Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp1391902pxb; Fri, 13 Nov 2020 11:24:51 -0800 (PST) X-Google-Smtp-Source: ABdhPJxwwge/ztKWWiLPjwU4VL6lzer7BRiRvrlsZtww031BzMHDF84X9ZDCbPjNgDBa1CIX4SJw X-Received: by 2002:a17:906:82d7:: with SMTP id a23mr3359690ejy.505.1605295490964; Fri, 13 Nov 2020 11:24:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605295490; cv=none; d=google.com; s=arc-20160816; b=SRbrsQCmtxsP/i0xugk81FAOrj1B+iNc/U2GiJG1ChpfVDJNxCXcKUuTUDP/kcmnMZ RsExKOshl7o8/3J6yCRc6BMtyqVdAvldn+wCb0Ry2LkeqjQN56eQF/kgFdEugHzny8jC N4diiItLTvMPFCKEQkmeoAmFBzI20w9YvrV3AY4nS1da6DyjYHHH68j3OpE+xtIU8jhv EY+xieieM+pq52xZ8f50IfU8mCMIT3zBOi4/IQunvHPz3KB4LQdkGfaU74r1q5t7ksTF ny2MLMrInpx0/zwpB/SYCP91+EYHKtbx3y8ylbtNv8W8V3Igj0OCl2I3P95t4nHy8Q6L sMrg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature:dkim-filter; bh=E65rSNEs2YmfUHqh/GcM7UxWVoI5rH2mbnkR7MkuBzc=; b=iEJnt/JSfhhundjFs4JKh+zEdGSvkjyy6DNe6z93/jp5PN9t67jW2osB1DMxS91iN8 UOMygbrgGJDbP82g79GpI/eLrPxi9j2XyIlFZY8iMradSzM7ANwNKbuv//VsEj5W06Bb QqPMPt76/fzEUpwDL041GZeiUrnFYjdBiNoSv3F/FQ0ZdMy6P0IErIi7Cjl5lAFAY/gb aCC57aPGeoHY/AKMhCk6CkGXmQ4zNYNUWJbZcxYqAWGNH2TNX5zhJf7bgAgSsXlYSClL lsynaIpjGL1aKBu0yPzCdX+BACmi4ehWo5vfZLp4hHa1cdJRNN3uuXHBvAESes9O21ml a86A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=f1lXDyVM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i20si7147555edy.320.2020.11.13.11.24.28; Fri, 13 Nov 2020 11:24:50 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=f1lXDyVM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726394AbgKMTXD (ORCPT + 99 others); Fri, 13 Nov 2020 14:23:03 -0500 Received: from linux.microsoft.com ([13.77.154.182]:48962 "EHLO linux.microsoft.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726336AbgKMTWz (ORCPT ); Fri, 13 Nov 2020 14:22:55 -0500 Received: from localhost.localdomain (c-73-42-176-67.hsd1.wa.comcast.net [73.42.176.67]) by linux.microsoft.com (Postfix) with ESMTPSA id 4053820C28CF; Fri, 13 Nov 2020 11:22:54 -0800 (PST) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 4053820C28CF DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1605295374; bh=E65rSNEs2YmfUHqh/GcM7UxWVoI5rH2mbnkR7MkuBzc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=f1lXDyVMtVFA2CUGEnPXGcov3tXHTTMaSaOun/s7Mw24Sy+3vqFqv6g3P3sBQCCqU xLPrTOJ23JDIcWosSrcpNmxUYl6fsQzwycCTM70Wzz2pbwCvb0U96Or/hFHNoFE/Ll e4ZlRmGbwbFceCllU1kVKl7K33r1KBEPS3xah0iQ= From: Lakshmi Ramasubramanian To: zohar@linux.ibm.com, bauerman@linux.ibm.com, robh@kernel.org, gregkh@linuxfoundation.org, james.morse@arm.com, catalin.marinas@arm.com, sashal@kernel.org, will@kernel.org, mpe@ellerman.id.au, benh@kernel.crashing.org, paulus@samba.org, robh+dt@kernel.org, frowand.list@gmail.com, vincenzo.frascino@arm.com, mark.rutland@arm.com, dmitry.kasatkin@gmail.com, jmorris@namei.org, serge@hallyn.com, pasha.tatashin@soleen.com, allison@lohutok.net, kstewart@linuxfoundation.org, takahiro.akashi@linaro.org, tglx@linutronix.de, masahiroy@kernel.org, bhsharma@redhat.com, mbrugger@suse.com, hsinyi@chromium.org, tao.li@vivo.com, christophe.leroy@c-s.fr Cc: linux-integrity@vger.kernel.org, linux-kernel@vger.kernel.org, devicetree@vger.kernel.org, prsriva@linux.microsoft.com, balajib@linux.microsoft.com Subject: [PATCH v9 8/8] arm64: Add IMA kexec buffer to DTB Date: Fri, 13 Nov 2020 11:22:43 -0800 Message-Id: <20201113192243.1993-9-nramas@linux.microsoft.com> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201113192243.1993-1-nramas@linux.microsoft.com> References: <20201113192243.1993-1-nramas@linux.microsoft.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Any existing "linux,ima-kexec-buffer" property in the device tree needs to be removed and its corresponding memory reservation in the currently running kernel needs to be freed. The address and size of the current kernel's IMA measurement log need to be added to the device tree's IMA kexec buffer node and memory for the buffer needs to be reserved for the log to be carried over to the next kernel on the kexec call. Remove any existing "linux,ima-kexec-buffer" property in the device tree and free the corresponding memory reservation in the currently running kernel. Add "linux,ima-kexec-buffer" property to the device tree and reserve the memory for storing the IMA log that needs to be passed from the current kernel to the next one. Update CONFIG_KEXEC_FILE to select CONFIG_HAVE_IMA_KEXEC to indicate that the IMA measurement log information is present in the device tree for ARM64. Co-developed-by: Prakhar Srivastava Signed-off-by: Prakhar Srivastava Signed-off-by: Lakshmi Ramasubramanian Reviewed-by: Thiago Jung Bauermann --- arch/arm64/Kconfig | 1 + arch/arm64/kernel/machine_kexec_file.c | 18 ++++++++++++++++++ 2 files changed, 19 insertions(+) diff --git a/arch/arm64/Kconfig b/arch/arm64/Kconfig index 1515f6f153a0..bcca4a467eda 100644 --- a/arch/arm64/Kconfig +++ b/arch/arm64/Kconfig @@ -1094,6 +1094,7 @@ config KEXEC config KEXEC_FILE bool "kexec file based system call" select KEXEC_CORE + select HAVE_IMA_KEXEC help This is new version of kexec system call. This system call is file based and takes file descriptors as system call argument diff --git a/arch/arm64/kernel/machine_kexec_file.c b/arch/arm64/kernel/machine_kexec_file.c index 03210f644790..0a492bab29ae 100644 --- a/arch/arm64/kernel/machine_kexec_file.c +++ b/arch/arm64/kernel/machine_kexec_file.c @@ -21,6 +21,7 @@ #include #include #include +#include #include /* relevant device tree properties */ @@ -62,6 +63,8 @@ static int setup_dtb(struct kimage *image, off = ret; + remove_ima_buffer(dtb, ret); + ret = fdt_delprop(dtb, off, FDT_PROP_KEXEC_ELFHDR); if (ret && ret != -FDT_ERR_NOTFOUND) goto out; @@ -136,6 +139,21 @@ static int setup_dtb(struct kimage *image, FDT_PROP_KASLR_SEED); } + /* add ima-kexec-buffer */ + if (image->arch.ima_buffer_size > 0) { + ret = fdt_appendprop_addrrange(dtb, 0, off, + "linux,ima-kexec-buffer", + image->arch.ima_buffer_addr, + image->arch.ima_buffer_size); + if (ret) + return (ret == -FDT_ERR_NOSPACE ? -ENOMEM : -EINVAL); + + ret = fdt_add_mem_rsv(dtb, image->arch.ima_buffer_addr, + image->arch.ima_buffer_size); + if (ret) + goto out; + } + /* add rng-seed */ if (rng_is_initialized()) { void *rng_seed; -- 2.29.2