component); |
| if (slen > sizeof(label->attr.prefix)) |
| return ERR_PTR(-EINVAL); |
| } |
| |
| // The label structure must not cross a page boundary, so we align to the next power of 2 |
| label = kzalloc(roundup_pow_of_two(sizeof(*label)), GFP_KERNEL); |
| if (!label) |
| return ERR_PTR(-ENOMEM); |
| |
| if (component) |
| memcpy(&label->attr.prefix, component, slen); |
| |
| label->attr.version = PLPKS_LABEL_VERSION; |
| label->attr.os = varos; |
| label->attr.length = PLPKS_MAX_LABEL_ATTR_SIZE; |
| memcpy(&label->name, name, namelen); |
| |
| label->size = sizeof(struct label_attr) + namelen; |
| |
| return label; |
| } |
| |
| static int _plpks_get_config(void) |
| { |
| unsigned long retbuf[PLPAR_HCALL_BUFSIZE] = { 0 }; |
| struct config { |
| u8 version; |
| u8 flags; |
| __be16 rsvd0; |
| __be16 objoverhead; |
| __be16 maxpwsize; |
| __be16 maxobjlabelsize; |
| __be16 maxobjsize; |
| __be32 totalsize; |
| __be32 usedspace; |
| __be32 supportedpolicies; |
| __be32 maxlargeobjectsize; |
| __be64 signedupdatealgorithms; |
| __be64 wrappingfeatures; |
| u8 rsvd1[476]; |
| } __packed * config; |
| size_t size; |
| int rc = 0; |
| |
| size = sizeof(*config); |
| |
| // Config struct must not cross a page boundary. So long as the struct |
| // size is a power of 2, this should be fine as alignment is guaranteed |
| config = kzalloc(size, GFP_KERNEL); |
| if (!config) { |
| rc = -ENOMEM; |
| goto err; |
| } |
| |
| rc = plpar_hcall(H_PKS_GET_CONFIG, retbuf, virt_to_phys(config), size); |
| |
| if (rc != H_SUCCESS) { |
| rc = pseries_status_to_err(rc); |
| goto err; |
| } |
| |
| version = config->version; |
| objoverhead = be16_to_cpu(config->objoverhead); |
| maxpwsize = be16_to_cpu(config->maxpwsize); |
| maxobjsize = be16_to_cpu(config->maxobjsize); |
| maxobjlabelsize = be16_to_cpu(config->maxobjlabelsize); |
| totalsize = be32_to_cpu(config->totalsize); |
| usedspace = be32_to_cpu(config->usedspace); |
| supportedpolicies = be32_to_cpu(config->supportedpolicies); |
| maxlargeobjectsize = be32_to_cpu(config->maxlargeobjectsize); |
| signedupdatealgorithms = be64_to_cpu(config->signedupdatealgorithms); |
| wrappingfeatures = be64_to_cpu(config->wrappingfeatures); |
| wrapsupport = config->flags & PPC_BIT8(PLPKS_WRAP_INTERFACE_BIT); |
| |
| // Validate that the numbers we get back match the requirements of the spec |
| if (maxpwsize < 32) { |
| pr_err("Invalid Max Password Size received from hypervisor (%d < 32)\n", maxpwsize); |
| rc = -EIO; |
| goto err; |
| } |
| |
| if (maxobjlabelsize < 255) { |
| pr_err("Invalid Max Object Label Size received from hypervisor (%d < 255)\n", |
| maxobjlabelsize); |
| rc = -EIO; |
| goto err; |
| } |
| |
| if (totalsize < 4096) { |
| pr_err("Invalid Total Size received from hypervisor (%d < 4096)\n", totalsize); |
| rc = -EIO; |
| goto err; |
| } |
| |
| if (version >= 3 && maxlargeobjectsize >= 65536 && maxobjsize != 0xFFFF) { |
| pr_err("Invalid Max Object Size (0x%x != 0xFFFF)\n", maxobjsize); |
| rc = -EIO; |
| goto err; |
| } |
| |
| err: |
| kfree(config); |
| return rc; |
| } |
| |
| /** |
| * plpks_get_version() - Get the version of the PLPKS config structure. |
| * |
| * Successful execution of the H_PKS_GET_CONFIG HCALL during initialization |
| * reads the PLPKS config structure version and saves it in a file local static |
| * version variable. |
| * |
| * Returns: On success the saved PLPKS config structure version is returned, 0 |
| * if not. |
| */ |
| u8 plpks_get_version(void) |
| { |
| return version; |
| } |
| |
| /** |
| * plpks_get_objoverhead() - Get the hypervisor storage overhead per object. |
| * |
| * Successful execution of the H_PKS_GET_CONFIG HCALL during initialization |
| * reads the per object hypervisor storage overhead in bytes into the local |
| * static objoverhead variable, excluding the size of the object or the label. |
| * This value can be treated as valid only when the PLPKS config structure |
| * version >= 2. |
| * |
| * Returns: If PLPKS config structure version >= 2 then the storage overhead is |
| * returned, 0 otherwise. |
| */ |
| u16 plpks_get_objoverhead(void) |
| { |
| return objoverhead; |
| } |
| |
| /** |
| * plpks_get_maxpwsize() - Get the maximum password size. |
| * |
| * Successful execution of the H_PKS_GET_CONFIG HCALL during initialization |
| * reads the maximum password size and checks if it is 32 bytes at the least |
| * before storing it in the local static maxpwsize variable. |
| * |
| * Returns: On success the maximum password size is returned, 0 if not. |
| */ |
| u16 plpks_get_maxpwsize(void) |
| { |
| return maxpwsize; |
| } |
| |
| /** |
| * plpks_get_maxobjectsize() - Get the maximum object size supported by the |
| * PLPKS. |
| * |
| * Successful execution of the H_PKS_GET_CONFIG HCALL during initialization |
| * reads the maximum object size into the file local static maxobjsize variable. |
| * |
| * Returns: On success the maximum object size is returned, 0 if not. |
| */ |
| u16 plpks_get_maxobjectsize(void) |
| { |
| return maxobjsize; |
| } |
| |
| /** |
| * plpks_get_maxobjectlabelsize() - Get the maximum object label size supported |
| * by the PLPKS. |
| * |
| * Successful execution of the H_PKS_GET_CONFIG HCALL during initialization |
| * reads the maximum object label size into the local static maxobjlabelsize |
| * variable. |
| * |
| * Returns: On success the maximum object label size is returned, 0 if not. |
| */ |
| u16 plpks_get_maxobjectlabelsize(void) |
| { |
| return maxobjlabelsize; |
| } |
| |
| /** |
| * plpks_get_totalsize() - Get the total size of the PLPKS that is configured. |
| * |
| * Successful execution of the H_PKS_GET_CONFIG HCALL during initialization |
| * reads the total size of the PLPKS that is configured for the LPAR into the |
| * file local static totalsize variable. |
| * |
| * Returns: On success the total size of the PLPKS configured is returned, 0 if |
| * not. |
| */ |
| u32 plpks_get_totalsize(void) |
| { |
| return totalsize; |
| } |
| |
| /** |
| * plpks_get_usedspace() - Get the used space from the total size of the PLPKS. |
| * |
| * Invoke the H_PKS_GET_CONFIG HCALL to refresh the latest value for the used |
| * space as this keeps changing with the creation and removal of objects in the |
| * PLPKS. |
| * |
| * Returns: On success the used space is returned, 0 if not. |
| */ |
| u32 plpks_get_usedspace(void) |
| { |
| int rc = _plpks_get_config(); |
| if (rc) { |
| pr_err("Couldn't get config, rc: %d\n", rc); |
| return 0; |
| } |
| return usedspace; |
| } |
| |
| /** |
| * plpks_get_supportedpolicies() - Get a bitmask of the policies supported by |
| * the hypervisor. |
| * |
| * Successful execution of the H_PKS_GET_CONFIG HCALL during initialization |
| * reads a bitmask of the policies supported by the hypervisor into the file |
| * local static supportedpolicies variable. |
| * |
| * Returns: On success the bitmask of the policies supported by the hypervisor |
| * are returned, 0 if not. |
| */ |
| u32 plpks_get_supportedpolicies(void) |
| { |
| return supportedpolicies; |
| } |
| |
| /** |
| * plpks_get_maxlargeobjectsize() - Get the maximum object size supported for |
| * PLPKS config structure version >= 3 |
| * |
| * Successful execution of the H_PKS_GET_CONFIG HCALL during initialization |
| * reads the maximum object size into the local static maxlargeobjectsize |
| * variable for PLPKS config structure version >= 3. This was introduced |
| * starting with PLPKS config structure version 3 to allow for objects of |
| * size >= 64K. |
| * |
| * Returns: If PLPKS config structure version >= 3 then the new maximum object |
| * size is returned, 0 if not. |
| */ |
| u32 plpks_get_maxlargeobjectsize(void) |
| { |
| return maxlargeobjectsize; |
| } |
| |
| /** |
| * plpks_get_signedupdatealgorithms() - Get a bitmask of the signature |
| * algorithms supported for signed updates. |
| * |
| * Successful execution of the H_PKS_GET_CONFIG HCALL during initialization |
| * reads a bitmask of the signature algorithms supported for signed updates into |
| * the file local static signedupdatealgorithms variable. This is valid only |
| * when the PLPKS config structure version >= 3. |
| * |
| * Returns: On success the bitmask of the signature algorithms supported for |
| * signed updates is returned, 0 if not. |
| */ |
| u64 plpks_get_signedupdatealgorithms(void) |
| { |
| return signedupdatealgorithms; |
| } |
| |
| /** |
| * plpks_get_wrappingfeatures() - Returns a bitmask of the wrapping features |
| * supported by the hypervisor. |
| * |
| * Successful execution of the H_PKS_GET_CONFIG HCALL during initialization |
| * reads a bitmask of the wrapping features supported by the hypervisor into the |
| * file local static wrappingfeatures variable. This is valid only when the |
| * PLPKS config structure version >= 3. |
| * |
| * Return: |
| * bitmask of the wrapping features supported by the hypervisor |
| */ |
| u64 plpks_get_wrappingfeatures(void) |
| { |
| return wrappingfeatures; |
| } |
| |
| /** |
| * plpks_get_passwordlen() - Get the length of the PLPKS password in bytes. |
| * |
| * The H_PKS_GEN_PASSWORD HCALL makes the hypervisor generate a random password |
| * for the specified consumer, apply that password to the PLPKS and return it to |
| * the caller. In this process, the password length for the OS consumer is |
| * stored in the local static ospasswordlength variable. |
| * |
| * Returns: On success the password length for the OS consumer in bytes is |
| * returned, 0 if not. |
| */ |
| u16 plpks_get_passwordlen(void) |
| { |
| return ospasswordlength; |
| } |
| |
| /** |
| * plpks_is_available() - Get the PLPKS availability status for the LPAR. |
| * |
| * The availability of PLPKS is inferred based upon the successful execution of |
| * the H_PKS_GET_CONFIG HCALL provided the firmware supports this feature. The |
| * H_PKS_GET_CONFIG HCALL reads the configuration and status information related |
| * to the PLPKS. The configuration structure provides a version number to inform |
| * the caller of the supported features. |
| * |
| * Returns: true is returned if PLPKS is available, false if not. |
| */ |
| bool plpks_is_available(void) |
| { |
| int rc; |
| |
| if (!firmware_has_feature(FW_FEATURE_PLPKS)) |
| return false; |
| |
| rc = _plpks_get_config(); |
| if (rc) |
| return false; |
| |
| return true; |
| } |
| |
| static int plpks_confirm_object_flushed(struct label *label, |
| struct plpks_auth *auth) |
| { |
| unsigned long retbuf[PLPAR_HCALL_BUFSIZE] = { 0 }; |
| bool timed_out = true; |
| u64 timeout = 0; |
| u8 status; |
| int rc; |
| |
| do { |
| rc = plpar_hcall(H_PKS_CONFIRM_OBJECT_FLUSHED, retbuf, |
| virt_to_phys(auth), virt_to_phys(label), |
| label->size); |
| |
| status = retbuf[0]; |
| if (rc) { |
| timed_out = false; |
| if (rc == H_NOT_FOUND && status == 1) |
| rc = 0; |
| break; |
| } |
| |
| if (!rc && status == 1) { |
| timed_out = false; |
| break; |
| } |
| |
| fsleep(PLPKS_FLUSH_SLEEP); |
| timeout = timeout + PLPKS_FLUSH_SLEEP; |
| } while (timeout < PLPKS_MAX_TIMEOUT); |
| |
| if (timed_out) |
| return -ETIMEDOUT; |
| |
| return pseries_status_to_err(rc); |
| } |
| |
| /** |
| * plpks_signed_update_var() - Update the specified authenticated variable. |
| * @var: authenticated variable to be updated |
| * @flags: signed update request operation flags |
| * |
| * The H_PKS_SIGNED_UPDATE HCALL performs a signed update to an object in the |
| * PLPKS. The object must have the signed update policy flag set. |
| * |
| * Possible reasons for the returned errno values: |
| * |
| * -ENXIO if PLPKS is not supported |
| * -EIO if PLPKS access is blocked due to the LPAR's state |
| * if PLPKS modification is blocked due to the LPAR's state |
| * if an error occurred while processing the request |
| * -EINVAL if invalid authorization parameter |
| * if invalid object label parameter |
| * if invalid object label len parameter |
| * if invalid or unsupported policy declaration |
| * if invalid signed update flags |
| * if invalid input data parameter |
| * if invalid input data len parameter |
| * if invalid continue token parameter |
| * -EPERM if access is denied |
| * -ENOMEM if there is inadequate memory to perform the operation |
| * -EBUSY if unable to handle the request or long running operation |
| * initiated, retry later |
| * |
| * Returns: On success 0 is returned, a negative errno if not. |
| */ |
| int plpks_signed_update_var(struct plpks_var *var, u64 flags) |
| { |
| unsigned long retbuf[PLPAR_HCALL9_BUFSIZE] = {0}; |
| int rc; |
| struct label *label; |
| struct plpks_auth *auth; |
| u64 continuetoken = 0; |
| u64 timeout = 0; |
| |
| if (!var->data || var->datalen <= 0 || var->namelen > PLPKS_MAX_NAME_SIZE) |
| return -EINVAL; |
| |
| if (!(var->policy & PLPKS_SIGNEDUPDATE)) |
| return -EINVAL; |
| |
| if (var->policy & PLPKS_WRAPPINGKEY) |
| return -EINVAL; |
| |
| // Signed updates need the component to be NULL. |
| if (var->component) |
| return -EINVAL; |
| |
| auth = construct_auth(PLPKS_OS_OWNER); |
| if (IS_ERR(auth)) |
| return PTR_ERR(auth); |
| |
| label = construct_label(var->component, var->os, var->name, var->namelen); |
| if (IS_ERR(label)) { |
| rc = PTR_ERR(label); |
| goto out; |
| } |
| |
| do { |
| rc = plpar_hcall9(H_PKS_SIGNED_UPDATE, retbuf, |
| virt_to_phys(auth), virt_to_phys(label), |
| label->size, var->policy, flags, |
| virt_to_phys(var->data), var->datalen, |
| continuetoken); |
| |
| continuetoken = retbuf[0]; |
| if (pseries_status_to_err(rc) == -EBUSY) { |
| int delay_us = get_longbusy_msecs(rc) * 1000; |
| |
| fsleep(delay_us); |
| timeout += delay_us; |
| } |
| rc = pseries_status_to_err(rc); |
| } while (rc == -EBUSY && timeout < PLPKS_MAX_TIMEOUT); |
| |
| if (!rc) |
| rc = plpks_confirm_object_flushed(label, auth); |
| |
| kfree(label); |
| out: |
| kfree(auth); |
| |
| return rc; |
| } |
| |
| /** |
| * plpks_write_var() - Write the specified variable and its data to PLPKS. |
| * @var: variable to be written into the PLPKS |
| * |
| * The H_PKS_WRITE_OBJECT HCALL writes an object into the PLPKS. The caller must |
| * provide a valid component type for the variable, and the signed update policy |
| * flag must not be set. |
| * |
| * Possible reasons for the returned errno values: |
| * |
| * -ENXIO if PLPKS is not supported |
| * -EIO if PLPKS access is blocked due to the LPAR's state |
| * if PLPKS modification is blocked due to the LPAR's state |
| * if an error occurred while processing the request |
| * -EINVAL if invalid authorization parameter |
| * if invalid object label parameter |
| * if invalid object label len parameter |
| * if invalid or unsupported policy declaration |
| * if invalid input data parameter |
| * if invalid input data len parameter |
| * -EPERM if access is denied |
| * -ENOMEM if unable to store the requested object in the space available |
| * -EBUSY if unable to handle the request |
| * -EEXIST if the object label already exists |
| * |
| * Returns: On success 0 is returned, a negative errno if not. |
| */ |
| int plpks_write_var(struct plpks_var var) |
| { |
| unsigned long retbuf[PLPAR_HCALL_BUFSIZE] = { 0 }; |
| struct plpks_auth *auth; |
| struct label *label; |
| int rc; |
| |
| if (!var.component || !var.data || var.datalen <= 0 || |
| var.namelen > PLPKS_MAX_NAME_SIZE || var.datalen > PLPKS_MAX_DATA_SIZE) |
| return -EINVAL; |
| |
| if (var.policy & PLPKS_SIGNEDUPDATE) |
| return -EINVAL; |
| |
| if (var.policy & PLPKS_WRAPPINGKEY) |
| return -EINVAL; |
| |
| auth = construct_auth(PLPKS_OS_OWNER); |
| if (IS_ERR(auth)) |
| return PTR_ERR(auth); |
| |
| label = construct_label(var.component, var.os, var.name, var.namelen); |
| if (IS_ERR(label)) { |
| rc = PTR_ERR(label); |
| goto out; |
| } |
| |
| rc = plpar_hcall(H_PKS_WRITE_OBJECT, retbuf, virt_to_phys(auth), |
| virt_to_phys(label), label->size, var.policy, |
| virt_to_phys(var.data), var.datalen); |
| |
| if (!rc) |
| rc = plpks_confirm_object_flushed(label, auth); |
| |
| rc = pseries_status_to_err(rc); |
| kfree(label); |
| out: |
| kfree(auth); |
| |
| return rc; |
| } |
| |
| /** |
| * plpks_remove_var() - Remove the specified variable and its data from PLPKS. |
| * @component: metadata prefix in the object label metadata structure |
| * @varos: metadata OS flags in the object label metadata structure |
| * @vname: object label for the object that needs to be removed |
| * |
| * The H_PKS_REMOVE_OBJECT HCALL removes an object from the PLPKS. The removal |
| * is independent of the policy bits that are set. |
| * |
| * Possible reasons for the returned errno values: |
| * |
| * -ENXIO if PLPKS is not supported |
| * -EIO if PLPKS access is blocked due to the LPAR's state |
| * if PLPKS modification is blocked due to the LPAR's state |
| * if an error occurred while processing the request |
| * -EINVAL if invalid authorization parameter |
| * if invalid object label parameter |
| * if invalid object label len parameter |
| * -EPERM if access is denied |
| * -ENOENT if the requested object was not found |
| * -EBUSY if unable to handle the request |
| * |
| * Returns: On success 0 is returned, a negative errno if not. |
| */ |
| int plpks_remove_var(char *component, u8 varos, struct plpks_var_name vname) |
| { |
| unsigned long retbuf[PLPAR_HCALL_BUFSIZE] = { 0 }; |
| struct plpks_auth *auth; |
| struct label *label; |
| int rc; |
| |
| if (vname.namelen > PLPKS_MAX_NAME_SIZE) |
| return -EINVAL; |
| |
| auth = construct_auth(PLPKS_OS_OWNER); |
| if (IS_ERR(auth)) |
| return PTR_ERR(auth); |
| |
| label = construct_label(component, varos, vname.name, vname.namelen); |
| if (IS_ERR(label)) { |
| rc = PTR_ERR(label); |
| goto out; |
| } |
| |
| rc = plpar_hcall(H_PKS_REMOVE_OBJECT, retbuf, virt_to_phys(auth), |
| virt_to_phys(label), label->size); |
| |
| if (!rc) |
| rc = plpks_confirm_object_flushed(label, auth); |
| |
| rc = pseries_status_to_err(rc); |
| kfree(label); |
| out: |
| kfree(auth); |
| |
| return rc; |
| } |
| |
| static int plpks_read_var(u8 consumer, struct plpks_var *var) |
| { |
| unsigned long retbuf[PLPAR_HCALL_BUFSIZE] = { 0 }; |
| struct plpks_auth *auth; |
| struct label *label = NULL; |
| u8 *output; |
| int rc; |
| |
| if (var->namelen > PLPKS_MAX_NAME_SIZE) |
| return -EINVAL; |
| |
| if (var->policy & PLPKS_WRAPPINGKEY) |
| return -EINVAL; |
| |
| auth = construct_auth(consumer); |
| if (IS_ERR(auth)) |
| return PTR_ERR(auth); |
| |
| if (consumer == PLPKS_OS_OWNER) { |
| label = construct_label(var->component, var->os, var->name, |
| var->namelen); |
| if (IS_ERR(label)) { |
| rc = PTR_ERR(label); |
| goto out_free_auth; |
| } |
| } |
| |
| output = kzalloc(maxobjsize, GFP_KERNEL); |
| if (!output) { |
| rc = -ENOMEM; |
| goto out_free_label; |
| } |
| |
| if (consumer == PLPKS_OS_OWNER) |
| rc = plpar_hcall(H_PKS_READ_OBJECT, retbuf, virt_to_phys(auth), |
| virt_to_phys(label), label->size, virt_to_phys(output), |
| maxobjsize); |
| else |
| rc = plpar_hcall(H_PKS_READ_OBJECT, retbuf, virt_to_phys(auth), |
| virt_to_phys(var->name), var->namelen, virt_to_phys(output), |
| maxobjsize); |
| |
| |
| if (rc != H_SUCCESS) { |
| rc = pseries_status_to_err(rc); |
| goto out_free_output; |
| } |
| |
| if (!var->data || var->datalen > retbuf[0]) |
| var->datalen = retbuf[0]; |
| |
| var->policy = retbuf[1]; |
| |
| if (var->data) |
| memcpy(var->data, output, var->datalen); |
| |
| rc = 0; |
| |
| out_free_output: |
| kfree(output); |
| out_free_label: |
| kfree(label); |
| out_free_auth: |
| kfree(auth); |
| |
| return rc; |
| } |
| |
| /** |
| * plpks_wrapping_is_supported() - Get the H_PKS_WRAP_OBJECT interface |
| * availability status for the LPAR. |
| * |
| * Successful execution of the H_PKS_GET_CONFIG HCALL during initialization |
| * sets bit 3 of the flags variable in the PLPKS config structure if the |
| * H_PKS_WRAP_OBJECT interface is supported. |
| * |
| * Returns: true if the H_PKS_WRAP_OBJECT interface is supported, false if not. |
| */ |
| bool plpks_wrapping_is_supported(void) |
| { |
| return wrapsupport; |
| } |
| EXPORT_SYMBOL_GPL(plpks_wrapping_is_supported); |
| |
| /** |
| * plpks_gen_wrapping_key() - Generate a new random key with the 'wrapping key' |
| * policy set. |
| * |
| * The H_PKS_GEN_KEY HCALL makes the hypervisor generate a new random key and |
| * store the key in a PLPKS object with the provided object label. With the |
| * 'wrapping key' policy set, only the label to the newly generated random key |
| * would be visible to the user. |
| * |
| * Possible reasons for the returned errno values: |
| * |
| * -ENXIO if PLPKS is not supported |
| * -EIO if PLPKS access is blocked due to the LPAR's state |
| * if PLPKS modification is blocked due to the LPAR's state |
| * if an error occurred while processing the request |
| * -EINVAL if invalid authorization parameter |
| * if invalid object label parameter |
| * if invalid object label len parameter |
| * if invalid or unsupported policy declaration |
| * if invalid output buffer parameter |
| * if invalid output buffer length parameter |
| * -EPERM if access is denied |
| * -ENOMEM if there is inadequate memory to perform this operation |
| * -EBUSY if unable to handle the request |
| * -EEXIST if the object label already exists |
| * |
| * Returns: On success 0 is returned, a negative errno if not. |
| */ |
| int plpks_gen_wrapping_key(void) |
| { |
| unsigned long retbuf[PLPAR_HCALL_BUFSIZE] = { 0 }; |
| struct plpks_auth *auth; |
| struct label *label; |
| int rc = 0, pseries_status = 0; |
| struct plpks_var var = { |
| .name = PLPKS_WRAPKEY_NAME, |
| .namelen = strlen(var.name), |
| .policy = PLPKS_WRAPPINGKEY, |
| .os = PLPKS_VAR_LINUX, |
| .component = PLPKS_WRAPKEY_COMPONENT |
| }; |
| |
| auth = construct_auth(PLPKS_OS_OWNER); |
| if (IS_ERR(auth)) |
| return PTR_ERR(auth); |
| |
| label = construct_label(var.component, var.os, var.name, var.namelen); |
| if (IS_ERR(label)) { |
| rc = PTR_ERR(label); |
| goto out; |
| } |
| |
| rc = plpar_hcall(H_PKS_GEN_KEY, retbuf, |
| virt_to_phys(auth), virt_to_phys(label), |
| label->size, var.policy, |
| NULL, PLPKS_WRAPPING_KEY_LENGTH); |
| |
| if (!rc) |
| rc = plpks_confirm_object_flushed(label, auth); |
| |
| pseries_status = rc; |
| rc = pseries_status_to_err(rc); |
| |
| if (rc && rc != -EEXIST) { |
| pr_err("H_PKS_GEN_KEY failed. pseries_status=%d, rc=%d", |
| pseries_status, rc); |
| } else { |
| rc = 0; |
| } |
| |
| kfree(label); |
| out: |
| kfree(auth); |
| return rc; |
| } |
| EXPORT_SYMBOL_GPL(plpks_gen_wrapping_key); |
| |
| /** |
| * plpks_wrap_object() - Wrap an object using the default wrapping key stored in |
| * the PLPKS. |
| * @input_buf: buffer containing the data to be wrapped |
| * @input_len: length of the input buffer |
| * @wrap_flags: object wrapping flags |
| * @output_buf: buffer to store the wrapped data |
| * @output_len: length of the output buffer |
| * |
| * The H_PKS_WRAP_OBJECT HCALL wraps an object using a wrapping key stored in |
| * the PLPKS and returns the wrapped object to the caller. The caller provides a |
| * label to the wrapping key with the 'wrapping key' policy set that must have |
| * been previously created with the H_PKS_GEN_KEY HCALL. The provided object is |
| * then encrypted with the wrapping key and additional metadata and the result |
| * is returned to the user. The metadata includes the wrapping algorithm and the |
| * wrapping key name so those parameters are not required during unwrap. |
| * |
| * Possible reasons for the returned errno values: |
| * |
| * -ENXIO if PLPKS is not supported |
| * -EIO if PLPKS access is blocked due to the LPAR's state |
| * if PLPKS modification is blocked due to the LPAR's state |
| * if an error occurred while processing the request |
| * -EINVAL if invalid authorization parameter |
| * if invalid wrapping key label parameter |
| * if invalid wrapping key label length parameter |
| * if invalid or unsupported object wrapping flags |
| * if invalid input buffer parameter |
| * if invalid input buffer length parameter |
| * if invalid output buffer parameter |
| * if invalid output buffer length parameter |
| * if invalid continue token parameter |
| * if the wrapping key is not compatible with the wrapping |
| * algorithm |
| * -EPERM if access is denied |
| * -ENOENT if the requested wrapping key was not found |
| * -EBUSY if unable to handle the request or long running operation |
| * initiated, retry later. |
| * |
| * Returns: On success 0 is returned, a negative errno if not. |
| */ |
| int plpks_wrap_object(u8 **input_buf, u32 input_len, u16 wrap_flags, |
| u8 **output_buf, u32 *output_len) |
| { |
| unsigned long retbuf[PLPAR_HCALL9_BUFSIZE] = { 0 }; |
| struct plpks_auth *auth; |
| struct label *label; |
| u64 continuetoken = 0; |
| u64 objwrapflags = 0; |
| int rc = 0, pseries_status = 0; |
| bool sb_audit_or_enforce_bit = wrap_flags & BIT(0); |
| bool sb_enforce_bit = wrap_flags & BIT(1); |
| struct plpks_var var = { |
| .name = PLPKS_WRAPKEY_NAME, |
| .namelen = strlen(var.name), |
| .os = PLPKS_VAR_LINUX, |
| .component = PLPKS_WRAPKEY_COMPONENT |
| }; |
| |
| auth = construct_auth(PLPKS_OS_OWNER); |
| if (IS_ERR(auth)) |
| return PTR_ERR(auth); |
| |
| label = construct_label(var.component, var.os, var.name, var.namelen); |
| if (IS_ERR(label)) { |
| rc = PTR_ERR(label); |
| goto out; |
| } |
| |
| /* Set the consumer password requirement bit. A must have. */ |
| objwrapflags |= WRAPFLAG_BE_BIT_SET(3); |
| |
| /* Set the wrapping algorithm bit. Just one algorithm option for now */ |
| objwrapflags |= WRAPFLAG_BE_FIELD_PREP(60, 63, 0x1); |
| |
| if (sb_audit_or_enforce_bit & sb_enforce_bit) { |
| pr_err("Cannot set both audit/enforce and enforce bits."); |
| rc = -EINVAL; |
| goto out_free_label; |
| } else if (sb_audit_or_enforce_bit) { |
| objwrapflags |= WRAPFLAG_BE_BIT_SET(1); |
| } else if (sb_enforce_bit) { |
| objwrapflags |= WRAPFLAG_BE_BIT_SET(2); |
| } |
| |
| *output_len = input_len + PLPKS_WRAPPING_BUF_DIFF; |
| |
| *output_buf = kzalloc(ALIGN(*output_len, PLPKS_WRAPPING_BUF_ALIGN), |
| GFP_KERNEL); |
| if (!(*output_buf)) { |
| pr_err("Output buffer allocation failed. Returning -ENOMEM."); |
| rc = -ENOMEM; |
| goto out_free_label; |
| } |
| |
| do { |
| rc = plpar_hcall9(H_PKS_WRAP_OBJECT, retbuf, |
| virt_to_phys(auth), virt_to_phys(label), |
| label->size, objwrapflags, |
| virt_to_phys(*input_buf), input_len, |
| virt_to_phys(*output_buf), *output_len, |
| continuetoken); |
| |
| continuetoken = retbuf[0]; |
| pseries_status = rc; |
| rc = pseries_status_to_err(rc); |
| } while (rc == -EBUSY); |
| |
| if (rc) { |
| pr_err("H_PKS_WRAP_OBJECT failed. pseries_status=%d, rc=%d", |
| pseries_status, rc); |
| kfree(*output_buf); |
| *output_buf = NULL; |
| } else { |
| *output_len = retbuf[1]; |
| } |
| |
| out_free_label: |
| kfree(label); |
| out: |
| kfree(auth); |
| return rc; |
| } |
| EXPORT_SYMBOL_GPL(plpks_wrap_object); |
| |
| /** |
| * plpks_unwrap_object() - Unwrap an object using the default wrapping key |
| * stored in the PLPKS. |
| * @input_buf: buffer containing the data to be unwrapped |
| * @input_len: length of the input buffer |
| * @output_buf: buffer to store the unwrapped data |
| * @output_len: length of the output buffer |
| * |
| * The H_PKS_UNWRAP_OBJECT HCALL unwraps an object that was previously wrapped |
| * using the H_PKS_WRAP_OBJECT HCALL. |
| * |
| * Possible reasons for the returned errno values: |
| * |
| * -ENXIO if PLPKS is not supported |
| * -EIO if PLPKS access is blocked due to the LPAR's state |
| * if PLPKS modification is blocked due to the LPAR's state |
| * if an error occurred while processing the request |
| * -EINVAL if invalid authorization parameter |
| * if invalid or unsupported object unwrapping flags |
| * if invalid input buffer parameter |
| * if invalid input buffer length parameter |
| * if invalid output buffer parameter |
| * if invalid output buffer length parameter |
| * if invalid continue token parameter |
| * if the wrapping key is not compatible with the wrapping |
| * algorithm |
| * if the wrapped object's format is not supported |
| * if the wrapped object is invalid |
| * -EPERM if access is denied |
| * -ENOENT if the wrapping key for the provided object was not found |
| * -EBUSY if unable to handle the request or long running operation |
| * initiated, retry later. |
| * |
| * Returns: On success 0 is returned, a negative errno if not. |
| */ |
| int plpks_unwrap_object(u8 **input_buf, u32 input_len, u8 **output_buf, |
| u32 *output_len) |
| { |
| unsigned long retbuf[PLPAR_HCALL9_BUFSIZE] = { 0 }; |
| struct plpks_auth *auth; |
| u64 continuetoken = 0; |
| u64 objwrapflags = 0; |
| int rc = 0, pseries_status = 0; |
| |
| auth = construct_auth(PLPKS_OS_OWNER); |
| if (IS_ERR(auth)) |
| return PTR_ERR(auth); |
| |
| *output_len = input_len - PLPKS_WRAPPING_BUF_DIFF; |
| *output_buf = kzalloc(ALIGN(*output_len, PLPKS_WRAPPING_BUF_ALIGN), |
| GFP_KERNEL); |
| if (!(*output_buf)) { |
| pr_err("Output buffer allocation failed. Returning -ENOMEM."); |
| rc = -ENOMEM; |
| goto out; |
| } |
| |
| do { |
| rc = plpar_hcall9(H_PKS_UNWRAP_OBJECT, retbuf, |
| virt_to_phys(auth), objwrapflags, |
| virt_to_phys(*input_buf), input_len, |
| virt_to_phys(*output_buf), *output_len, |
| continuetoken); |
| |
| continuetoken = retbuf[0]; |
| pseries_status = rc; |
| rc = pseries_status_to_err(rc); |
| } while (rc == -EBUSY); |
| |
| if (rc) { |
| pr_err("H_PKS_UNWRAP_OBJECT failed. pseries_status=%d, rc=%d", |
| pseries_status, rc); |
| kfree(*output_buf); |
| *output_buf = NULL; |
| } else { |
| *output_len = retbuf[1]; |
| } |
| |
| out: |
| kfree(auth); |
| return rc; |
| } |
| EXPORT_SYMBOL_GPL(plpks_unwrap_object); |
| |
| /** |
| * plpks_read_os_var() - Fetch the data for the specified variable that is owned |
| * by the OS consumer. |
| * @var: variable to be read from the PLPKS |
| * |
| * The consumer or the owner of the object is the os kernel. The |
| * H_PKS_READ_OBJECT HCALL reads an object from the PLPKS. The caller must |
| * allocate the buffer var->data and specify the length for this buffer in |
| * var->datalen. If no buffer is provided, var->datalen will be populated with |
| * the requested object's size. |
| * |
| * Possible reasons for the returned errno values: |
| * |
| * -ENXIO if PLPKS is not supported |
| * -EIO if PLPKS access is blocked due to the LPAR's state |
| * if an error occurred while processing the request |
| * -EINVAL if invalid authorization parameter |
| * if invalid object label parameter |
| * if invalid object label len parameter |
| * if invalid output data parameter |
| * if invalid output data len parameter |
| * -EPERM if access is denied |
| * -ENOENT if the requested object was not found |
| * -EFBIG if the requested object couldn't be |
| * stored in the buffer provided |
| * -EBUSY if unable to handle the request |
| * |
| * Returns: On success 0 is returned, a negative errno if not. |
| */ |
| int plpks_read_os_var(struct plpks_var *var) |
| { |
| return plpks_read_var(PLPKS_OS_OWNER, var); |
| } |
| |
| /** |
| * plpks_read_fw_var() - Fetch the data for the specified variable that is |
| * owned by the firmware consumer. |
| * @var: variable to be read from the PLPKS |
| * |
| * The consumer or the owner of the object is the firmware. The |
| * H_PKS_READ_OBJECT HCALL reads an object from the PLPKS. The caller must |
| * allocate the buffer var->data and specify the length for this buffer in |
| * var->datalen. If no buffer is provided, var->datalen will be populated with |
| * the requested object's size. |
| * |
| * Possible reasons for the returned errno values: |
| * |
| * -ENXIO if PLPKS is not supported |
| * -EIO if PLPKS access is blocked due to the LPAR's state |
| * if an error occurred while processing the request |
| * -EINVAL if invalid authorization parameter |
| * if invalid object label parameter |
| * if invalid object label len parameter |
| * if invalid output data parameter |
| * if invalid output data len parameter |
| * -EPERM if access is denied |
| * -ENOENT if the requested object was not found |
| * -EFBIG if the requested object couldn't be |
| * stored in the buffer provided |
| * -EBUSY if unable to handle the request |
| * |
| * Returns: On success 0 is returned, a negative errno if not. |
| */ |
| int plpks_read_fw_var(struct plpks_var *var) |
| { |
| return plpks_read_var(PLPKS_FW_OWNER, var); |
| } |
| |
| /** |
| * plpks_read_bootloader_var() - Fetch the data for the specified variable |
| * owned by the bootloader consumer. |
| * @var: variable to be read from the PLPKS |
| * |
| * The consumer or the owner of the object is the bootloader. The |
| * H_PKS_READ_OBJECT HCALL reads an object from the PLPKS. The caller must |
| * allocate the buffer var->data and specify the length for this buffer in |
| * var->datalen. If no buffer is provided, var->datalen will be populated with |
| * the requested object's size. |
| * |
| * Possible reasons for the returned errno values: |
| * |
| * -ENXIO if PLPKS is not supported |
| * -EIO if PLPKS access is blocked due to the LPAR's state |
| * if an error occurred while processing the request |
| * -EINVAL if invalid authorization parameter |
| * if invalid object label parameter |
| * if invalid object label len parameter |
| * if invalid output data parameter |
| * if invalid output data len parameter |
| * -EPERM if access is denied |
| * -ENOENT if the requested object was not found |
| * -EFBIG if the requested object couldn't be |
| * stored in the buffer provided |
| * -EBUSY if unable to handle the request |
| * |
| * Returns: On success 0 is returned, a negative errno if not. |
| */ |
| int plpks_read_bootloader_var(struct plpks_var *var) |
| { |
| return plpks_read_var(PLPKS_BOOTLOADER_OWNER, var); |
| } |
| |
| /** |
| * plpks_populate_fdt(): Populates the FDT with the PLPKS password to prepare |
| * for kexec. |
| * @fdt: pointer to the device tree blob |
| * |
| * Upon confirming the existence of the chosen node, invoke fdt_setprop to |
| * populate the device tree with the PLPKS password in order to prepare for |
| * kexec. |
| * |
| * Returns: On success 0 is returned, a negative value if not. |
| */ |
| int plpks_populate_fdt(void *fdt) |
| { |
| int chosen_offset = fdt_path_offset(fdt, "/chosen"); |
| |
| if (chosen_offset < 0) { |
| pr_err("Can't find chosen node: %s\n", |
| fdt_strerror(chosen_offset)); |
| return chosen_offset; |
| } |
| |
| return fdt_setprop(fdt, chosen_offset, "ibm,plpks-pw", ospassword, ospasswordlength); |
| } |
| |
| /** |
| * plpks_early_init_devtree() - Retrieves and clears the PLPKS password from the |
| * DT in early init. |
| * |
| * Once a password is registered with the hypervisor it cannot be cleared |
| * without rebooting the LPAR, so to keep using the PLPKS across kexec boots we |
| * need to recover the previous password from the FDT. |
| * |
| * There are a few challenges here. We don't want the password to be visible to |
| * users, so we need to clear it from the FDT. This has to be done in early |
| * boot. Clearing it from the FDT would make the FDT's checksum invalid, so we |
| * have to manually cause the checksum to be recalculated. |
| */ |
| void __init plpks_early_init_devtree(void) |
| { |
| void *fdt = initial_boot_params; |
| int chosen_node = fdt_path_offset(fdt, "/chosen"); |
| const u8 *password; |
| int len; |
| |
| if (chosen_node < 0) |
| return; |
| |
| password = fdt_getprop(fdt, chosen_node, "ibm,plpks-pw", &len); |
| if (len <= 0) { |
| pr_debug("Couldn't find ibm,plpks-pw node.\n"); |
| return; |
| } |
| |
| ospassword = memblock_alloc_raw(len, SMP_CACHE_BYTES); |
| if (!ospassword) { |
| pr_err("Error allocating memory for password.\n"); |
| goto out; |
| } |
| |
| memcpy(ospassword, password, len); |
| ospasswordlength = (u16)len; |
| |
| out: |
| fdt_nop_property(fdt, chosen_node, "ibm,plpks-pw"); |
| // Since we've cleared the password, we must update the FDT checksum |
| early_init_dt_verify(fdt, __pa(fdt)); |
| } |
| |
| static __init int pseries_plpks_init(void) |
| { |
| int rc; |
| |
| if (!firmware_has_feature(FW_FEATURE_PLPKS)) |
| return -ENODEV; |
| |
| rc = _plpks_get_config(); |
| |
| if (rc) { |
| pr_err("POWER LPAR Platform KeyStore is not supported or enabled\n"); |
| return rc; |
| } |
| |
| rc = plpks_gen_password(); |
| if (rc) |
| pr_err("Failed setting POWER LPAR Platform KeyStore Password\n"); |
| else |
| pr_info("POWER LPAR Platform KeyStore initialized successfully\n"); |
| |
| return rc; |
| } |
| machine_arch_initcall(pseries, pseries_plpks_init); |