blob: 759d8ef4112c8ae7bf659626b0e704ec7a4ea710 [file] [log] [blame]
// SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
/* Copyright 2019 IBM Corp. */
#ifndef pr_fmt
#define pr_fmt(fmt) "SECVAR: " fmt
#endif
#include <stdlib.h>
#include <skiboot.h>
#include <opal.h>
#include <libstb/secureboot.h>
#include "secvar.h"
#include "secvar_devtree.h"
struct list_head variable_bank;
struct list_head update_bank;
int secvar_enabled = 0; // Set to 1 if secvar is supported
int secvar_ready = 0; // Set to 1 when base secvar inits correctly
// To be filled in by platform.secvar_init
struct secvar_storage_driver secvar_storage = {0};
struct secvar_backend_driver secvar_backend = {0};
int secvar_main(struct secvar_storage_driver storage_driver,
struct secvar_backend_driver backend_driver)
{
int rc = OPAL_UNSUPPORTED;
prlog(PR_INFO, "Secure variables are supported, initializing secvar\n");
secvar_storage = storage_driver;
secvar_backend = backend_driver;
secvar_init_devnode(secvar_backend.compatible);
secvar_enabled = 1;
list_head_init(&variable_bank);
list_head_init(&update_bank);
/*
* Failures here should indicate some kind of hardware problem,
* therefore we don't even attempt to continue
*/
rc = secvar_storage.store_init();
if (rc)
secureboot_enforce();
rc = secvar_storage.load_bank(&variable_bank, SECVAR_VARIABLE_BANK);
if (rc)
goto fail;
rc = secvar_storage.load_bank(&update_bank, SECVAR_UPDATE_BANK);
if (rc)
goto fail;
/*
* At this point, base secvar is functional.
* In the event of some error, boot up to Petitboot in secure mode
* with an empty keyring, for an admin to attempt to debug.
*/
secvar_ready = 1;
secvar_set_status("okay");
if (secvar_backend.pre_process) {
rc = secvar_backend.pre_process(&variable_bank, &update_bank);
if (rc) {
prlog(PR_ERR, "Error in backend pre_process = %d\n", rc);
/* Early failure state, lock the storage */
secvar_storage.lockdown();
goto soft_fail;
}
}
// Process is required, error if it doesn't exist
if (!secvar_backend.process)
goto soft_fail;
/* Process variable updates from the update bank. */
rc = secvar_backend.process(&variable_bank, &update_bank);
/* Create and set the update-status device tree property */
secvar_set_update_status(rc);
/*
* Only write to the storage if we actually processed updates
* OPAL_EMPTY implies no updates were processed
* Refer to full table in doc/device-tree/ibm,opal/secvar.rst
*/
if (rc == OPAL_SUCCESS) {
rc = secvar_storage.write_bank(&variable_bank, SECVAR_VARIABLE_BANK);
if (rc)
goto soft_fail;
}
/*
* Write (and probably clear) the update bank if .process() actually detected
* and handled updates in the update bank. Unlike above, this includes error
* cases, where the backend should probably be clearing the bank.
*/
if (rc != OPAL_EMPTY) {
rc = secvar_storage.write_bank(&update_bank,
SECVAR_UPDATE_BANK);
if (rc)
goto soft_fail;
}
/* Unconditionally lock the storage at this point */
secvar_storage.lockdown();
if (secvar_backend.post_process) {
rc = secvar_backend.post_process(&variable_bank, &update_bank);
if (rc) {
prlog(PR_ERR, "Error in backend post_process = %d\n", rc);
goto soft_fail;
}
}
prlog(PR_INFO, "secvar initialized successfully\n");
return OPAL_SUCCESS;
fail:
/* Early failure, base secvar support failed to initialize */
secvar_set_status("fail");
secvar_storage.lockdown();
secvar_set_secure_mode();
prerror("secvar failed to initialize, rc = %04x\n", rc);
return rc;
soft_fail:
/*
* Soft-failure, enforce secure boot with an empty keyring in
* bootloader for debug/recovery
*/
clear_bank_list(&variable_bank);
clear_bank_list(&update_bank);
secvar_storage.lockdown();
secvar_set_secure_mode();
prerror("secvar failed to initialize, rc = %04x\n", rc);
return rc;
}