xref: /OK3568_Linux_fs/kernel/arch/s390/boot/ipl_report.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0
2*4882a593Smuzhiyun #include <linux/init.h>
3*4882a593Smuzhiyun #include <linux/ctype.h>
4*4882a593Smuzhiyun #include <asm/ebcdic.h>
5*4882a593Smuzhiyun #include <asm/sclp.h>
6*4882a593Smuzhiyun #include <asm/sections.h>
7*4882a593Smuzhiyun #include <asm/boot_data.h>
8*4882a593Smuzhiyun #include <uapi/asm/ipl.h>
9*4882a593Smuzhiyun #include "boot.h"
10*4882a593Smuzhiyun 
11*4882a593Smuzhiyun int __bootdata_preserved(ipl_secure_flag);
12*4882a593Smuzhiyun 
13*4882a593Smuzhiyun unsigned long __bootdata_preserved(ipl_cert_list_addr);
14*4882a593Smuzhiyun unsigned long __bootdata_preserved(ipl_cert_list_size);
15*4882a593Smuzhiyun 
16*4882a593Smuzhiyun unsigned long __bootdata(early_ipl_comp_list_addr);
17*4882a593Smuzhiyun unsigned long __bootdata(early_ipl_comp_list_size);
18*4882a593Smuzhiyun 
19*4882a593Smuzhiyun #define for_each_rb_entry(entry, rb) \
20*4882a593Smuzhiyun 	for (entry = rb->entries; \
21*4882a593Smuzhiyun 	     (void *) entry + sizeof(*entry) <= (void *) rb + rb->len; \
22*4882a593Smuzhiyun 	     entry++)
23*4882a593Smuzhiyun 
intersects(unsigned long addr0,unsigned long size0,unsigned long addr1,unsigned long size1)24*4882a593Smuzhiyun static inline bool intersects(unsigned long addr0, unsigned long size0,
25*4882a593Smuzhiyun 			      unsigned long addr1, unsigned long size1)
26*4882a593Smuzhiyun {
27*4882a593Smuzhiyun 	return addr0 + size0 > addr1 && addr1 + size1 > addr0;
28*4882a593Smuzhiyun }
29*4882a593Smuzhiyun 
find_bootdata_space(struct ipl_rb_components * comps,struct ipl_rb_certificates * certs,unsigned long safe_addr)30*4882a593Smuzhiyun static unsigned long find_bootdata_space(struct ipl_rb_components *comps,
31*4882a593Smuzhiyun 					 struct ipl_rb_certificates *certs,
32*4882a593Smuzhiyun 					 unsigned long safe_addr)
33*4882a593Smuzhiyun {
34*4882a593Smuzhiyun 	struct ipl_rb_certificate_entry *cert;
35*4882a593Smuzhiyun 	struct ipl_rb_component_entry *comp;
36*4882a593Smuzhiyun 	size_t size;
37*4882a593Smuzhiyun 
38*4882a593Smuzhiyun 	/*
39*4882a593Smuzhiyun 	 * Find the length for the IPL report boot data
40*4882a593Smuzhiyun 	 */
41*4882a593Smuzhiyun 	early_ipl_comp_list_size = 0;
42*4882a593Smuzhiyun 	for_each_rb_entry(comp, comps)
43*4882a593Smuzhiyun 		early_ipl_comp_list_size += sizeof(*comp);
44*4882a593Smuzhiyun 	ipl_cert_list_size = 0;
45*4882a593Smuzhiyun 	for_each_rb_entry(cert, certs)
46*4882a593Smuzhiyun 		ipl_cert_list_size += sizeof(unsigned int) + cert->len;
47*4882a593Smuzhiyun 	size = ipl_cert_list_size + early_ipl_comp_list_size;
48*4882a593Smuzhiyun 
49*4882a593Smuzhiyun 	/*
50*4882a593Smuzhiyun 	 * Start from safe_addr to find a free memory area large
51*4882a593Smuzhiyun 	 * enough for the IPL report boot data. This area is used
52*4882a593Smuzhiyun 	 * for ipl_cert_list_addr/ipl_cert_list_size and
53*4882a593Smuzhiyun 	 * early_ipl_comp_list_addr/early_ipl_comp_list_size. It must
54*4882a593Smuzhiyun 	 * not overlap with any component or any certificate.
55*4882a593Smuzhiyun 	 */
56*4882a593Smuzhiyun repeat:
57*4882a593Smuzhiyun 	if (IS_ENABLED(CONFIG_BLK_DEV_INITRD) && INITRD_START && INITRD_SIZE &&
58*4882a593Smuzhiyun 	    intersects(INITRD_START, INITRD_SIZE, safe_addr, size))
59*4882a593Smuzhiyun 		safe_addr = INITRD_START + INITRD_SIZE;
60*4882a593Smuzhiyun 	for_each_rb_entry(comp, comps)
61*4882a593Smuzhiyun 		if (intersects(safe_addr, size, comp->addr, comp->len)) {
62*4882a593Smuzhiyun 			safe_addr = comp->addr + comp->len;
63*4882a593Smuzhiyun 			goto repeat;
64*4882a593Smuzhiyun 		}
65*4882a593Smuzhiyun 	for_each_rb_entry(cert, certs)
66*4882a593Smuzhiyun 		if (intersects(safe_addr, size, cert->addr, cert->len)) {
67*4882a593Smuzhiyun 			safe_addr = cert->addr + cert->len;
68*4882a593Smuzhiyun 			goto repeat;
69*4882a593Smuzhiyun 		}
70*4882a593Smuzhiyun 	early_ipl_comp_list_addr = safe_addr;
71*4882a593Smuzhiyun 	ipl_cert_list_addr = safe_addr + early_ipl_comp_list_size;
72*4882a593Smuzhiyun 
73*4882a593Smuzhiyun 	return safe_addr + size;
74*4882a593Smuzhiyun }
75*4882a593Smuzhiyun 
copy_components_bootdata(struct ipl_rb_components * comps)76*4882a593Smuzhiyun static void copy_components_bootdata(struct ipl_rb_components *comps)
77*4882a593Smuzhiyun {
78*4882a593Smuzhiyun 	struct ipl_rb_component_entry *comp, *ptr;
79*4882a593Smuzhiyun 
80*4882a593Smuzhiyun 	ptr = (struct ipl_rb_component_entry *) early_ipl_comp_list_addr;
81*4882a593Smuzhiyun 	for_each_rb_entry(comp, comps)
82*4882a593Smuzhiyun 		memcpy(ptr++, comp, sizeof(*ptr));
83*4882a593Smuzhiyun }
84*4882a593Smuzhiyun 
copy_certificates_bootdata(struct ipl_rb_certificates * certs)85*4882a593Smuzhiyun static void copy_certificates_bootdata(struct ipl_rb_certificates *certs)
86*4882a593Smuzhiyun {
87*4882a593Smuzhiyun 	struct ipl_rb_certificate_entry *cert;
88*4882a593Smuzhiyun 	void *ptr;
89*4882a593Smuzhiyun 
90*4882a593Smuzhiyun 	ptr = (void *) ipl_cert_list_addr;
91*4882a593Smuzhiyun 	for_each_rb_entry(cert, certs) {
92*4882a593Smuzhiyun 		*(unsigned int *) ptr = cert->len;
93*4882a593Smuzhiyun 		ptr += sizeof(unsigned int);
94*4882a593Smuzhiyun 		memcpy(ptr, (void *) cert->addr, cert->len);
95*4882a593Smuzhiyun 		ptr += cert->len;
96*4882a593Smuzhiyun 	}
97*4882a593Smuzhiyun }
98*4882a593Smuzhiyun 
read_ipl_report(unsigned long safe_addr)99*4882a593Smuzhiyun unsigned long read_ipl_report(unsigned long safe_addr)
100*4882a593Smuzhiyun {
101*4882a593Smuzhiyun 	struct ipl_rb_certificates *certs;
102*4882a593Smuzhiyun 	struct ipl_rb_components *comps;
103*4882a593Smuzhiyun 	struct ipl_pl_hdr *pl_hdr;
104*4882a593Smuzhiyun 	struct ipl_rl_hdr *rl_hdr;
105*4882a593Smuzhiyun 	struct ipl_rb_hdr *rb_hdr;
106*4882a593Smuzhiyun 	unsigned long tmp;
107*4882a593Smuzhiyun 	void *rl_end;
108*4882a593Smuzhiyun 
109*4882a593Smuzhiyun 	/*
110*4882a593Smuzhiyun 	 * Check if there is a IPL report by looking at the copy
111*4882a593Smuzhiyun 	 * of the IPL parameter information block.
112*4882a593Smuzhiyun 	 */
113*4882a593Smuzhiyun 	if (!ipl_block_valid ||
114*4882a593Smuzhiyun 	    !(ipl_block.hdr.flags & IPL_PL_FLAG_IPLSR))
115*4882a593Smuzhiyun 		return safe_addr;
116*4882a593Smuzhiyun 	ipl_secure_flag = !!(ipl_block.hdr.flags & IPL_PL_FLAG_SIPL);
117*4882a593Smuzhiyun 	/*
118*4882a593Smuzhiyun 	 * There is an IPL report, to find it load the pointer to the
119*4882a593Smuzhiyun 	 * IPL parameter information block from lowcore and skip past
120*4882a593Smuzhiyun 	 * the IPL parameter list, then align the address to a double
121*4882a593Smuzhiyun 	 * word boundary.
122*4882a593Smuzhiyun 	 */
123*4882a593Smuzhiyun 	tmp = (unsigned long) S390_lowcore.ipl_parmblock_ptr;
124*4882a593Smuzhiyun 	pl_hdr = (struct ipl_pl_hdr *) tmp;
125*4882a593Smuzhiyun 	tmp = (tmp + pl_hdr->len + 7) & -8UL;
126*4882a593Smuzhiyun 	rl_hdr = (struct ipl_rl_hdr *) tmp;
127*4882a593Smuzhiyun 	/* Walk through the IPL report blocks in the IPL Report list */
128*4882a593Smuzhiyun 	certs = NULL;
129*4882a593Smuzhiyun 	comps = NULL;
130*4882a593Smuzhiyun 	rl_end = (void *) rl_hdr + rl_hdr->len;
131*4882a593Smuzhiyun 	rb_hdr = (void *) rl_hdr + sizeof(*rl_hdr);
132*4882a593Smuzhiyun 	while ((void *) rb_hdr + sizeof(*rb_hdr) < rl_end &&
133*4882a593Smuzhiyun 	       (void *) rb_hdr + rb_hdr->len <= rl_end) {
134*4882a593Smuzhiyun 
135*4882a593Smuzhiyun 		switch (rb_hdr->rbt) {
136*4882a593Smuzhiyun 		case IPL_RBT_CERTIFICATES:
137*4882a593Smuzhiyun 			certs = (struct ipl_rb_certificates *) rb_hdr;
138*4882a593Smuzhiyun 			break;
139*4882a593Smuzhiyun 		case IPL_RBT_COMPONENTS:
140*4882a593Smuzhiyun 			comps = (struct ipl_rb_components *) rb_hdr;
141*4882a593Smuzhiyun 			break;
142*4882a593Smuzhiyun 		default:
143*4882a593Smuzhiyun 			break;
144*4882a593Smuzhiyun 		}
145*4882a593Smuzhiyun 
146*4882a593Smuzhiyun 		rb_hdr = (void *) rb_hdr + rb_hdr->len;
147*4882a593Smuzhiyun 	}
148*4882a593Smuzhiyun 
149*4882a593Smuzhiyun 	/*
150*4882a593Smuzhiyun 	 * With either the component list or the certificate list
151*4882a593Smuzhiyun 	 * missing the kernel will stay ignorant of secure IPL.
152*4882a593Smuzhiyun 	 */
153*4882a593Smuzhiyun 	if (!comps || !certs)
154*4882a593Smuzhiyun 		return safe_addr;
155*4882a593Smuzhiyun 
156*4882a593Smuzhiyun 	/*
157*4882a593Smuzhiyun 	 * Copy component and certificate list to a safe area
158*4882a593Smuzhiyun 	 * where the decompressed kernel can find them.
159*4882a593Smuzhiyun 	 */
160*4882a593Smuzhiyun 	safe_addr = find_bootdata_space(comps, certs, safe_addr);
161*4882a593Smuzhiyun 	copy_components_bootdata(comps);
162*4882a593Smuzhiyun 	copy_certificates_bootdata(certs);
163*4882a593Smuzhiyun 
164*4882a593Smuzhiyun 	return safe_addr;
165*4882a593Smuzhiyun }
166