| // SPDX-License-Identifier: GPL-2.0-only |
| /* |
| * purgatory: Runs between two kernels |
| * |
| * Copyright (C) 2014 Red Hat Inc. |
| * |
| * Author: |
| * Vivek Goyal <vgoyal@redhat.com> |
| */ |
| |
| #include <linux/bug.h> |
| #include <crypto/sha.h> |
| #include <asm/purgatory.h> |
| |
| #include "../boot/string.h" |
| |
| unsigned long purgatory_backup_dest __section(.kexec-purgatory); |
| unsigned long purgatory_backup_src __section(.kexec-purgatory); |
| unsigned long purgatory_backup_sz __section(.kexec-purgatory); |
| |
| u8 purgatory_sha256_digest[SHA256_DIGEST_SIZE] __section(.kexec-purgatory); |
| |
| struct kexec_sha_region purgatory_sha_regions[KEXEC_SEGMENT_MAX] __section(.kexec-purgatory); |
| |
| /* |
| * On x86, second kernel requries first 640K of memory to boot. Copy |
| * first 640K to a backup region in reserved memory range so that second |
| * kernel can use first 640K. |
| */ |
| static int copy_backup_region(void) |
| { |
| if (purgatory_backup_dest) { |
| memcpy((void *)purgatory_backup_dest, |
| (void *)purgatory_backup_src, purgatory_backup_sz); |
| } |
| return 0; |
| } |
| |
| static int verify_sha256_digest(void) |
| { |
| struct kexec_sha_region *ptr, *end; |
| u8 digest[SHA256_DIGEST_SIZE]; |
| struct sha256_state sctx; |
| |
| sha256_init(&sctx); |
| end = purgatory_sha_regions + ARRAY_SIZE(purgatory_sha_regions); |
| |
| for (ptr = purgatory_sha_regions; ptr < end; ptr++) |
| sha256_update(&sctx, (uint8_t *)(ptr->start), ptr->len); |
| |
| sha256_final(&sctx, digest); |
| |
| if (memcmp(digest, purgatory_sha256_digest, sizeof(digest))) |
| return 1; |
| |
| return 0; |
| } |
| |
| void purgatory(void) |
| { |
| int ret; |
| |
| ret = verify_sha256_digest(); |
| if (ret) { |
| /* loop forever */ |
| for (;;) |
| ; |
| } |
| copy_backup_region(); |
| } |
| |
| /* |
| * Defined in order to reuse memcpy() and memset() from |
| * arch/x86/boot/compressed/string.c |
| */ |
| void warn(const char *msg) {} |