Blame view

kernel/kexec_elf.c 11.4 KB
175fca3bf   Sven Schnelle   kexec: add KEXEC_ELF
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
  // SPDX-License-Identifier: GPL-2.0-only
  /*
   * Load ELF vmlinux file for the kexec_file_load syscall.
   *
   * Copyright (C) 2004  Adam Litke (agl@us.ibm.com)
   * Copyright (C) 2004  IBM Corp.
   * Copyright (C) 2005  R Sharada (sharada@in.ibm.com)
   * Copyright (C) 2006  Mohan Kumar M (mohan@in.ibm.com)
   * Copyright (C) 2016  IBM Corporation
   *
   * Based on kexec-tools' kexec-elf-exec.c and kexec-elf-ppc64.c.
   * Heavily modified for the kernel by
   * Thiago Jung Bauermann <bauerman@linux.vnet.ibm.com>.
   */
  
  #define pr_fmt(fmt)	"kexec_elf: " fmt
  
  #include <linux/elf.h>
  #include <linux/kexec.h>
  #include <linux/module.h>
  #include <linux/slab.h>
  #include <linux/types.h>
175fca3bf   Sven Schnelle   kexec: add KEXEC_ELF
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  static inline bool elf_is_elf_file(const struct elfhdr *ehdr)
  {
  	return memcmp(ehdr->e_ident, ELFMAG, SELFMAG) == 0;
  }
  
  static uint64_t elf64_to_cpu(const struct elfhdr *ehdr, uint64_t value)
  {
  	if (ehdr->e_ident[EI_DATA] == ELFDATA2LSB)
  		value = le64_to_cpu(value);
  	else if (ehdr->e_ident[EI_DATA] == ELFDATA2MSB)
  		value = be64_to_cpu(value);
  
  	return value;
  }
d34e0ad3e   Sven Schnelle   kexec_elf: change...
37
  static uint32_t elf32_to_cpu(const struct elfhdr *ehdr, uint32_t value)
175fca3bf   Sven Schnelle   kexec: add KEXEC_ELF
38
39
  {
  	if (ehdr->e_ident[EI_DATA] == ELFDATA2LSB)
d34e0ad3e   Sven Schnelle   kexec_elf: change...
40
  		value = le32_to_cpu(value);
175fca3bf   Sven Schnelle   kexec: add KEXEC_ELF
41
  	else if (ehdr->e_ident[EI_DATA] == ELFDATA2MSB)
d34e0ad3e   Sven Schnelle   kexec_elf: change...
42
  		value = be32_to_cpu(value);
175fca3bf   Sven Schnelle   kexec: add KEXEC_ELF
43
44
45
  
  	return value;
  }
d34e0ad3e   Sven Schnelle   kexec_elf: change...
46
  static uint16_t elf16_to_cpu(const struct elfhdr *ehdr, uint16_t value)
175fca3bf   Sven Schnelle   kexec: add KEXEC_ELF
47
48
  {
  	if (ehdr->e_ident[EI_DATA] == ELFDATA2LSB)
d34e0ad3e   Sven Schnelle   kexec_elf: change...
49
  		value = le16_to_cpu(value);
175fca3bf   Sven Schnelle   kexec: add KEXEC_ELF
50
  	else if (ehdr->e_ident[EI_DATA] == ELFDATA2MSB)
d34e0ad3e   Sven Schnelle   kexec_elf: change...
51
  		value = be16_to_cpu(value);
175fca3bf   Sven Schnelle   kexec: add KEXEC_ELF
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
  
  	return value;
  }
  
  /**
   * elf_is_ehdr_sane - check that it is safe to use the ELF header
   * @buf_len:	size of the buffer in which the ELF file is loaded.
   */
  static bool elf_is_ehdr_sane(const struct elfhdr *ehdr, size_t buf_len)
  {
  	if (ehdr->e_phnum > 0 && ehdr->e_phentsize != sizeof(struct elf_phdr)) {
  		pr_debug("Bad program header size.
  ");
  		return false;
  	} else if (ehdr->e_shnum > 0 &&
  		   ehdr->e_shentsize != sizeof(struct elf_shdr)) {
  		pr_debug("Bad section header size.
  ");
  		return false;
  	} else if (ehdr->e_ident[EI_VERSION] != EV_CURRENT ||
  		   ehdr->e_version != EV_CURRENT) {
  		pr_debug("Unknown ELF version.
  ");
  		return false;
  	}
  
  	if (ehdr->e_phoff > 0 && ehdr->e_phnum > 0) {
  		size_t phdr_size;
  
  		/*
  		 * e_phnum is at most 65535 so calculating the size of the
  		 * program header cannot overflow.
  		 */
  		phdr_size = sizeof(struct elf_phdr) * ehdr->e_phnum;
  
  		/* Sanity check the program header table location. */
  		if (ehdr->e_phoff + phdr_size < ehdr->e_phoff) {
  			pr_debug("Program headers at invalid location.
  ");
  			return false;
  		} else if (ehdr->e_phoff + phdr_size > buf_len) {
  			pr_debug("Program headers truncated.
  ");
  			return false;
  		}
  	}
  
  	if (ehdr->e_shoff > 0 && ehdr->e_shnum > 0) {
  		size_t shdr_size;
  
  		/*
  		 * e_shnum is at most 65536 so calculating
  		 * the size of the section header cannot overflow.
  		 */
  		shdr_size = sizeof(struct elf_shdr) * ehdr->e_shnum;
  
  		/* Sanity check the section header table location. */
  		if (ehdr->e_shoff + shdr_size < ehdr->e_shoff) {
  			pr_debug("Section headers at invalid location.
  ");
  			return false;
  		} else if (ehdr->e_shoff + shdr_size > buf_len) {
  			pr_debug("Section headers truncated.
  ");
  			return false;
  		}
  	}
  
  	return true;
  }
  
  static int elf_read_ehdr(const char *buf, size_t len, struct elfhdr *ehdr)
  {
  	struct elfhdr *buf_ehdr;
  
  	if (len < sizeof(*buf_ehdr)) {
  		pr_debug("Buffer is too small to hold ELF header.
  ");
  		return -ENOEXEC;
  	}
  
  	memset(ehdr, 0, sizeof(*ehdr));
  	memcpy(ehdr->e_ident, buf, sizeof(ehdr->e_ident));
  	if (!elf_is_elf_file(ehdr)) {
  		pr_debug("No ELF header magic.
  ");
  		return -ENOEXEC;
  	}
  
  	if (ehdr->e_ident[EI_CLASS] != ELF_CLASS) {
  		pr_debug("Not a supported ELF class.
  ");
  		return -ENOEXEC;
  	} else  if (ehdr->e_ident[EI_DATA] != ELFDATA2LSB &&
  		ehdr->e_ident[EI_DATA] != ELFDATA2MSB) {
  		pr_debug("Not a supported ELF data format.
  ");
  		return -ENOEXEC;
  	}
  
  	buf_ehdr = (struct elfhdr *) buf;
  	if (elf16_to_cpu(ehdr, buf_ehdr->e_ehsize) != sizeof(*buf_ehdr)) {
  		pr_debug("Bad ELF header size.
  ");
  		return -ENOEXEC;
  	}
  
  	ehdr->e_type      = elf16_to_cpu(ehdr, buf_ehdr->e_type);
  	ehdr->e_machine   = elf16_to_cpu(ehdr, buf_ehdr->e_machine);
  	ehdr->e_version   = elf32_to_cpu(ehdr, buf_ehdr->e_version);
175fca3bf   Sven Schnelle   kexec: add KEXEC_ELF
162
163
164
165
166
167
  	ehdr->e_flags     = elf32_to_cpu(ehdr, buf_ehdr->e_flags);
  	ehdr->e_phentsize = elf16_to_cpu(ehdr, buf_ehdr->e_phentsize);
  	ehdr->e_phnum     = elf16_to_cpu(ehdr, buf_ehdr->e_phnum);
  	ehdr->e_shentsize = elf16_to_cpu(ehdr, buf_ehdr->e_shentsize);
  	ehdr->e_shnum     = elf16_to_cpu(ehdr, buf_ehdr->e_shnum);
  	ehdr->e_shstrndx  = elf16_to_cpu(ehdr, buf_ehdr->e_shstrndx);
ea46a13eb   Sven Schnelle   kexec_elf: suppor...
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
  	switch (ehdr->e_ident[EI_CLASS]) {
  	case ELFCLASS64:
  		ehdr->e_entry = elf64_to_cpu(ehdr, buf_ehdr->e_entry);
  		ehdr->e_phoff = elf64_to_cpu(ehdr, buf_ehdr->e_phoff);
  		ehdr->e_shoff = elf64_to_cpu(ehdr, buf_ehdr->e_shoff);
  		break;
  
  	case ELFCLASS32:
  		ehdr->e_entry = elf32_to_cpu(ehdr, buf_ehdr->e_entry);
  		ehdr->e_phoff = elf32_to_cpu(ehdr, buf_ehdr->e_phoff);
  		ehdr->e_shoff = elf32_to_cpu(ehdr, buf_ehdr->e_shoff);
  		break;
  
  	default:
  		pr_debug("Unknown ELF class.
  ");
  		return -EINVAL;
  	}
175fca3bf   Sven Schnelle   kexec: add KEXEC_ELF
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
  	return elf_is_ehdr_sane(ehdr, len) ? 0 : -ENOEXEC;
  }
  
  /**
   * elf_is_phdr_sane - check that it is safe to use the program header
   * @buf_len:	size of the buffer in which the ELF file is loaded.
   */
  static bool elf_is_phdr_sane(const struct elf_phdr *phdr, size_t buf_len)
  {
  
  	if (phdr->p_offset + phdr->p_filesz < phdr->p_offset) {
  		pr_debug("ELF segment location wraps around.
  ");
  		return false;
  	} else if (phdr->p_offset + phdr->p_filesz > buf_len) {
  		pr_debug("ELF segment not in file.
  ");
  		return false;
  	} else if (phdr->p_paddr + phdr->p_memsz < phdr->p_paddr) {
  		pr_debug("ELF segment address wraps around.
  ");
  		return false;
  	}
  
  	return true;
  }
  
  static int elf_read_phdr(const char *buf, size_t len,
  			 struct kexec_elf_info *elf_info,
  			 int idx)
  {
  	/* Override the const in proghdrs, we are the ones doing the loading. */
  	struct elf_phdr *phdr = (struct elf_phdr *) &elf_info->proghdrs[idx];
ea46a13eb   Sven Schnelle   kexec_elf: suppor...
219
  	const struct elfhdr *ehdr = elf_info->ehdr;
175fca3bf   Sven Schnelle   kexec: add KEXEC_ELF
220
221
222
223
224
225
226
  	const char *pbuf;
  	struct elf_phdr *buf_phdr;
  
  	pbuf = buf + elf_info->ehdr->e_phoff + (idx * sizeof(*buf_phdr));
  	buf_phdr = (struct elf_phdr *) pbuf;
  
  	phdr->p_type   = elf32_to_cpu(elf_info->ehdr, buf_phdr->p_type);
175fca3bf   Sven Schnelle   kexec: add KEXEC_ELF
227
  	phdr->p_flags  = elf32_to_cpu(elf_info->ehdr, buf_phdr->p_flags);
ea46a13eb   Sven Schnelle   kexec_elf: suppor...
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
  	switch (ehdr->e_ident[EI_CLASS]) {
  	case ELFCLASS64:
  		phdr->p_offset = elf64_to_cpu(ehdr, buf_phdr->p_offset);
  		phdr->p_paddr  = elf64_to_cpu(ehdr, buf_phdr->p_paddr);
  		phdr->p_vaddr  = elf64_to_cpu(ehdr, buf_phdr->p_vaddr);
  		phdr->p_filesz = elf64_to_cpu(ehdr, buf_phdr->p_filesz);
  		phdr->p_memsz  = elf64_to_cpu(ehdr, buf_phdr->p_memsz);
  		phdr->p_align  = elf64_to_cpu(ehdr, buf_phdr->p_align);
  		break;
  
  	case ELFCLASS32:
  		phdr->p_offset = elf32_to_cpu(ehdr, buf_phdr->p_offset);
  		phdr->p_paddr  = elf32_to_cpu(ehdr, buf_phdr->p_paddr);
  		phdr->p_vaddr  = elf32_to_cpu(ehdr, buf_phdr->p_vaddr);
  		phdr->p_filesz = elf32_to_cpu(ehdr, buf_phdr->p_filesz);
  		phdr->p_memsz  = elf32_to_cpu(ehdr, buf_phdr->p_memsz);
  		phdr->p_align  = elf32_to_cpu(ehdr, buf_phdr->p_align);
  		break;
  
  	default:
  		pr_debug("Unknown ELF class.
  ");
  		return -EINVAL;
  	}
175fca3bf   Sven Schnelle   kexec: add KEXEC_ELF
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
  
  	return elf_is_phdr_sane(phdr, len) ? 0 : -ENOEXEC;
  }
  
  /**
   * elf_read_phdrs - read the program headers from the buffer
   *
   * This function assumes that the program header table was checked for sanity.
   * Use elf_is_ehdr_sane() if it wasn't.
   */
  static int elf_read_phdrs(const char *buf, size_t len,
  			  struct kexec_elf_info *elf_info)
  {
  	size_t phdr_size, i;
  	const struct elfhdr *ehdr = elf_info->ehdr;
  
  	/*
  	 * e_phnum is at most 65535 so calculating the size of the
  	 * program header cannot overflow.
  	 */
  	phdr_size = sizeof(struct elf_phdr) * ehdr->e_phnum;
  
  	elf_info->proghdrs = kzalloc(phdr_size, GFP_KERNEL);
  	if (!elf_info->proghdrs)
  		return -ENOMEM;
  
  	for (i = 0; i < ehdr->e_phnum; i++) {
  		int ret;
  
  		ret = elf_read_phdr(buf, len, elf_info, i);
  		if (ret) {
  			kfree(elf_info->proghdrs);
  			elf_info->proghdrs = NULL;
  			return ret;
  		}
  	}
  
  	return 0;
  }
  
  /**
175fca3bf   Sven Schnelle   kexec: add KEXEC_ELF
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
   * elf_read_from_buffer - read ELF file and sets up ELF header and ELF info
   * @buf:	Buffer to read ELF file from.
   * @len:	Size of @buf.
   * @ehdr:	Pointer to existing struct which will be populated.
   * @elf_info:	Pointer to existing struct which will be populated.
   *
   * This function allows reading ELF files with different byte order than
   * the kernel, byte-swapping the fields as needed.
   *
   * Return:
   * On success returns 0, and the caller should call
   * kexec_free_elf_info(elf_info) to free the memory allocated for the section
   * and program headers.
   */
  static int elf_read_from_buffer(const char *buf, size_t len,
  				struct elfhdr *ehdr,
  				struct kexec_elf_info *elf_info)
  {
  	int ret;
  
  	ret = elf_read_ehdr(buf, len, ehdr);
  	if (ret)
  		return ret;
  
  	elf_info->buffer = buf;
  	elf_info->ehdr = ehdr;
  	if (ehdr->e_phoff > 0 && ehdr->e_phnum > 0) {
  		ret = elf_read_phdrs(buf, len, elf_info);
  		if (ret)
  			return ret;
  	}
175fca3bf   Sven Schnelle   kexec: add KEXEC_ELF
324
325
326
327
328
329
330
331
332
  	return 0;
  }
  
  /**
   * kexec_free_elf_info - free memory allocated by elf_read_from_buffer
   */
  void kexec_free_elf_info(struct kexec_elf_info *elf_info)
  {
  	kfree(elf_info->proghdrs);
175fca3bf   Sven Schnelle   kexec: add KEXEC_ELF
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
  	memset(elf_info, 0, sizeof(*elf_info));
  }
  /**
   * kexec_build_elf_info - read ELF executable and check that we can use it
   */
  int kexec_build_elf_info(const char *buf, size_t len, struct elfhdr *ehdr,
  			       struct kexec_elf_info *elf_info)
  {
  	int i;
  	int ret;
  
  	ret = elf_read_from_buffer(buf, len, ehdr, elf_info);
  	if (ret)
  		return ret;
  
  	/* Big endian vmlinux has type ET_DYN. */
  	if (ehdr->e_type != ET_EXEC && ehdr->e_type != ET_DYN) {
  		pr_err("Not an ELF executable.
  ");
  		goto error;
  	} else if (!elf_info->proghdrs) {
  		pr_err("No ELF program header.
  ");
  		goto error;
  	}
  
  	for (i = 0; i < ehdr->e_phnum; i++) {
  		/*
  		 * Kexec does not support loading interpreters.
  		 * In addition this check keeps us from attempting
  		 * to kexec ordinay executables.
  		 */
  		if (elf_info->proghdrs[i].p_type == PT_INTERP) {
  			pr_err("Requires an ELF interpreter.
  ");
  			goto error;
  		}
  	}
  
  	return 0;
  error:
  	kexec_free_elf_info(elf_info);
  	return -ENOEXEC;
  }
  
  
  int kexec_elf_probe(const char *buf, unsigned long len)
  {
  	struct elfhdr ehdr;
  	struct kexec_elf_info elf_info;
  	int ret;
  
  	ret = kexec_build_elf_info(buf, len, &ehdr, &elf_info);
  	if (ret)
  		return ret;
  
  	kexec_free_elf_info(&elf_info);
  
  	return elf_check_arch(&ehdr) ? 0 : -ENOEXEC;
  }
  
  /**
   * kexec_elf_load - load ELF executable image
   * @lowest_load_addr:	On return, will be the address where the first PT_LOAD
   *			section will be loaded in memory.
   *
   * Return:
   * 0 on success, negative value on failure.
   */
  int kexec_elf_load(struct kimage *image, struct elfhdr *ehdr,
  			 struct kexec_elf_info *elf_info,
  			 struct kexec_buf *kbuf,
  			 unsigned long *lowest_load_addr)
  {
571ceb7d9   Sven Schnelle   kexec_elf: remove...
407
  	unsigned long lowest_addr = UINT_MAX;
175fca3bf   Sven Schnelle   kexec: add KEXEC_ELF
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
  	int ret;
  	size_t i;
  
  	/* Read in the PT_LOAD segments. */
  	for (i = 0; i < ehdr->e_phnum; i++) {
  		unsigned long load_addr;
  		size_t size;
  		const struct elf_phdr *phdr;
  
  		phdr = &elf_info->proghdrs[i];
  		if (phdr->p_type != PT_LOAD)
  			continue;
  
  		size = phdr->p_filesz;
  		if (size > phdr->p_memsz)
  			size = phdr->p_memsz;
  
  		kbuf->buffer = (void *) elf_info->buffer + phdr->p_offset;
  		kbuf->bufsz = size;
  		kbuf->memsz = phdr->p_memsz;
  		kbuf->buf_align = phdr->p_align;
571ceb7d9   Sven Schnelle   kexec_elf: remove...
429
  		kbuf->buf_min = phdr->p_paddr;
175fca3bf   Sven Schnelle   kexec: add KEXEC_ELF
430
431
432
433
434
435
436
437
438
  		kbuf->mem = KEXEC_BUF_MEM_UNKNOWN;
  		ret = kexec_add_buffer(kbuf);
  		if (ret)
  			goto out;
  		load_addr = kbuf->mem;
  
  		if (load_addr < lowest_addr)
  			lowest_addr = load_addr;
  	}
175fca3bf   Sven Schnelle   kexec: add KEXEC_ELF
439
440
441
442
443
  	*lowest_load_addr = lowest_addr;
  	ret = 0;
   out:
  	return ret;
  }