+static int clear_ipmi_bootdev_ipmi(struct platform_powerpc *platform,
+ bool persistent __attribute__((unused)))
+{
+ uint16_t resp_len;
+ uint8_t resp[1];
+ uint8_t req[] = {
+ 0x05, /* parameter selector: boot flags */
+ 0x80, /* data 1: valid */
+ 0x00, /* data 2: bootdev: no override */
+ 0x00, /* data 3: system defaults */
+ 0x00, /* data 4: no request for shared mode, mux defaults */
+ 0x00, /* data 5: no instance request */
+ };
+
+ resp_len = sizeof(resp);
+
+ ipmi_transaction(platform->ipmi, IPMI_NETFN_CHASSIS,
+ IPMI_CMD_CHASSIS_SET_SYSTEM_BOOT_OPTIONS,
+ req, sizeof(req),
+ resp, &resp_len,
+ ipmi_timeout);
+ return 0;
+}
+
+static int get_ipmi_bootdev_ipmi(struct platform_powerpc *platform,
+ uint8_t *bootdev, bool *persistent)
+{
+ uint16_t resp_len;
+ uint8_t resp[8];
+ char *debug_buf;
+ int rc;
+ uint8_t req[] = {
+ 0x05, /* parameter selector: boot flags */
+ 0x00, /* no set selector */
+ 0x00, /* no block selector */
+ };
+
+ resp_len = sizeof(resp);
+ rc = ipmi_transaction(platform->ipmi, IPMI_NETFN_CHASSIS,
+ IPMI_CMD_CHASSIS_GET_SYSTEM_BOOT_OPTIONS,
+ req, sizeof(req),
+ resp, &resp_len,
+ ipmi_timeout);
+ if (rc) {
+ pb_log("platform: error reading IPMI boot options\n");
+ return -1;
+ }
+
+ if (resp_len != sizeof(resp)) {
+ pb_log("platform: unexpected length (%d) in "
+ "boot options response\n", resp_len);
+ return -1;
+ }
+
+ debug_buf = format_buffer(platform, resp, resp_len);
+ pb_debug_fn("IPMI get_bootdev response:\n%s\n", debug_buf);
+ talloc_free(debug_buf);
+
+ if (resp[0] != 0) {
+ pb_log("platform: non-zero completion code %d from IPMI req\n",
+ resp[0]);
+ return -1;
+ }
+
+ /* check for correct parameter version */
+ if ((resp[1] & 0xf) != 0x1) {
+ pb_log("platform: unexpected version (0x%x) in "
+ "boot options response\n", resp[0]);
+ return -1;
+ }
+
+ /* check for valid paramters */
+ if (resp[2] & 0x80) {
+ pb_debug("platform: boot options are invalid/locked\n");
+ return -1;
+ }
+
+ *persistent = false;
+
+ /* check for valid flags */
+ if (!(resp[3] & 0x80)) {
+ pb_debug("platform: boot flags are invalid, ignoring\n");
+ return -1;
+ }
+
+ *persistent = resp[3] & 0x40;
+ *bootdev = (resp[4] >> 2) & 0x0f;
+ return 0;
+}
+
+static int get_ipmi_boot_mailbox_block(struct platform_powerpc *platform,
+ char *buf, uint8_t block)
+{
+ size_t blocksize = 16;
+ uint8_t resp[3 + 16];
+ uint16_t resp_len;
+ char *debug_buf;
+ int rc;
+ uint8_t req[] = {
+ 0x07, /* parameter selector: boot initiator mailbox */
+ block, /* set selector */
+ 0x00, /* no block selector */
+ };
+
+ resp_len = sizeof(resp);
+ rc = ipmi_transaction(platform->ipmi, IPMI_NETFN_CHASSIS,
+ IPMI_CMD_CHASSIS_GET_SYSTEM_BOOT_OPTIONS,
+ req, sizeof(req),
+ resp, &resp_len,
+ ipmi_timeout);
+ if (rc) {
+ pb_log("platform: error reading IPMI boot options\n");
+ return -1;
+ }
+
+ if (resp_len < sizeof(resp)) {
+ if (resp_len < 3) {
+ pb_log("platform: unexpected length (%d) in "
+ "boot options mailbox response\n",
+ resp_len);
+ return -1;
+ }
+
+ if (resp_len == 4) {
+ pb_debug_fn("block %hu empty\n", block);
+ return 0;
+ }
+
+ blocksize = sizeof(resp) - 3;
+ pb_debug_fn("Mailbox block %hu returns only %zu bytes in block\n",
+ block, blocksize);
+ }
+
+ debug_buf = format_buffer(platform, resp, resp_len);
+ pb_debug_fn("IPMI bootdev mailbox block %hu:\n%s\n", block, debug_buf);
+ talloc_free(debug_buf);
+
+ if (resp[0] != 0) {
+ pb_log("platform: non-zero completion code %d from IPMI req\n",
+ resp[0]);
+ return -1;
+ }
+
+ /* check for correct parameter version */
+ if ((resp[1] & 0xf) != 0x1) {
+ pb_log("platform: unexpected version (0x%x) in "
+ "boot mailbox response\n", resp[0]);
+ return -1;
+ }
+
+ /* check for valid paramters */
+ if (resp[2] & 0x80) {
+ pb_debug("platform: boot mailbox parameters are invalid/locked\n");
+ return -1;
+ }
+
+ memcpy(buf, &resp[3], blocksize);
+
+ return blocksize;
+}
+
+static int get_ipmi_boot_mailbox(struct platform_powerpc *platform,
+ char **buf)
+{
+ char *mailbox_buffer, *prefix;
+ const size_t blocksize = 16;
+ char block_buffer[blocksize];
+ size_t mailbox_size;
+ int content_size;
+ uint8_t i;
+ int rc;
+
+ mailbox_buffer = NULL;
+ mailbox_size = 0;
+
+ /*
+ * The BMC may hold up to 255 blocks of data but more likely the number
+ * will be closer to the minimum of 5 set by the specification and error
+ * on higher numbers.
+ */
+ for (i = 0; i < UCHAR_MAX; i++) {
+ rc = get_ipmi_boot_mailbox_block(platform, block_buffer, i);
+ if (rc < 3 && i == 0) {
+ /*
+ * Immediate failure, no blocks read or missing IANA
+ * number.
+ */
+ return -1;
+ }
+ if (rc < 1) {
+ /* Error or no bytes read */
+ break;
+ }
+
+ if (i == 0) {
+ /*
+ * The first three bytes of block zero are an IANA
+ * Enterprise ID number. Check it matches the IBM
+ * number, '2'.
+ */
+ if (block_buffer[0] != 0x02 ||
+ block_buffer[1] != 0x00 ||
+ block_buffer[2] != 0x00) {
+ pb_log_fn("IANA number unrecognised: 0x%x:0x%x:0x%x\n",
+ block_buffer[0],
+ block_buffer[1],
+ block_buffer[2]);
+ return -1;
+ }
+ }
+
+ mailbox_buffer = talloc_realloc(platform, mailbox_buffer,
+ char, mailbox_size + rc);
+ if (!mailbox_buffer) {
+ pb_log_fn("Failed to allocate mailbox buffer\n");
+ return -1;
+ }
+ memcpy(mailbox_buffer + mailbox_size, block_buffer, rc);
+ mailbox_size += rc;
+ }
+
+ if (i < 5)
+ pb_log_fn("Only %hu blocks read, spec requires at least 5.\n"
+ "Send a bug report to your preferred BMC vendor!\n",
+ i);
+ else
+ pb_debug_fn("%hu blocks read (%zu bytes)\n", i, mailbox_size);
+
+ if (mailbox_size < 3 + strlen("petitboot,bootdevs="))
+ return -1;
+
+ prefix = talloc_strndup(mailbox_buffer, mailbox_buffer + 3,
+ strlen("petitboot,bootdevs="));
+ if (!prefix) {
+ pb_log_fn("Couldn't check prefix\n");
+ talloc_free(mailbox_buffer);
+ return -1;
+ }
+
+ if (strncmp(prefix, "petitboot,bootdevs=",
+ strlen("petitboot,bootdevs=")) != 0 ) {
+ /* Empty or garbage */
+ pb_debug_fn("Buffer looks unconfigured\n");
+ talloc_free(mailbox_buffer);
+ *buf = NULL;
+ return 0;
+ }
+
+ /* Don't include IANA number in buffer */
+ content_size = mailbox_size - 3 - strlen("petitboot,bootdevs=");
+ *buf = talloc_memdup(platform,
+ mailbox_buffer + 3 + strlen("petitboot,bootdevs="),
+ content_size + 1);
+ (*buf)[content_size] = '\0';
+
+ talloc_free(mailbox_buffer);
+ return 0;
+}
+
+static int clear_ipmi_boot_mailbox(struct platform_powerpc *platform)
+{
+ uint8_t req[18] = {0}; /* req (2) + blocksize (16) */
+ uint16_t resp_len;
+ uint8_t resp[1];
+ uint8_t i;
+ int rc;
+
+ req[0] = 0x07; /* parameter selector: boot initiator mailbox */
+
+ resp_len = sizeof(resp);
+
+ for (i = 0; i < UCHAR_MAX; i++) {
+ req[1] = i; /* set selector */
+ rc = ipmi_transaction(platform->ipmi, IPMI_NETFN_CHASSIS,
+ IPMI_CMD_CHASSIS_SET_SYSTEM_BOOT_OPTIONS,
+ req, sizeof(req),
+ resp, &resp_len,
+ ipmi_timeout);
+
+ if (rc || resp[0]) {
+ if (i == 0) {
+ pb_log_fn("error clearing IPMI boot mailbox, "
+ "rc %d resp[0] %hu\n",
+ rc, resp[0]);
+ return -1;
+ }
+ break;
+ }
+ }
+
+ pb_debug_fn("Cleared %hu blocks\n", i);
+
+ return 0;
+}
+
+static int set_ipmi_os_boot_sensor(struct platform_powerpc *platform)
+{
+ int sensor_number;
+ uint16_t resp_len;
+ uint8_t resp[1];
+ uint8_t req[] = {
+ 0x00, /* sensor number: os boot */
+ 0xA9, /* operation: set everything */
+ 0x00, /* sensor reading: none */
+ 0x40, /* assertion mask lsb: set state 6 */
+ 0x00, /* assertion mask msb: none */
+ 0x00, /* deassertion mask lsb: none */
+ 0x00, /* deassertion mask msb: none */
+ 0x00, /* event data 1: none */
+ 0x00, /* event data 2: none */
+ 0x00, /* event data 3: none */
+ };
+
+ sensor_number = get_ipmi_sensor(platform, IPMI_SENSOR_ID_OS_BOOT);
+ if (sensor_number < 0) {
+ pb_log("Couldn't find OS boot sensor in device tree\n");
+ return -1;
+ }
+
+ req[0] = sensor_number;
+
+ resp_len = sizeof(resp);
+
+ ipmi_transaction(platform->ipmi, IPMI_NETFN_SE,
+ IPMI_CMD_SENSOR_SET,
+ req, sizeof(req),
+ resp, &resp_len,
+ ipmi_timeout); return 0;
+
+ return 0;
+}
+
+static void get_ipmi_network_override(struct platform_powerpc *platform,
+ struct config *config)
+{
+ uint16_t min_len = 12, resp_len = 53, version;
+ const uint32_t magic_value = 0x21706221;
+ uint8_t resp[resp_len];
+ char *debug_buf;
+ uint32_t cookie;
+ bool persistent;
+ int i, rc;
+ uint8_t req[] = {
+ 0x61, /* parameter selector: OEM section (network) */
+ 0x00, /* no set selector */
+ 0x00, /* no block selector */
+ };
+
+ rc = ipmi_transaction(platform->ipmi, IPMI_NETFN_CHASSIS,
+ IPMI_CMD_CHASSIS_GET_SYSTEM_BOOT_OPTIONS,
+ req, sizeof(req),
+ resp, &resp_len,
+ ipmi_timeout);
+
+ debug_buf = format_buffer(platform, resp, resp_len);
+ pb_debug_fn("IPMI net override response:\n%s\n", debug_buf);
+ talloc_free(debug_buf);
+
+ if (rc) {
+ pb_debug("IPMI network config option unavailable\n");
+ return;
+ }
+
+ if (resp_len < min_len) {
+ pb_debug("IPMI net response too small\n");
+ return;
+ }
+
+ if (resp[0] != 0) {
+ pb_log("platform: non-zero completion code %d from IPMI network req\n",
+ resp[0]);
+ return;
+ }
+
+ /* Check for correct parameter version */
+ if ((resp[1] & 0xf) != 0x1) {
+ pb_log("platform: unexpected version (0x%x) in network override response\n",
+ resp[0]);
+ return;
+ }
+
+ /* Check that the parameters are valid */
+ if (resp[2] & 0x80) {
+ pb_debug("platform: network override is invalid/locked\n");
+ return;
+ }
+
+ /* Check for valid parameters in the boot flags section */
+ if (!(resp[3] & 0x80)) {
+ pb_debug("platform: network override valid flag not set\n");
+ return;
+ }
+ /* Read the persistent flag; if it is set we need to save this config */
+ persistent = resp[3] & 0x40;
+ if (persistent)
+ pb_debug("platform: network override is persistent\n");
+
+ /* Check 4-byte cookie value */
+ i = 4;
+ memcpy(&cookie, &resp[i], sizeof(cookie));
+ cookie = __be32_to_cpu(cookie);
+ if (cookie != magic_value) {
+ pb_log_fn("Incorrect cookie %x\n", cookie);
+ return;
+ }
+ i += sizeof(cookie);
+
+ /* Check 2-byte version number */
+ memcpy(&version, &resp[i], sizeof(version));
+ version = __be16_to_cpu(version);
+ i += sizeof(version);
+ if (version != 1) {
+ pb_debug("Unexpected version: %u\n", version);
+ return;
+ }
+
+ /* Interpret the rest of the interface config */
+ rc = parse_ipmi_interface_override(config, &resp[i], resp_len - i);
+
+ if (!rc && persistent) {
+ /* Write this new config to NVRAM */
+ params_update_network_values(platform->params,
+ "petitboot,network", config);
+ rc = write_nvram(platform);
+ if (rc)
+ pb_log("platform: Failed to save persistent interface override\n");
+ }
+}
+
+static void config_get_active_consoles(struct config *config)
+{
+ struct stat sbuf;
+ char *fsp_prop = NULL;
+
+ config->n_consoles = 2;
+ config->consoles = talloc_array(config, char *, config->n_consoles);
+ if (!config->consoles)
+ goto err;
+
+ config->consoles[0] = talloc_asprintf(config->consoles,
+ "/dev/hvc0 [IPMI / Serial]");
+ config->consoles[1] = talloc_asprintf(config->consoles,
+ "/dev/tty1 [VGA]");
+
+ fsp_prop = talloc_asprintf(config, "%sfsps", devtree_dir);
+ if (stat(fsp_prop, &sbuf) == 0) {
+ /* FSP based machines also have a separate serial console */
+ config->consoles = talloc_realloc(config, config->consoles,
+ char *, config->n_consoles + 1);
+ if (!config->consoles)
+ goto err;
+ config->consoles[config->n_consoles++] = talloc_asprintf(
+ config->consoles,
+ "/dev/hvc1 [Serial]");
+ }
+
+ return;
+err:
+ config->n_consoles = 0;
+ pb_log("Failed to allocate memory for consoles\n");
+}
+