Blame SOURCES/0007-backport-GH2694-secure-execution-enablement-s390x.patch

a98e04
From 00697be199c08242e54c02e4557e20834030aaf3 Mon Sep 17 00:00:00 2001
a98e04
From: Nikita Dubrovskii <nikita@linux.ibm.com>
a98e04
Date: Mon, 4 Apr 2022 16:09:50 +0200
a98e04
Subject: [PATCH 1/5] s390x: generate sd-boot at its own partition
a98e04
a98e04
Signed-off-by: Nikita Dubrovskii <nikita@linux.ibm.com>
a98e04
---
a98e04
 src/libostree/ostree-bootloader-zipl.c | 36 ++++++++++++++++++++++----
a98e04
 src/libostree/s390x-se-luks-gencpio    |  4 +--
a98e04
 2 files changed, 33 insertions(+), 7 deletions(-)
a98e04
a98e04
diff --git a/src/libostree/ostree-bootloader-zipl.c b/src/libostree/ostree-bootloader-zipl.c
a98e04
index 02c10826c3..fe024d8046 100644
a98e04
--- a/src/libostree/ostree-bootloader-zipl.c
a98e04
+++ b/src/libostree/ostree-bootloader-zipl.c
a98e04
@@ -21,12 +21,17 @@
a98e04
 #include "ostree-bootloader-zipl.h"
a98e04
 #include "ostree-deployment-private.h"
a98e04
 #include "otutil.h"
a98e04
+#include <sys/mount.h>
a98e04
+#include <sys/stat.h>
a98e04
 #include <string.h>
a98e04
 
a98e04
-#define SECURE_EXECUTION_BOOT_IMAGE     "/boot/sd-boot"
a98e04
+#define SECURE_EXECUTION_PARTITION      "/dev/disk/by-label/se"
a98e04
+#define SECURE_EXECUTION_MOUNTPOINT     "/sysroot/se"
a98e04
+#define SECURE_EXECUTION_BOOT_IMAGE     SECURE_EXECUTION_MOUNTPOINT "/sd-boot"
a98e04
 #define SECURE_EXECUTION_HOSTKEY_PATH   "/etc/se-hostkeys/"
a98e04
 #define SECURE_EXECUTION_HOSTKEY_PREFIX "ibm-z-hostkey"
a98e04
 #define SECURE_EXECUTION_LUKS_ROOT_KEY  "/etc/luks/root"
a98e04
+#define SECURE_EXECUTION_LUKS_BOOT_KEY  "/etc/luks/boot"
a98e04
 #define SECURE_EXECUTION_LUKS_CONFIG    "/etc/crypttab"
a98e04
 #define SECURE_EXECUTION_RAMDISK_TOOL   PKGLIBEXECDIR "/s390x-se-luks-gencpio"
a98e04
 
a98e04
@@ -67,6 +72,25 @@ _ostree_bootloader_zipl_get_name (OstreeBootloader *bootloader)
a98e04
   return "zipl";
a98e04
 }
a98e04
 
a98e04
+static gboolean
a98e04
+_ostree_secure_execution_mount(GError **error)
a98e04
+{
a98e04
+  const char *device = realpath (SECURE_EXECUTION_PARTITION, NULL);
a98e04
+  if (device == NULL)
a98e04
+    return glnx_throw_errno_prefix(error, "s390x SE: resolving %s", SECURE_EXECUTION_PARTITION);
a98e04
+  if (mount (device, SECURE_EXECUTION_MOUNTPOINT, "ext4", 0, NULL) < 0)
a98e04
+    return glnx_throw_errno_prefix (error, "s390x SE: Mounting %s", device);
a98e04
+  return TRUE;
a98e04
+}
a98e04
+
a98e04
+static gboolean
a98e04
+_ostree_secure_execution_umount(GError **error)
a98e04
+{
a98e04
+  if (umount (SECURE_EXECUTION_MOUNTPOINT) < 0)
a98e04
+    return glnx_throw_errno_prefix (error, "s390x SE: Unmounting %s", SECURE_EXECUTION_MOUNTPOINT);
a98e04
+  return TRUE;
a98e04
+}
a98e04
+
a98e04
 static gboolean
a98e04
 _ostree_bootloader_zipl_write_config (OstreeBootloader  *bootloader,
a98e04
                                           int                bootversion,
a98e04
@@ -152,8 +176,8 @@ _ostree_secure_execution_get_bls_config (OstreeBootloaderZipl *self,
a98e04
 static gboolean
a98e04
 _ostree_secure_execution_luks_key_exists (void)
a98e04
 {
a98e04
-  return (access(SECURE_EXECUTION_LUKS_ROOT_KEY, F_OK) == 0 &&
a98e04
-          access(SECURE_EXECUTION_LUKS_CONFIG, F_OK) == 0);
a98e04
+  return (access(SECURE_EXECUTION_LUKS_CONFIG, F_OK) == 0 &&
a98e04
+    (access(SECURE_EXECUTION_LUKS_ROOT_KEY, F_OK) == 0 || access(SECURE_EXECUTION_LUKS_BOOT_KEY, F_OK) == 0));
a98e04
 }
a98e04
 
a98e04
 static gboolean
a98e04
@@ -250,7 +274,7 @@ static gboolean
a98e04
 _ostree_secure_execution_call_zipl (GError **error)
a98e04
 {
a98e04
   int status = 0;
a98e04
-  const char *const zipl_argv[] = {"zipl", "-V", "-t", "/boot", "-i", SECURE_EXECUTION_BOOT_IMAGE, NULL};
a98e04
+  const char *const zipl_argv[] = {"zipl", "-V", "-t", SECURE_EXECUTION_MOUNTPOINT, "-i", SECURE_EXECUTION_BOOT_IMAGE, NULL};
a98e04
   if (!g_spawn_sync (NULL, (char**)zipl_argv, NULL, G_SPAWN_SEARCH_PATH,
a98e04
                        NULL, NULL, NULL, NULL, &status, error))
a98e04
     return glnx_prefix_error(error, "s390x SE: spawning zipl");
a98e04
@@ -274,9 +298,11 @@ _ostree_secure_execution_enable (OstreeBootloaderZipl *self,
a98e04
   g_autofree gchar* options = NULL;
a98e04
 
a98e04
   gboolean rc =
a98e04
+      _ostree_secure_execution_mount (error) &&
a98e04
       _ostree_secure_execution_get_bls_config (self, bootversion, &vmlinuz, &initramfs, &options, cancellable, error) &&
a98e04
       _ostree_secure_execution_generate_sdboot (vmlinuz, initramfs, options, keys, error) &&
a98e04
-      _ostree_secure_execution_call_zipl (error);
a98e04
+      _ostree_secure_execution_call_zipl (error) &&
a98e04
+      _ostree_secure_execution_umount (error);
a98e04
 
a98e04
   return rc;
a98e04
 }
a98e04
diff --git a/src/libostree/s390x-se-luks-gencpio b/src/libostree/s390x-se-luks-gencpio
a98e04
index f0ad24eb32..7d62258a31 100755
a98e04
--- a/src/libostree/s390x-se-luks-gencpio
a98e04
+++ b/src/libostree/s390x-se-luks-gencpio
a98e04
@@ -12,11 +12,11 @@ gzip -cd ${old_initrd} | cpio -imd --quiet
a98e04
 
a98e04
 # Adding LUKS root key and crypttab config
a98e04
 mkdir -p etc/luks
a98e04
-cp -f /etc/luks/root etc/luks/
a98e04
+cp -f /etc/luks/* etc/luks/
a98e04
 cp -f /etc/crypttab etc/
a98e04
 
a98e04
 # Creating new initramdisk image
a98e04
-find . | cpio --quiet -H newc -o | gzip -9 -n >> ${new_initrd}
a98e04
+find . -mindepth 1 | cpio --quiet -H newc -o | gzip -9 -n >> ${new_initrd}
a98e04
 
a98e04
 # Cleanup
a98e04
 rm -rf ${workdir}
a98e04
a98e04
From 91e71022ebc2422f278c285e55f4c88d7f572eeb Mon Sep 17 00:00:00 2001
a98e04
From: Nikita Dubrovskii <nikita@linux.ibm.com>
a98e04
Date: Mon, 23 May 2022 17:28:54 +0200
a98e04
Subject: [PATCH 2/5] s390x: ensure SecureExecution is enabled before sd-boot
a98e04
 generation
a98e04
a98e04
Signed-off-by: Nikita Dubrovskii <nikita@linux.ibm.com>
a98e04
---
a98e04
 src/libostree/ostree-bootloader-zipl.c | 24 ++++++++++++++++++------
a98e04
 1 file changed, 18 insertions(+), 6 deletions(-)
a98e04
a98e04
diff --git a/src/libostree/ostree-bootloader-zipl.c b/src/libostree/ostree-bootloader-zipl.c
a98e04
index fe024d8046..348dfe036d 100644
a98e04
--- a/src/libostree/ostree-bootloader-zipl.c
a98e04
+++ b/src/libostree/ostree-bootloader-zipl.c
a98e04
@@ -25,6 +25,7 @@
a98e04
 #include <sys/stat.h>
a98e04
 #include <string.h>
a98e04
 
a98e04
+#define SECURE_EXECUTION_SYSFS_FLAG     "/sys/firmware/uv/prot_virt_guest"
a98e04
 #define SECURE_EXECUTION_PARTITION      "/dev/disk/by-label/se"
a98e04
 #define SECURE_EXECUTION_MOUNTPOINT     "/sysroot/se"
a98e04
 #define SECURE_EXECUTION_BOOT_IMAGE     SECURE_EXECUTION_MOUNTPOINT "/sd-boot"
a98e04
@@ -109,6 +110,14 @@ _ostree_bootloader_zipl_write_config (OstreeBootloader  *bootloader,
a98e04
   return TRUE;
a98e04
 }
a98e04
 
a98e04
+static gboolean _ostree_secure_execution_is_enabled (GCancellable *cancellable) {
a98e04
+  gsize len = 0;
a98e04
+  g_autofree char *data = glnx_file_get_contents_utf8_at (-1, SECURE_EXECUTION_SYSFS_FLAG, &len, cancellable, NULL);
a98e04
+  if (!data)
a98e04
+    return FALSE;
a98e04
+  return strstr (data, "1") != NULL;
a98e04
+}
a98e04
+
a98e04
 static gboolean
a98e04
 _ostree_secure_execution_get_keys (GPtrArray **keys,
a98e04
                                    GCancellable *cancellable,
a98e04
@@ -329,12 +338,15 @@ _ostree_bootloader_zipl_post_bls_sync (OstreeBootloader  *bootloader,
a98e04
     return TRUE;
a98e04
 
a98e04
   /* Try with Secure Execution */
a98e04
-  g_autoptr(GPtrArray) keys = NULL;
a98e04
-  if (!_ostree_secure_execution_get_keys (&keys, cancellable, error))
a98e04
-    return FALSE;
a98e04
-  if (keys && keys->len)
a98e04
-    return _ostree_secure_execution_enable (self, bootversion, keys, cancellable, error);
a98e04
-
a98e04
+  if ( _ostree_secure_execution_is_enabled (cancellable) )
a98e04
+    {
a98e04
+      g_autoptr(GPtrArray) keys = NULL;
a98e04
+      if (!_ostree_secure_execution_get_keys (&keys, cancellable, error))
a98e04
+        return FALSE;
a98e04
+      if (!keys || keys->len == 0)
a98e04
+          return glnx_throw (error, "s390x SE: no keys");
a98e04
+      return _ostree_secure_execution_enable (self, bootversion, keys, cancellable, error);
a98e04
+    }
a98e04
   /* Fallback to non-SE setup */
a98e04
   const char *const zipl_argv[] = {"zipl", NULL};
a98e04
   int estatus;
a98e04
a98e04
From 2e2854239189044cc1ffd100959b7c7bfe92b0f9 Mon Sep 17 00:00:00 2001
a98e04
From: Nikita Dubrovskii <nikita@linux.ibm.com>
a98e04
Date: Tue, 24 May 2022 19:30:35 +0200
a98e04
Subject: [PATCH 3/5] s390x: fail on error during reading of SecureExecution
a98e04
 sysfs flag
a98e04
a98e04
---
a98e04
 src/libostree/ostree-bootloader-zipl.c | 24 ++++++++++++++++++------
a98e04
 1 file changed, 18 insertions(+), 6 deletions(-)
a98e04
a98e04
diff --git a/src/libostree/ostree-bootloader-zipl.c b/src/libostree/ostree-bootloader-zipl.c
a98e04
index 348dfe036d..87b9b67aec 100644
a98e04
--- a/src/libostree/ostree-bootloader-zipl.c
a98e04
+++ b/src/libostree/ostree-bootloader-zipl.c
a98e04
@@ -110,12 +110,21 @@ _ostree_bootloader_zipl_write_config (OstreeBootloader  *bootloader,
a98e04
   return TRUE;
a98e04
 }
a98e04
 
a98e04
-static gboolean _ostree_secure_execution_is_enabled (GCancellable *cancellable) {
a98e04
-  gsize len = 0;
a98e04
-  g_autofree char *data = glnx_file_get_contents_utf8_at (-1, SECURE_EXECUTION_SYSFS_FLAG, &len, cancellable, NULL);
a98e04
+static gboolean _ostree_secure_execution_is_enabled (gboolean *out_enabled,
a98e04
+                                                     GCancellable *cancellable,
a98e04
+                                                     GError **error)
a98e04
+{
a98e04
+  *out_enabled = FALSE;
a98e04
+  glnx_autofd int fd = -1;
a98e04
+  if (!ot_openat_ignore_enoent (AT_FDCWD, SECURE_EXECUTION_SYSFS_FLAG, &fd, error))
a98e04
+    return FALSE;
a98e04
+  if (fd == -1)
a98e04
+    return TRUE; //ENOENT --> SecureExecution is disabled
a98e04
+  g_autofree char *data = glnx_fd_readall_utf8 (fd, NULL, cancellable, error);
a98e04
   if (!data)
a98e04
     return FALSE;
a98e04
-  return strstr (data, "1") != NULL;
a98e04
+  *out_enabled = strstr (data, "1") != NULL;
a98e04
+  return TRUE;
a98e04
 }
a98e04
 
a98e04
 static gboolean
a98e04
@@ -338,13 +347,16 @@ _ostree_bootloader_zipl_post_bls_sync (OstreeBootloader  *bootloader,
a98e04
     return TRUE;
a98e04
 
a98e04
   /* Try with Secure Execution */
a98e04
-  if ( _ostree_secure_execution_is_enabled (cancellable) )
a98e04
+  gboolean se_enabled = FALSE;
a98e04
+  if ( !_ostree_secure_execution_is_enabled (&se_enabled, cancellable, error))
a98e04
+    return FALSE;
a98e04
+  if (se_enabled)
a98e04
     {
a98e04
       g_autoptr(GPtrArray) keys = NULL;
a98e04
       if (!_ostree_secure_execution_get_keys (&keys, cancellable, error))
a98e04
         return FALSE;
a98e04
       if (!keys || keys->len == 0)
a98e04
-          return glnx_throw (error, "s390x SE: no keys");
a98e04
+        return glnx_throw (error, "s390x SE: no keys");
a98e04
       return _ostree_secure_execution_enable (self, bootversion, keys, cancellable, error);
a98e04
     }
a98e04
   /* Fallback to non-SE setup */
a98e04
a98e04
From 89ed46e8a9f584e2a6c1966fbf4c99f0fe51424e Mon Sep 17 00:00:00 2001
a98e04
From: Nikita Dubrovskii <nikita@linux.ibm.com>
a98e04
Date: Fri, 27 May 2022 09:13:18 +0200
a98e04
Subject: [PATCH 4/5] s390x: do not unpack existing initrd, just append LUKS
a98e04
 keys to its copy
a98e04
a98e04
Signed-off-by: Nikita Dubrovskii <nikita@linux.ibm.com>
a98e04
---
a98e04
 src/libostree/s390x-se-luks-gencpio | 12 ++++++------
a98e04
 1 file changed, 6 insertions(+), 6 deletions(-)
a98e04
a98e04
diff --git a/src/libostree/s390x-se-luks-gencpio b/src/libostree/s390x-se-luks-gencpio
a98e04
index 7d62258a31..f444198a40 100755
a98e04
--- a/src/libostree/s390x-se-luks-gencpio
a98e04
+++ b/src/libostree/s390x-se-luks-gencpio
a98e04
@@ -4,19 +4,19 @@ set -euo pipefail
a98e04
 
a98e04
 old_initrd=$1
a98e04
 new_initrd=$2
a98e04
+currdir=$PWD
a98e04
 
a98e04
-# Unpacking existing initramdisk
a98e04
+# Copying existing initramdisk
a98e04
+cp ${old_initrd} ${new_initrd}
a98e04
+
a98e04
+# Appending LUKS root keys and crypttab config to the end of initrd
a98e04
 workdir=$(mktemp -d -p /tmp se-initramfs-XXXXXX)
a98e04
 cd ${workdir}
a98e04
-gzip -cd ${old_initrd} | cpio -imd --quiet
a98e04
-
a98e04
-# Adding LUKS root key and crypttab config
a98e04
 mkdir -p etc/luks
a98e04
 cp -f /etc/luks/* etc/luks/
a98e04
 cp -f /etc/crypttab etc/
a98e04
-
a98e04
-# Creating new initramdisk image
a98e04
 find . -mindepth 1 | cpio --quiet -H newc -o | gzip -9 -n >> ${new_initrd}
a98e04
 
a98e04
 # Cleanup
a98e04
+cd ${currdir}
a98e04
 rm -rf ${workdir}
a98e04
a98e04
From 2c8d5b95c7f2fee90e73bdd9222e002c44e797b7 Mon Sep 17 00:00:00 2001
a98e04
From: Nikita Dubrovskii <nikita@linux.ibm.com>
a98e04
Date: Thu, 23 Jun 2022 15:54:04 +0200
a98e04
Subject: [PATCH 5/5] s390x: rename sd-boot to sdboot
a98e04
a98e04
Signed-off-by: Nikita Dubrovskii <nikita@linux.ibm.com>
a98e04
---
a98e04
 src/libostree/ostree-bootloader-zipl.c | 2 +-
a98e04
 1 file changed, 1 insertion(+), 1 deletion(-)
a98e04
a98e04
diff --git a/src/libostree/ostree-bootloader-zipl.c b/src/libostree/ostree-bootloader-zipl.c
a98e04
index 87b9b67aec..0ff350f942 100644
a98e04
--- a/src/libostree/ostree-bootloader-zipl.c
a98e04
+++ b/src/libostree/ostree-bootloader-zipl.c
a98e04
@@ -28,7 +28,7 @@
a98e04
 #define SECURE_EXECUTION_SYSFS_FLAG     "/sys/firmware/uv/prot_virt_guest"
a98e04
 #define SECURE_EXECUTION_PARTITION      "/dev/disk/by-label/se"
a98e04
 #define SECURE_EXECUTION_MOUNTPOINT     "/sysroot/se"
a98e04
-#define SECURE_EXECUTION_BOOT_IMAGE     SECURE_EXECUTION_MOUNTPOINT "/sd-boot"
a98e04
+#define SECURE_EXECUTION_BOOT_IMAGE     SECURE_EXECUTION_MOUNTPOINT "/sdboot"
a98e04
 #define SECURE_EXECUTION_HOSTKEY_PATH   "/etc/se-hostkeys/"
a98e04
 #define SECURE_EXECUTION_HOSTKEY_PREFIX "ibm-z-hostkey"
a98e04
 #define SECURE_EXECUTION_LUKS_ROOT_KEY  "/etc/luks/root"