// SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
/* Copyright 2019 IBM Corp. */

#ifndef pr_fmt
#define pr_fmt(fmt) "SECVAR: " fmt
#endif

#include <stdlib.h>
#include <skiboot.h>
#include <opal.h>
#include <libstb/secureboot.h>
#include "secvar.h"
#include "secvar_devtree.h"

struct list_head variable_bank;
struct list_head update_bank;

int secvar_enabled = 0;	// Set to 1 if secvar is supported
int secvar_ready = 0;	// Set to 1 when base secvar inits correctly

// To be filled in by platform.secvar_init
struct secvar_storage_driver secvar_storage = {0};
struct secvar_backend_driver secvar_backend = {0};


int secvar_main(struct secvar_storage_driver storage_driver,
               struct secvar_backend_driver backend_driver)
{
	int rc = OPAL_UNSUPPORTED;

	prlog(PR_INFO, "Secure variables are supported, initializing secvar\n");

	secvar_storage = storage_driver;
	secvar_backend = backend_driver;

	secvar_init_devnode(secvar_backend.compatible);

	secvar_enabled = 1;

	list_head_init(&variable_bank);
	list_head_init(&update_bank);

	/*
	 * Failures here should indicate some kind of hardware problem,
	 * therefore we don't even attempt to continue
	 */
	rc = secvar_storage.store_init();
	if (rc)
		secureboot_enforce();

	rc = secvar_storage.load_bank(&variable_bank, SECVAR_VARIABLE_BANK);
	if (rc)
		goto fail;

	rc = secvar_storage.load_bank(&update_bank, SECVAR_UPDATE_BANK);
	if (rc)
		goto fail;

	/*
	 * At this point, base secvar is functional.
	 * In the event of some error, boot up to Petitboot in secure mode
	 * with an empty keyring, for an admin to attempt to debug.
	 */
	secvar_ready = 1;
	secvar_set_status("okay");

	if (secvar_backend.pre_process) {
		rc = secvar_backend.pre_process(&variable_bank, &update_bank);
		if (rc) {
			prlog(PR_ERR, "Error in backend pre_process = %d\n", rc);
			/* Early failure state, lock the storage */
			secvar_storage.lockdown();
			goto soft_fail;
		}
	}

	// Process is required, error if it doesn't exist
	if (!secvar_backend.process)
		goto soft_fail;

	/* Process variable updates from the update bank. */
	rc = secvar_backend.process(&variable_bank, &update_bank);

	/* Create and set the update-status device tree property */
	secvar_set_update_status(rc);

	/*
	 * Only write to the storage if we actually processed updates
	 * OPAL_EMPTY implies no updates were processed
	 * Refer to full table in doc/device-tree/ibm,opal/secvar.rst
	 */
	if (rc == OPAL_SUCCESS) {
		rc = secvar_storage.write_bank(&variable_bank, SECVAR_VARIABLE_BANK);
		if (rc)
			goto soft_fail;
	}
	/*
	 * Write (and probably clear) the update bank if .process() actually detected
	 * and handled updates in the update bank. Unlike above, this includes error
	 * cases, where the backend should probably be clearing the bank.
	 */
	if (rc != OPAL_EMPTY) {
		rc = secvar_storage.write_bank(&update_bank,
					       SECVAR_UPDATE_BANK);
		if (rc)
			goto soft_fail;
	}
	/* Unconditionally lock the storage at this point */
	secvar_storage.lockdown();

	if (secvar_backend.post_process) {
		rc = secvar_backend.post_process(&variable_bank, &update_bank);
		if (rc) {
			prlog(PR_ERR, "Error in backend post_process = %d\n", rc);
			goto soft_fail;
		}
	}

	prlog(PR_INFO, "secvar initialized successfully\n");

	return OPAL_SUCCESS;

fail:
	/* Early failure, base secvar support failed to initialize */
	secvar_set_status("fail");
	secvar_storage.lockdown();
	secvar_set_secure_mode();

	prerror("secvar failed to initialize, rc = %04x\n", rc);
	return rc;

soft_fail:
	/*
	 * Soft-failure, enforce secure boot with an empty keyring in
	 * bootloader for debug/recovery
	 */
	clear_bank_list(&variable_bank);
	clear_bank_list(&update_bank);
	secvar_storage.lockdown();
	secvar_set_secure_mode();

	prerror("secvar failed to initialize, rc = %04x\n", rc);
	return rc;
}