123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784 |
- // SPDX-License-Identifier: GPL-2.0
- /*
- * Copyright © 2016 Intel Corporation
- *
- * Authors:
- * Scott Bauer <[email protected]>
- * Rafael Antognolli <[email protected]>
- */
- #define pr_fmt(fmt) KBUILD_MODNAME ":OPAL: " fmt
- #include <linux/delay.h>
- #include <linux/device.h>
- #include <linux/kernel.h>
- #include <linux/list.h>
- #include <linux/blkdev.h>
- #include <linux/slab.h>
- #include <linux/uaccess.h>
- #include <uapi/linux/sed-opal.h>
- #include <linux/sed-opal.h>
- #include <linux/string.h>
- #include <linux/kdev_t.h>
- #include "opal_proto.h"
- #define IO_BUFFER_LENGTH 2048
- #define MAX_TOKS 64
- /* Number of bytes needed by cmd_finalize. */
- #define CMD_FINALIZE_BYTES_NEEDED 7
- struct opal_step {
- int (*fn)(struct opal_dev *dev, void *data);
- void *data;
- };
- typedef int (cont_fn)(struct opal_dev *dev);
- enum opal_atom_width {
- OPAL_WIDTH_TINY,
- OPAL_WIDTH_SHORT,
- OPAL_WIDTH_MEDIUM,
- OPAL_WIDTH_LONG,
- OPAL_WIDTH_TOKEN
- };
- /*
- * On the parsed response, we don't store again the toks that are already
- * stored in the response buffer. Instead, for each token, we just store a
- * pointer to the position in the buffer where the token starts, and the size
- * of the token in bytes.
- */
- struct opal_resp_tok {
- const u8 *pos;
- size_t len;
- enum opal_response_token type;
- enum opal_atom_width width;
- union {
- u64 u;
- s64 s;
- } stored;
- };
- /*
- * From the response header it's not possible to know how many tokens there are
- * on the payload. So we hardcode that the maximum will be MAX_TOKS, and later
- * if we start dealing with messages that have more than that, we can increase
- * this number. This is done to avoid having to make two passes through the
- * response, the first one counting how many tokens we have and the second one
- * actually storing the positions.
- */
- struct parsed_resp {
- int num;
- struct opal_resp_tok toks[MAX_TOKS];
- };
- struct opal_dev {
- u32 flags;
- void *data;
- sec_send_recv *send_recv;
- struct mutex dev_lock;
- u16 comid;
- u32 hsn;
- u32 tsn;
- u64 align;
- u64 lowest_lba;
- size_t pos;
- u8 *cmd;
- u8 *resp;
- struct parsed_resp parsed;
- size_t prev_d_len;
- void *prev_data;
- struct list_head unlk_lst;
- };
- static const u8 opaluid[][OPAL_UID_LENGTH] = {
- /* users */
- [OPAL_SMUID_UID] =
- { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff },
- [OPAL_THISSP_UID] =
- { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 },
- [OPAL_ADMINSP_UID] =
- { 0x00, 0x00, 0x02, 0x05, 0x00, 0x00, 0x00, 0x01 },
- [OPAL_LOCKINGSP_UID] =
- { 0x00, 0x00, 0x02, 0x05, 0x00, 0x00, 0x00, 0x02 },
- [OPAL_ENTERPRISE_LOCKINGSP_UID] =
- { 0x00, 0x00, 0x02, 0x05, 0x00, 0x01, 0x00, 0x01 },
- [OPAL_ANYBODY_UID] =
- { 0x00, 0x00, 0x00, 0x09, 0x00, 0x00, 0x00, 0x01 },
- [OPAL_SID_UID] =
- { 0x00, 0x00, 0x00, 0x09, 0x00, 0x00, 0x00, 0x06 },
- [OPAL_ADMIN1_UID] =
- { 0x00, 0x00, 0x00, 0x09, 0x00, 0x01, 0x00, 0x01 },
- [OPAL_USER1_UID] =
- { 0x00, 0x00, 0x00, 0x09, 0x00, 0x03, 0x00, 0x01 },
- [OPAL_USER2_UID] =
- { 0x00, 0x00, 0x00, 0x09, 0x00, 0x03, 0x00, 0x02 },
- [OPAL_PSID_UID] =
- { 0x00, 0x00, 0x00, 0x09, 0x00, 0x01, 0xff, 0x01 },
- [OPAL_ENTERPRISE_BANDMASTER0_UID] =
- { 0x00, 0x00, 0x00, 0x09, 0x00, 0x00, 0x80, 0x01 },
- [OPAL_ENTERPRISE_ERASEMASTER_UID] =
- { 0x00, 0x00, 0x00, 0x09, 0x00, 0x00, 0x84, 0x01 },
- /* tables */
- [OPAL_TABLE_TABLE] =
- { 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x01 },
- [OPAL_LOCKINGRANGE_GLOBAL] =
- { 0x00, 0x00, 0x08, 0x02, 0x00, 0x00, 0x00, 0x01 },
- [OPAL_LOCKINGRANGE_ACE_RDLOCKED] =
- { 0x00, 0x00, 0x00, 0x08, 0x00, 0x03, 0xE0, 0x01 },
- [OPAL_LOCKINGRANGE_ACE_WRLOCKED] =
- { 0x00, 0x00, 0x00, 0x08, 0x00, 0x03, 0xE8, 0x01 },
- [OPAL_MBRCONTROL] =
- { 0x00, 0x00, 0x08, 0x03, 0x00, 0x00, 0x00, 0x01 },
- [OPAL_MBR] =
- { 0x00, 0x00, 0x08, 0x04, 0x00, 0x00, 0x00, 0x00 },
- [OPAL_AUTHORITY_TABLE] =
- { 0x00, 0x00, 0x00, 0x09, 0x00, 0x00, 0x00, 0x00},
- [OPAL_C_PIN_TABLE] =
- { 0x00, 0x00, 0x00, 0x0B, 0x00, 0x00, 0x00, 0x00},
- [OPAL_LOCKING_INFO_TABLE] =
- { 0x00, 0x00, 0x08, 0x01, 0x00, 0x00, 0x00, 0x01 },
- [OPAL_ENTERPRISE_LOCKING_INFO_TABLE] =
- { 0x00, 0x00, 0x08, 0x01, 0x00, 0x00, 0x00, 0x00 },
- [OPAL_DATASTORE] =
- { 0x00, 0x00, 0x10, 0x01, 0x00, 0x00, 0x00, 0x00 },
- /* C_PIN_TABLE object ID's */
- [OPAL_C_PIN_MSID] =
- { 0x00, 0x00, 0x00, 0x0B, 0x00, 0x00, 0x84, 0x02},
- [OPAL_C_PIN_SID] =
- { 0x00, 0x00, 0x00, 0x0B, 0x00, 0x00, 0x00, 0x01},
- [OPAL_C_PIN_ADMIN1] =
- { 0x00, 0x00, 0x00, 0x0B, 0x00, 0x01, 0x00, 0x01},
- /* half UID's (only first 4 bytes used) */
- [OPAL_HALF_UID_AUTHORITY_OBJ_REF] =
- { 0x00, 0x00, 0x0C, 0x05, 0xff, 0xff, 0xff, 0xff },
- [OPAL_HALF_UID_BOOLEAN_ACE] =
- { 0x00, 0x00, 0x04, 0x0E, 0xff, 0xff, 0xff, 0xff },
- /* special value for omitted optional parameter */
- [OPAL_UID_HEXFF] =
- { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff},
- };
- /*
- * TCG Storage SSC Methods.
- * Derived from: TCG_Storage_Architecture_Core_Spec_v2.01_r1.00
- * Section: 6.3 Assigned UIDs
- */
- static const u8 opalmethod[][OPAL_METHOD_LENGTH] = {
- [OPAL_PROPERTIES] =
- { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x01 },
- [OPAL_STARTSESSION] =
- { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x02 },
- [OPAL_REVERT] =
- { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x02, 0x02 },
- [OPAL_ACTIVATE] =
- { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x02, 0x03 },
- [OPAL_EGET] =
- { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x06 },
- [OPAL_ESET] =
- { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x07 },
- [OPAL_NEXT] =
- { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x08 },
- [OPAL_EAUTHENTICATE] =
- { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x0c },
- [OPAL_GETACL] =
- { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x0d },
- [OPAL_GENKEY] =
- { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x10 },
- [OPAL_REVERTSP] =
- { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x11 },
- [OPAL_GET] =
- { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x16 },
- [OPAL_SET] =
- { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x17 },
- [OPAL_AUTHENTICATE] =
- { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x1c },
- [OPAL_RANDOM] =
- { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x06, 0x01 },
- [OPAL_ERASE] =
- { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x08, 0x03 },
- };
- static int end_opal_session_error(struct opal_dev *dev);
- static int opal_discovery0_step(struct opal_dev *dev);
- struct opal_suspend_data {
- struct opal_lock_unlock unlk;
- u8 lr;
- struct list_head node;
- };
- /*
- * Derived from:
- * TCG_Storage_Architecture_Core_Spec_v2.01_r1.00
- * Section: 5.1.5 Method Status Codes
- */
- static const char * const opal_errors[] = {
- "Success",
- "Not Authorized",
- "Unknown Error",
- "SP Busy",
- "SP Failed",
- "SP Disabled",
- "SP Frozen",
- "No Sessions Available",
- "Uniqueness Conflict",
- "Insufficient Space",
- "Insufficient Rows",
- "Invalid Function",
- "Invalid Parameter",
- "Invalid Reference",
- "Unknown Error",
- "TPER Malfunction",
- "Transaction Failure",
- "Response Overflow",
- "Authority Locked Out",
- };
- static const char *opal_error_to_human(int error)
- {
- if (error == 0x3f)
- return "Failed";
- if (error >= ARRAY_SIZE(opal_errors) || error < 0)
- return "Unknown Error";
- return opal_errors[error];
- }
- static void print_buffer(const u8 *ptr, u32 length)
- {
- #ifdef DEBUG
- print_hex_dump_bytes("OPAL: ", DUMP_PREFIX_OFFSET, ptr, length);
- pr_debug("\n");
- #endif
- }
- static bool check_tper(const void *data)
- {
- const struct d0_tper_features *tper = data;
- u8 flags = tper->supported_features;
- if (!(flags & TPER_SYNC_SUPPORTED)) {
- pr_debug("TPer sync not supported. flags = %d\n",
- tper->supported_features);
- return false;
- }
- return true;
- }
- static bool check_lcksuppt(const void *data)
- {
- const struct d0_locking_features *lfeat = data;
- u8 sup_feat = lfeat->supported_features;
- return !!(sup_feat & LOCKING_SUPPORTED_MASK);
- }
- static bool check_lckenabled(const void *data)
- {
- const struct d0_locking_features *lfeat = data;
- u8 sup_feat = lfeat->supported_features;
- return !!(sup_feat & LOCKING_ENABLED_MASK);
- }
- static bool check_locked(const void *data)
- {
- const struct d0_locking_features *lfeat = data;
- u8 sup_feat = lfeat->supported_features;
- return !!(sup_feat & LOCKED_MASK);
- }
- static bool check_mbrenabled(const void *data)
- {
- const struct d0_locking_features *lfeat = data;
- u8 sup_feat = lfeat->supported_features;
- return !!(sup_feat & MBR_ENABLED_MASK);
- }
- static bool check_mbrdone(const void *data)
- {
- const struct d0_locking_features *lfeat = data;
- u8 sup_feat = lfeat->supported_features;
- return !!(sup_feat & MBR_DONE_MASK);
- }
- static bool check_sum(const void *data)
- {
- const struct d0_single_user_mode *sum = data;
- u32 nlo = be32_to_cpu(sum->num_locking_objects);
- if (nlo == 0) {
- pr_debug("Need at least one locking object.\n");
- return false;
- }
- pr_debug("Number of locking objects: %d\n", nlo);
- return true;
- }
- static u16 get_comid_v100(const void *data)
- {
- const struct d0_opal_v100 *v100 = data;
- return be16_to_cpu(v100->baseComID);
- }
- static u16 get_comid_v200(const void *data)
- {
- const struct d0_opal_v200 *v200 = data;
- return be16_to_cpu(v200->baseComID);
- }
- static int opal_send_cmd(struct opal_dev *dev)
- {
- return dev->send_recv(dev->data, dev->comid, TCG_SECP_01,
- dev->cmd, IO_BUFFER_LENGTH,
- true);
- }
- static int opal_recv_cmd(struct opal_dev *dev)
- {
- return dev->send_recv(dev->data, dev->comid, TCG_SECP_01,
- dev->resp, IO_BUFFER_LENGTH,
- false);
- }
- static int opal_recv_check(struct opal_dev *dev)
- {
- size_t buflen = IO_BUFFER_LENGTH;
- void *buffer = dev->resp;
- struct opal_header *hdr = buffer;
- int ret;
- do {
- pr_debug("Sent OPAL command: outstanding=%d, minTransfer=%d\n",
- hdr->cp.outstandingData,
- hdr->cp.minTransfer);
- if (hdr->cp.outstandingData == 0 ||
- hdr->cp.minTransfer != 0)
- return 0;
- memset(buffer, 0, buflen);
- ret = opal_recv_cmd(dev);
- } while (!ret);
- return ret;
- }
- static int opal_send_recv(struct opal_dev *dev, cont_fn *cont)
- {
- int ret;
- ret = opal_send_cmd(dev);
- if (ret)
- return ret;
- ret = opal_recv_cmd(dev);
- if (ret)
- return ret;
- ret = opal_recv_check(dev);
- if (ret)
- return ret;
- return cont(dev);
- }
- static void check_geometry(struct opal_dev *dev, const void *data)
- {
- const struct d0_geometry_features *geo = data;
- dev->align = be64_to_cpu(geo->alignment_granularity);
- dev->lowest_lba = be64_to_cpu(geo->lowest_aligned_lba);
- }
- static int execute_step(struct opal_dev *dev,
- const struct opal_step *step, size_t stepIndex)
- {
- int error = step->fn(dev, step->data);
- if (error) {
- pr_debug("Step %zu (%pS) failed with error %d: %s\n",
- stepIndex, step->fn, error,
- opal_error_to_human(error));
- }
- return error;
- }
- static int execute_steps(struct opal_dev *dev,
- const struct opal_step *steps, size_t n_steps)
- {
- size_t state = 0;
- int error;
- /* first do a discovery0 */
- error = opal_discovery0_step(dev);
- if (error)
- return error;
- for (state = 0; state < n_steps; state++) {
- error = execute_step(dev, &steps[state], state);
- if (error)
- goto out_error;
- }
- return 0;
- out_error:
- /*
- * For each OPAL command the first step in steps starts some sort of
- * session. If an error occurred in the initial discovery0 or if an
- * error occurred in the first step (and thus stopping the loop with
- * state == 0) then there was an error before or during the attempt to
- * start a session. Therefore we shouldn't attempt to terminate a
- * session, as one has not yet been created.
- */
- if (state > 0)
- end_opal_session_error(dev);
- return error;
- }
- static int opal_discovery0_end(struct opal_dev *dev)
- {
- bool found_com_id = false, supported = true, single_user = false;
- const struct d0_header *hdr = (struct d0_header *)dev->resp;
- const u8 *epos = dev->resp, *cpos = dev->resp;
- u16 comid = 0;
- u32 hlen = be32_to_cpu(hdr->length);
- print_buffer(dev->resp, hlen);
- dev->flags &= OPAL_FL_SUPPORTED;
- if (hlen > IO_BUFFER_LENGTH - sizeof(*hdr)) {
- pr_debug("Discovery length overflows buffer (%zu+%u)/%u\n",
- sizeof(*hdr), hlen, IO_BUFFER_LENGTH);
- return -EFAULT;
- }
- epos += hlen; /* end of buffer */
- cpos += sizeof(*hdr); /* current position on buffer */
- while (cpos < epos && supported) {
- const struct d0_features *body =
- (const struct d0_features *)cpos;
- switch (be16_to_cpu(body->code)) {
- case FC_TPER:
- supported = check_tper(body->features);
- break;
- case FC_SINGLEUSER:
- single_user = check_sum(body->features);
- break;
- case FC_GEOMETRY:
- check_geometry(dev, body);
- break;
- case FC_LOCKING:
- if (check_lcksuppt(body->features))
- dev->flags |= OPAL_FL_LOCKING_SUPPORTED;
- if (check_lckenabled(body->features))
- dev->flags |= OPAL_FL_LOCKING_ENABLED;
- if (check_locked(body->features))
- dev->flags |= OPAL_FL_LOCKED;
- if (check_mbrenabled(body->features))
- dev->flags |= OPAL_FL_MBR_ENABLED;
- if (check_mbrdone(body->features))
- dev->flags |= OPAL_FL_MBR_DONE;
- break;
- case FC_ENTERPRISE:
- case FC_DATASTORE:
- /* some ignored properties */
- pr_debug("Found OPAL feature description: %d\n",
- be16_to_cpu(body->code));
- break;
- case FC_OPALV100:
- comid = get_comid_v100(body->features);
- found_com_id = true;
- break;
- case FC_OPALV200:
- comid = get_comid_v200(body->features);
- found_com_id = true;
- break;
- case 0xbfff ... 0xffff:
- /* vendor specific, just ignore */
- break;
- default:
- pr_debug("OPAL Unknown feature: %d\n",
- be16_to_cpu(body->code));
- }
- cpos += body->length + 4;
- }
- if (!supported) {
- pr_debug("This device is not Opal enabled. Not Supported!\n");
- return -EOPNOTSUPP;
- }
- if (!single_user)
- pr_debug("Device doesn't support single user mode\n");
- if (!found_com_id) {
- pr_debug("Could not find OPAL comid for device. Returning early\n");
- return -EOPNOTSUPP;
- }
- dev->comid = comid;
- return 0;
- }
- static int opal_discovery0(struct opal_dev *dev, void *data)
- {
- int ret;
- memset(dev->resp, 0, IO_BUFFER_LENGTH);
- dev->comid = OPAL_DISCOVERY_COMID;
- ret = opal_recv_cmd(dev);
- if (ret)
- return ret;
- return opal_discovery0_end(dev);
- }
- static int opal_discovery0_step(struct opal_dev *dev)
- {
- const struct opal_step discovery0_step = {
- opal_discovery0,
- };
- return execute_step(dev, &discovery0_step, 0);
- }
- static size_t remaining_size(struct opal_dev *cmd)
- {
- return IO_BUFFER_LENGTH - cmd->pos;
- }
- static bool can_add(int *err, struct opal_dev *cmd, size_t len)
- {
- if (*err)
- return false;
- if (remaining_size(cmd) < len) {
- pr_debug("Error adding %zu bytes: end of buffer.\n", len);
- *err = -ERANGE;
- return false;
- }
- return true;
- }
- static void add_token_u8(int *err, struct opal_dev *cmd, u8 tok)
- {
- if (!can_add(err, cmd, 1))
- return;
- cmd->cmd[cmd->pos++] = tok;
- }
- static void add_short_atom_header(struct opal_dev *cmd, bool bytestring,
- bool has_sign, int len)
- {
- u8 atom;
- int err = 0;
- atom = SHORT_ATOM_ID;
- atom |= bytestring ? SHORT_ATOM_BYTESTRING : 0;
- atom |= has_sign ? SHORT_ATOM_SIGNED : 0;
- atom |= len & SHORT_ATOM_LEN_MASK;
- add_token_u8(&err, cmd, atom);
- }
- static void add_medium_atom_header(struct opal_dev *cmd, bool bytestring,
- bool has_sign, int len)
- {
- u8 header0;
- header0 = MEDIUM_ATOM_ID;
- header0 |= bytestring ? MEDIUM_ATOM_BYTESTRING : 0;
- header0 |= has_sign ? MEDIUM_ATOM_SIGNED : 0;
- header0 |= (len >> 8) & MEDIUM_ATOM_LEN_MASK;
- cmd->cmd[cmd->pos++] = header0;
- cmd->cmd[cmd->pos++] = len;
- }
- static void add_token_u64(int *err, struct opal_dev *cmd, u64 number)
- {
- size_t len;
- int msb;
- if (!(number & ~TINY_ATOM_DATA_MASK)) {
- add_token_u8(err, cmd, number);
- return;
- }
- msb = fls64(number);
- len = DIV_ROUND_UP(msb, 8);
- if (!can_add(err, cmd, len + 1)) {
- pr_debug("Error adding u64: end of buffer.\n");
- return;
- }
- add_short_atom_header(cmd, false, false, len);
- while (len--)
- add_token_u8(err, cmd, number >> (len * 8));
- }
- static u8 *add_bytestring_header(int *err, struct opal_dev *cmd, size_t len)
- {
- size_t header_len = 1;
- bool is_short_atom = true;
- if (len & ~SHORT_ATOM_LEN_MASK) {
- header_len = 2;
- is_short_atom = false;
- }
- if (!can_add(err, cmd, header_len + len)) {
- pr_debug("Error adding bytestring: end of buffer.\n");
- return NULL;
- }
- if (is_short_atom)
- add_short_atom_header(cmd, true, false, len);
- else
- add_medium_atom_header(cmd, true, false, len);
- return &cmd->cmd[cmd->pos];
- }
- static void add_token_bytestring(int *err, struct opal_dev *cmd,
- const u8 *bytestring, size_t len)
- {
- u8 *start;
- start = add_bytestring_header(err, cmd, len);
- if (!start)
- return;
- memcpy(start, bytestring, len);
- cmd->pos += len;
- }
- static int build_locking_range(u8 *buffer, size_t length, u8 lr)
- {
- if (length > OPAL_UID_LENGTH) {
- pr_debug("Can't build locking range. Length OOB\n");
- return -ERANGE;
- }
- memcpy(buffer, opaluid[OPAL_LOCKINGRANGE_GLOBAL], OPAL_UID_LENGTH);
- if (lr == 0)
- return 0;
- buffer[5] = LOCKING_RANGE_NON_GLOBAL;
- buffer[7] = lr;
- return 0;
- }
- static int build_locking_user(u8 *buffer, size_t length, u8 lr)
- {
- if (length > OPAL_UID_LENGTH) {
- pr_debug("Can't build locking range user. Length OOB\n");
- return -ERANGE;
- }
- memcpy(buffer, opaluid[OPAL_USER1_UID], OPAL_UID_LENGTH);
- buffer[7] = lr + 1;
- return 0;
- }
- static void set_comid(struct opal_dev *cmd, u16 comid)
- {
- struct opal_header *hdr = (struct opal_header *)cmd->cmd;
- hdr->cp.extendedComID[0] = comid >> 8;
- hdr->cp.extendedComID[1] = comid;
- hdr->cp.extendedComID[2] = 0;
- hdr->cp.extendedComID[3] = 0;
- }
- static int cmd_finalize(struct opal_dev *cmd, u32 hsn, u32 tsn)
- {
- struct opal_header *hdr;
- int err = 0;
- /*
- * Close the parameter list opened from cmd_start.
- * The number of bytes added must be equal to
- * CMD_FINALIZE_BYTES_NEEDED.
- */
- add_token_u8(&err, cmd, OPAL_ENDLIST);
- add_token_u8(&err, cmd, OPAL_ENDOFDATA);
- add_token_u8(&err, cmd, OPAL_STARTLIST);
- add_token_u8(&err, cmd, 0);
- add_token_u8(&err, cmd, 0);
- add_token_u8(&err, cmd, 0);
- add_token_u8(&err, cmd, OPAL_ENDLIST);
- if (err) {
- pr_debug("Error finalizing command.\n");
- return -EFAULT;
- }
- hdr = (struct opal_header *) cmd->cmd;
- hdr->pkt.tsn = cpu_to_be32(tsn);
- hdr->pkt.hsn = cpu_to_be32(hsn);
- hdr->subpkt.length = cpu_to_be32(cmd->pos - sizeof(*hdr));
- while (cmd->pos % 4) {
- if (cmd->pos >= IO_BUFFER_LENGTH) {
- pr_debug("Error: Buffer overrun\n");
- return -ERANGE;
- }
- cmd->cmd[cmd->pos++] = 0;
- }
- hdr->pkt.length = cpu_to_be32(cmd->pos - sizeof(hdr->cp) -
- sizeof(hdr->pkt));
- hdr->cp.length = cpu_to_be32(cmd->pos - sizeof(hdr->cp));
- return 0;
- }
- static const struct opal_resp_tok *response_get_token(
- const struct parsed_resp *resp,
- int n)
- {
- const struct opal_resp_tok *tok;
- if (!resp) {
- pr_debug("Response is NULL\n");
- return ERR_PTR(-EINVAL);
- }
- if (n >= resp->num) {
- pr_debug("Token number doesn't exist: %d, resp: %d\n",
- n, resp->num);
- return ERR_PTR(-EINVAL);
- }
- tok = &resp->toks[n];
- if (tok->len == 0) {
- pr_debug("Token length must be non-zero\n");
- return ERR_PTR(-EINVAL);
- }
- return tok;
- }
- static ssize_t response_parse_tiny(struct opal_resp_tok *tok,
- const u8 *pos)
- {
- tok->pos = pos;
- tok->len = 1;
- tok->width = OPAL_WIDTH_TINY;
- if (pos[0] & TINY_ATOM_SIGNED) {
- tok->type = OPAL_DTA_TOKENID_SINT;
- } else {
- tok->type = OPAL_DTA_TOKENID_UINT;
- tok->stored.u = pos[0] & 0x3f;
- }
- return tok->len;
- }
- static ssize_t response_parse_short(struct opal_resp_tok *tok,
- const u8 *pos)
- {
- tok->pos = pos;
- tok->len = (pos[0] & SHORT_ATOM_LEN_MASK) + 1;
- tok->width = OPAL_WIDTH_SHORT;
- if (pos[0] & SHORT_ATOM_BYTESTRING) {
- tok->type = OPAL_DTA_TOKENID_BYTESTRING;
- } else if (pos[0] & SHORT_ATOM_SIGNED) {
- tok->type = OPAL_DTA_TOKENID_SINT;
- } else {
- u64 u_integer = 0;
- ssize_t i, b = 0;
- tok->type = OPAL_DTA_TOKENID_UINT;
- if (tok->len > 9) {
- pr_debug("uint64 with more than 8 bytes\n");
- return -EINVAL;
- }
- for (i = tok->len - 1; i > 0; i--) {
- u_integer |= ((u64)pos[i] << (8 * b));
- b++;
- }
- tok->stored.u = u_integer;
- }
- return tok->len;
- }
- static ssize_t response_parse_medium(struct opal_resp_tok *tok,
- const u8 *pos)
- {
- tok->pos = pos;
- tok->len = (((pos[0] & MEDIUM_ATOM_LEN_MASK) << 8) | pos[1]) + 2;
- tok->width = OPAL_WIDTH_MEDIUM;
- if (pos[0] & MEDIUM_ATOM_BYTESTRING)
- tok->type = OPAL_DTA_TOKENID_BYTESTRING;
- else if (pos[0] & MEDIUM_ATOM_SIGNED)
- tok->type = OPAL_DTA_TOKENID_SINT;
- else
- tok->type = OPAL_DTA_TOKENID_UINT;
- return tok->len;
- }
- static ssize_t response_parse_long(struct opal_resp_tok *tok,
- const u8 *pos)
- {
- tok->pos = pos;
- tok->len = ((pos[1] << 16) | (pos[2] << 8) | pos[3]) + 4;
- tok->width = OPAL_WIDTH_LONG;
- if (pos[0] & LONG_ATOM_BYTESTRING)
- tok->type = OPAL_DTA_TOKENID_BYTESTRING;
- else if (pos[0] & LONG_ATOM_SIGNED)
- tok->type = OPAL_DTA_TOKENID_SINT;
- else
- tok->type = OPAL_DTA_TOKENID_UINT;
- return tok->len;
- }
- static ssize_t response_parse_token(struct opal_resp_tok *tok,
- const u8 *pos)
- {
- tok->pos = pos;
- tok->len = 1;
- tok->type = OPAL_DTA_TOKENID_TOKEN;
- tok->width = OPAL_WIDTH_TOKEN;
- return tok->len;
- }
- static int response_parse(const u8 *buf, size_t length,
- struct parsed_resp *resp)
- {
- const struct opal_header *hdr;
- struct opal_resp_tok *iter;
- int num_entries = 0;
- int total;
- ssize_t token_length;
- const u8 *pos;
- u32 clen, plen, slen;
- if (!buf)
- return -EFAULT;
- if (!resp)
- return -EFAULT;
- hdr = (struct opal_header *)buf;
- pos = buf;
- pos += sizeof(*hdr);
- clen = be32_to_cpu(hdr->cp.length);
- plen = be32_to_cpu(hdr->pkt.length);
- slen = be32_to_cpu(hdr->subpkt.length);
- pr_debug("Response size: cp: %u, pkt: %u, subpkt: %u\n",
- clen, plen, slen);
- if (clen == 0 || plen == 0 || slen == 0 ||
- slen > IO_BUFFER_LENGTH - sizeof(*hdr)) {
- pr_debug("Bad header length. cp: %u, pkt: %u, subpkt: %u\n",
- clen, plen, slen);
- print_buffer(pos, sizeof(*hdr));
- return -EINVAL;
- }
- if (pos > buf + length)
- return -EFAULT;
- iter = resp->toks;
- total = slen;
- print_buffer(pos, total);
- while (total > 0) {
- if (pos[0] <= TINY_ATOM_BYTE) /* tiny atom */
- token_length = response_parse_tiny(iter, pos);
- else if (pos[0] <= SHORT_ATOM_BYTE) /* short atom */
- token_length = response_parse_short(iter, pos);
- else if (pos[0] <= MEDIUM_ATOM_BYTE) /* medium atom */
- token_length = response_parse_medium(iter, pos);
- else if (pos[0] <= LONG_ATOM_BYTE) /* long atom */
- token_length = response_parse_long(iter, pos);
- else /* TOKEN */
- token_length = response_parse_token(iter, pos);
- if (token_length < 0)
- return token_length;
- pos += token_length;
- total -= token_length;
- iter++;
- num_entries++;
- }
- resp->num = num_entries;
- return 0;
- }
- static size_t response_get_string(const struct parsed_resp *resp, int n,
- const char **store)
- {
- u8 skip;
- const struct opal_resp_tok *tok;
- *store = NULL;
- tok = response_get_token(resp, n);
- if (IS_ERR(tok))
- return 0;
- if (tok->type != OPAL_DTA_TOKENID_BYTESTRING) {
- pr_debug("Token is not a byte string!\n");
- return 0;
- }
- switch (tok->width) {
- case OPAL_WIDTH_TINY:
- case OPAL_WIDTH_SHORT:
- skip = 1;
- break;
- case OPAL_WIDTH_MEDIUM:
- skip = 2;
- break;
- case OPAL_WIDTH_LONG:
- skip = 4;
- break;
- default:
- pr_debug("Token has invalid width!\n");
- return 0;
- }
- *store = tok->pos + skip;
- return tok->len - skip;
- }
- static u64 response_get_u64(const struct parsed_resp *resp, int n)
- {
- const struct opal_resp_tok *tok;
- tok = response_get_token(resp, n);
- if (IS_ERR(tok))
- return 0;
- if (tok->type != OPAL_DTA_TOKENID_UINT) {
- pr_debug("Token is not unsigned int: %d\n", tok->type);
- return 0;
- }
- if (tok->width != OPAL_WIDTH_TINY && tok->width != OPAL_WIDTH_SHORT) {
- pr_debug("Atom is not short or tiny: %d\n", tok->width);
- return 0;
- }
- return tok->stored.u;
- }
- static bool response_token_matches(const struct opal_resp_tok *token, u8 match)
- {
- if (IS_ERR(token) ||
- token->type != OPAL_DTA_TOKENID_TOKEN ||
- token->pos[0] != match)
- return false;
- return true;
- }
- static u8 response_status(const struct parsed_resp *resp)
- {
- const struct opal_resp_tok *tok;
- tok = response_get_token(resp, 0);
- if (response_token_matches(tok, OPAL_ENDOFSESSION))
- return 0;
- if (resp->num < 5)
- return DTAERROR_NO_METHOD_STATUS;
- tok = response_get_token(resp, resp->num - 5);
- if (!response_token_matches(tok, OPAL_STARTLIST))
- return DTAERROR_NO_METHOD_STATUS;
- tok = response_get_token(resp, resp->num - 1);
- if (!response_token_matches(tok, OPAL_ENDLIST))
- return DTAERROR_NO_METHOD_STATUS;
- return response_get_u64(resp, resp->num - 4);
- }
- /* Parses and checks for errors */
- static int parse_and_check_status(struct opal_dev *dev)
- {
- int error;
- print_buffer(dev->cmd, dev->pos);
- error = response_parse(dev->resp, IO_BUFFER_LENGTH, &dev->parsed);
- if (error) {
- pr_debug("Couldn't parse response.\n");
- return error;
- }
- return response_status(&dev->parsed);
- }
- static void clear_opal_cmd(struct opal_dev *dev)
- {
- dev->pos = sizeof(struct opal_header);
- memset(dev->cmd, 0, IO_BUFFER_LENGTH);
- }
- static int cmd_start(struct opal_dev *dev, const u8 *uid, const u8 *method)
- {
- int err = 0;
- clear_opal_cmd(dev);
- set_comid(dev, dev->comid);
- add_token_u8(&err, dev, OPAL_CALL);
- add_token_bytestring(&err, dev, uid, OPAL_UID_LENGTH);
- add_token_bytestring(&err, dev, method, OPAL_METHOD_LENGTH);
- /*
- * Every method call is followed by its parameters enclosed within
- * OPAL_STARTLIST and OPAL_ENDLIST tokens. We automatically open the
- * parameter list here and close it later in cmd_finalize.
- */
- add_token_u8(&err, dev, OPAL_STARTLIST);
- return err;
- }
- static int start_opal_session_cont(struct opal_dev *dev)
- {
- u32 hsn, tsn;
- int error = 0;
- error = parse_and_check_status(dev);
- if (error)
- return error;
- hsn = response_get_u64(&dev->parsed, 4);
- tsn = response_get_u64(&dev->parsed, 5);
- if (hsn != GENERIC_HOST_SESSION_NUM || tsn < FIRST_TPER_SESSION_NUM) {
- pr_debug("Couldn't authenticate session\n");
- return -EPERM;
- }
- dev->hsn = hsn;
- dev->tsn = tsn;
- return 0;
- }
- static void add_suspend_info(struct opal_dev *dev,
- struct opal_suspend_data *sus)
- {
- struct opal_suspend_data *iter;
- list_for_each_entry(iter, &dev->unlk_lst, node) {
- if (iter->lr == sus->lr) {
- list_del(&iter->node);
- kfree(iter);
- break;
- }
- }
- list_add_tail(&sus->node, &dev->unlk_lst);
- }
- static int end_session_cont(struct opal_dev *dev)
- {
- dev->hsn = 0;
- dev->tsn = 0;
- return parse_and_check_status(dev);
- }
- static int finalize_and_send(struct opal_dev *dev, cont_fn cont)
- {
- int ret;
- ret = cmd_finalize(dev, dev->hsn, dev->tsn);
- if (ret) {
- pr_debug("Error finalizing command buffer: %d\n", ret);
- return ret;
- }
- print_buffer(dev->cmd, dev->pos);
- return opal_send_recv(dev, cont);
- }
- /*
- * request @column from table @table on device @dev. On success, the column
- * data will be available in dev->resp->tok[4]
- */
- static int generic_get_column(struct opal_dev *dev, const u8 *table,
- u64 column)
- {
- int err;
- err = cmd_start(dev, table, opalmethod[OPAL_GET]);
- add_token_u8(&err, dev, OPAL_STARTLIST);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_STARTCOLUMN);
- add_token_u64(&err, dev, column);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_ENDCOLUMN);
- add_token_u64(&err, dev, column);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- add_token_u8(&err, dev, OPAL_ENDLIST);
- if (err)
- return err;
- return finalize_and_send(dev, parse_and_check_status);
- }
- /*
- * see TCG SAS 5.3.2.3 for a description of the available columns
- *
- * the result is provided in dev->resp->tok[4]
- */
- static int generic_get_table_info(struct opal_dev *dev, const u8 *table_uid,
- u64 column)
- {
- u8 uid[OPAL_UID_LENGTH];
- const unsigned int half = OPAL_UID_LENGTH_HALF;
- /* sed-opal UIDs can be split in two halves:
- * first: actual table index
- * second: relative index in the table
- * so we have to get the first half of the OPAL_TABLE_TABLE and use the
- * first part of the target table as relative index into that table
- */
- memcpy(uid, opaluid[OPAL_TABLE_TABLE], half);
- memcpy(uid + half, table_uid, half);
- return generic_get_column(dev, uid, column);
- }
- static int gen_key(struct opal_dev *dev, void *data)
- {
- u8 uid[OPAL_UID_LENGTH];
- int err;
- memcpy(uid, dev->prev_data, min(sizeof(uid), dev->prev_d_len));
- kfree(dev->prev_data);
- dev->prev_data = NULL;
- err = cmd_start(dev, uid, opalmethod[OPAL_GENKEY]);
- if (err) {
- pr_debug("Error building gen key command\n");
- return err;
- }
- return finalize_and_send(dev, parse_and_check_status);
- }
- static int get_active_key_cont(struct opal_dev *dev)
- {
- const char *activekey;
- size_t keylen;
- int error = 0;
- error = parse_and_check_status(dev);
- if (error)
- return error;
- keylen = response_get_string(&dev->parsed, 4, &activekey);
- if (!activekey) {
- pr_debug("%s: Couldn't extract the Activekey from the response\n",
- __func__);
- return OPAL_INVAL_PARAM;
- }
- dev->prev_data = kmemdup(activekey, keylen, GFP_KERNEL);
- if (!dev->prev_data)
- return -ENOMEM;
- dev->prev_d_len = keylen;
- return 0;
- }
- static int get_active_key(struct opal_dev *dev, void *data)
- {
- u8 uid[OPAL_UID_LENGTH];
- int err;
- u8 *lr = data;
- err = build_locking_range(uid, sizeof(uid), *lr);
- if (err)
- return err;
- err = generic_get_column(dev, uid, OPAL_ACTIVEKEY);
- if (err)
- return err;
- return get_active_key_cont(dev);
- }
- static int generic_table_write_data(struct opal_dev *dev, const u64 data,
- u64 offset, u64 size, const u8 *uid)
- {
- const u8 __user *src = (u8 __user *)(uintptr_t)data;
- u8 *dst;
- u64 len;
- size_t off = 0;
- int err;
- /* do we fit in the available space? */
- err = generic_get_table_info(dev, uid, OPAL_TABLE_ROWS);
- if (err) {
- pr_debug("Couldn't get the table size\n");
- return err;
- }
- len = response_get_u64(&dev->parsed, 4);
- if (size > len || offset > len - size) {
- pr_debug("Does not fit in the table (%llu vs. %llu)\n",
- offset + size, len);
- return -ENOSPC;
- }
- /* do the actual transmission(s) */
- while (off < size) {
- err = cmd_start(dev, uid, opalmethod[OPAL_SET]);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_WHERE);
- add_token_u64(&err, dev, offset + off);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_VALUES);
- /*
- * The bytestring header is either 1 or 2 bytes, so assume 2.
- * There also needs to be enough space to accommodate the
- * trailing OPAL_ENDNAME (1 byte) and tokens added by
- * cmd_finalize.
- */
- len = min(remaining_size(dev) - (2+1+CMD_FINALIZE_BYTES_NEEDED),
- (size_t)(size - off));
- pr_debug("Write bytes %zu+%llu/%llu\n", off, len, size);
- dst = add_bytestring_header(&err, dev, len);
- if (!dst)
- break;
- if (copy_from_user(dst, src + off, len)) {
- err = -EFAULT;
- break;
- }
- dev->pos += len;
- add_token_u8(&err, dev, OPAL_ENDNAME);
- if (err)
- break;
- err = finalize_and_send(dev, parse_and_check_status);
- if (err)
- break;
- off += len;
- }
- return err;
- }
- static int generic_lr_enable_disable(struct opal_dev *dev,
- u8 *uid, bool rle, bool wle,
- bool rl, bool wl)
- {
- int err;
- err = cmd_start(dev, uid, opalmethod[OPAL_SET]);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_VALUES);
- add_token_u8(&err, dev, OPAL_STARTLIST);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_READLOCKENABLED);
- add_token_u8(&err, dev, rle);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_WRITELOCKENABLED);
- add_token_u8(&err, dev, wle);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_READLOCKED);
- add_token_u8(&err, dev, rl);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_WRITELOCKED);
- add_token_u8(&err, dev, wl);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- add_token_u8(&err, dev, OPAL_ENDLIST);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- return err;
- }
- static inline int enable_global_lr(struct opal_dev *dev, u8 *uid,
- struct opal_user_lr_setup *setup)
- {
- int err;
- err = generic_lr_enable_disable(dev, uid, !!setup->RLE, !!setup->WLE,
- 0, 0);
- if (err)
- pr_debug("Failed to create enable global lr command\n");
- return err;
- }
- static int setup_locking_range(struct opal_dev *dev, void *data)
- {
- u8 uid[OPAL_UID_LENGTH];
- struct opal_user_lr_setup *setup = data;
- u8 lr;
- int err;
- lr = setup->session.opal_key.lr;
- err = build_locking_range(uid, sizeof(uid), lr);
- if (err)
- return err;
- if (lr == 0)
- err = enable_global_lr(dev, uid, setup);
- else {
- err = cmd_start(dev, uid, opalmethod[OPAL_SET]);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_VALUES);
- add_token_u8(&err, dev, OPAL_STARTLIST);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_RANGESTART);
- add_token_u64(&err, dev, setup->range_start);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_RANGELENGTH);
- add_token_u64(&err, dev, setup->range_length);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_READLOCKENABLED);
- add_token_u64(&err, dev, !!setup->RLE);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_WRITELOCKENABLED);
- add_token_u64(&err, dev, !!setup->WLE);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- add_token_u8(&err, dev, OPAL_ENDLIST);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- }
- if (err) {
- pr_debug("Error building Setup Locking range command.\n");
- return err;
- }
- return finalize_and_send(dev, parse_and_check_status);
- }
- static int start_generic_opal_session(struct opal_dev *dev,
- enum opal_uid auth,
- enum opal_uid sp_type,
- const char *key,
- u8 key_len)
- {
- u32 hsn;
- int err;
- if (key == NULL && auth != OPAL_ANYBODY_UID)
- return OPAL_INVAL_PARAM;
- hsn = GENERIC_HOST_SESSION_NUM;
- err = cmd_start(dev, opaluid[OPAL_SMUID_UID],
- opalmethod[OPAL_STARTSESSION]);
- add_token_u64(&err, dev, hsn);
- add_token_bytestring(&err, dev, opaluid[sp_type], OPAL_UID_LENGTH);
- add_token_u8(&err, dev, 1);
- switch (auth) {
- case OPAL_ANYBODY_UID:
- break;
- case OPAL_ADMIN1_UID:
- case OPAL_SID_UID:
- case OPAL_PSID_UID:
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, 0); /* HostChallenge */
- add_token_bytestring(&err, dev, key, key_len);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, 3); /* HostSignAuth */
- add_token_bytestring(&err, dev, opaluid[auth],
- OPAL_UID_LENGTH);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- break;
- default:
- pr_debug("Cannot start Admin SP session with auth %d\n", auth);
- return OPAL_INVAL_PARAM;
- }
- if (err) {
- pr_debug("Error building start adminsp session command.\n");
- return err;
- }
- return finalize_and_send(dev, start_opal_session_cont);
- }
- static int start_anybodyASP_opal_session(struct opal_dev *dev, void *data)
- {
- return start_generic_opal_session(dev, OPAL_ANYBODY_UID,
- OPAL_ADMINSP_UID, NULL, 0);
- }
- static int start_SIDASP_opal_session(struct opal_dev *dev, void *data)
- {
- int ret;
- const u8 *key = dev->prev_data;
- if (!key) {
- const struct opal_key *okey = data;
- ret = start_generic_opal_session(dev, OPAL_SID_UID,
- OPAL_ADMINSP_UID,
- okey->key,
- okey->key_len);
- } else {
- ret = start_generic_opal_session(dev, OPAL_SID_UID,
- OPAL_ADMINSP_UID,
- key, dev->prev_d_len);
- kfree(key);
- dev->prev_data = NULL;
- }
- return ret;
- }
- static int start_admin1LSP_opal_session(struct opal_dev *dev, void *data)
- {
- struct opal_key *key = data;
- return start_generic_opal_session(dev, OPAL_ADMIN1_UID,
- OPAL_LOCKINGSP_UID,
- key->key, key->key_len);
- }
- static int start_PSID_opal_session(struct opal_dev *dev, void *data)
- {
- const struct opal_key *okey = data;
- return start_generic_opal_session(dev, OPAL_PSID_UID,
- OPAL_ADMINSP_UID,
- okey->key,
- okey->key_len);
- }
- static int start_auth_opal_session(struct opal_dev *dev, void *data)
- {
- struct opal_session_info *session = data;
- u8 lk_ul_user[OPAL_UID_LENGTH];
- size_t keylen = session->opal_key.key_len;
- int err = 0;
- u8 *key = session->opal_key.key;
- u32 hsn = GENERIC_HOST_SESSION_NUM;
- if (session->sum)
- err = build_locking_user(lk_ul_user, sizeof(lk_ul_user),
- session->opal_key.lr);
- else if (session->who != OPAL_ADMIN1 && !session->sum)
- err = build_locking_user(lk_ul_user, sizeof(lk_ul_user),
- session->who - 1);
- else
- memcpy(lk_ul_user, opaluid[OPAL_ADMIN1_UID], OPAL_UID_LENGTH);
- if (err)
- return err;
- err = cmd_start(dev, opaluid[OPAL_SMUID_UID],
- opalmethod[OPAL_STARTSESSION]);
- add_token_u64(&err, dev, hsn);
- add_token_bytestring(&err, dev, opaluid[OPAL_LOCKINGSP_UID],
- OPAL_UID_LENGTH);
- add_token_u8(&err, dev, 1);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, 0);
- add_token_bytestring(&err, dev, key, keylen);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, 3);
- add_token_bytestring(&err, dev, lk_ul_user, OPAL_UID_LENGTH);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- if (err) {
- pr_debug("Error building STARTSESSION command.\n");
- return err;
- }
- return finalize_and_send(dev, start_opal_session_cont);
- }
- static int revert_tper(struct opal_dev *dev, void *data)
- {
- int err;
- err = cmd_start(dev, opaluid[OPAL_ADMINSP_UID],
- opalmethod[OPAL_REVERT]);
- if (err) {
- pr_debug("Error building REVERT TPER command.\n");
- return err;
- }
- return finalize_and_send(dev, parse_and_check_status);
- }
- static int internal_activate_user(struct opal_dev *dev, void *data)
- {
- struct opal_session_info *session = data;
- u8 uid[OPAL_UID_LENGTH];
- int err;
- memcpy(uid, opaluid[OPAL_USER1_UID], OPAL_UID_LENGTH);
- uid[7] = session->who;
- err = cmd_start(dev, uid, opalmethod[OPAL_SET]);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_VALUES);
- add_token_u8(&err, dev, OPAL_STARTLIST);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, 5); /* Enabled */
- add_token_u8(&err, dev, OPAL_TRUE);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- add_token_u8(&err, dev, OPAL_ENDLIST);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- if (err) {
- pr_debug("Error building Activate UserN command.\n");
- return err;
- }
- return finalize_and_send(dev, parse_and_check_status);
- }
- static int erase_locking_range(struct opal_dev *dev, void *data)
- {
- struct opal_session_info *session = data;
- u8 uid[OPAL_UID_LENGTH];
- int err;
- if (build_locking_range(uid, sizeof(uid), session->opal_key.lr) < 0)
- return -ERANGE;
- err = cmd_start(dev, uid, opalmethod[OPAL_ERASE]);
- if (err) {
- pr_debug("Error building Erase Locking Range Command.\n");
- return err;
- }
- return finalize_and_send(dev, parse_and_check_status);
- }
- static int set_mbr_done(struct opal_dev *dev, void *data)
- {
- u8 *mbr_done_tf = data;
- int err;
- err = cmd_start(dev, opaluid[OPAL_MBRCONTROL],
- opalmethod[OPAL_SET]);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_VALUES);
- add_token_u8(&err, dev, OPAL_STARTLIST);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_MBRDONE);
- add_token_u8(&err, dev, *mbr_done_tf); /* Done T or F */
- add_token_u8(&err, dev, OPAL_ENDNAME);
- add_token_u8(&err, dev, OPAL_ENDLIST);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- if (err) {
- pr_debug("Error Building set MBR Done command\n");
- return err;
- }
- return finalize_and_send(dev, parse_and_check_status);
- }
- static int set_mbr_enable_disable(struct opal_dev *dev, void *data)
- {
- u8 *mbr_en_dis = data;
- int err;
- err = cmd_start(dev, opaluid[OPAL_MBRCONTROL],
- opalmethod[OPAL_SET]);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_VALUES);
- add_token_u8(&err, dev, OPAL_STARTLIST);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_MBRENABLE);
- add_token_u8(&err, dev, *mbr_en_dis);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- add_token_u8(&err, dev, OPAL_ENDLIST);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- if (err) {
- pr_debug("Error Building set MBR done command\n");
- return err;
- }
- return finalize_and_send(dev, parse_and_check_status);
- }
- static int write_shadow_mbr(struct opal_dev *dev, void *data)
- {
- struct opal_shadow_mbr *shadow = data;
- return generic_table_write_data(dev, shadow->data, shadow->offset,
- shadow->size, opaluid[OPAL_MBR]);
- }
- static int generic_pw_cmd(u8 *key, size_t key_len, u8 *cpin_uid,
- struct opal_dev *dev)
- {
- int err;
- err = cmd_start(dev, cpin_uid, opalmethod[OPAL_SET]);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_VALUES);
- add_token_u8(&err, dev, OPAL_STARTLIST);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_PIN);
- add_token_bytestring(&err, dev, key, key_len);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- add_token_u8(&err, dev, OPAL_ENDLIST);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- return err;
- }
- static int set_new_pw(struct opal_dev *dev, void *data)
- {
- u8 cpin_uid[OPAL_UID_LENGTH];
- struct opal_session_info *usr = data;
- memcpy(cpin_uid, opaluid[OPAL_C_PIN_ADMIN1], OPAL_UID_LENGTH);
- if (usr->who != OPAL_ADMIN1) {
- cpin_uid[5] = 0x03;
- if (usr->sum)
- cpin_uid[7] = usr->opal_key.lr + 1;
- else
- cpin_uid[7] = usr->who;
- }
- if (generic_pw_cmd(usr->opal_key.key, usr->opal_key.key_len,
- cpin_uid, dev)) {
- pr_debug("Error building set password command.\n");
- return -ERANGE;
- }
- return finalize_and_send(dev, parse_and_check_status);
- }
- static int set_sid_cpin_pin(struct opal_dev *dev, void *data)
- {
- u8 cpin_uid[OPAL_UID_LENGTH];
- struct opal_key *key = data;
- memcpy(cpin_uid, opaluid[OPAL_C_PIN_SID], OPAL_UID_LENGTH);
- if (generic_pw_cmd(key->key, key->key_len, cpin_uid, dev)) {
- pr_debug("Error building Set SID cpin\n");
- return -ERANGE;
- }
- return finalize_and_send(dev, parse_and_check_status);
- }
- static int add_user_to_lr(struct opal_dev *dev, void *data)
- {
- u8 lr_buffer[OPAL_UID_LENGTH];
- u8 user_uid[OPAL_UID_LENGTH];
- struct opal_lock_unlock *lkul = data;
- int err;
- memcpy(lr_buffer, opaluid[OPAL_LOCKINGRANGE_ACE_RDLOCKED],
- OPAL_UID_LENGTH);
- if (lkul->l_state == OPAL_RW)
- memcpy(lr_buffer, opaluid[OPAL_LOCKINGRANGE_ACE_WRLOCKED],
- OPAL_UID_LENGTH);
- lr_buffer[7] = lkul->session.opal_key.lr;
- memcpy(user_uid, opaluid[OPAL_USER1_UID], OPAL_UID_LENGTH);
- user_uid[7] = lkul->session.who;
- err = cmd_start(dev, lr_buffer, opalmethod[OPAL_SET]);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_VALUES);
- add_token_u8(&err, dev, OPAL_STARTLIST);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, 3);
- add_token_u8(&err, dev, OPAL_STARTLIST);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_bytestring(&err, dev,
- opaluid[OPAL_HALF_UID_AUTHORITY_OBJ_REF],
- OPAL_UID_LENGTH/2);
- add_token_bytestring(&err, dev, user_uid, OPAL_UID_LENGTH);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_bytestring(&err, dev,
- opaluid[OPAL_HALF_UID_AUTHORITY_OBJ_REF],
- OPAL_UID_LENGTH/2);
- add_token_bytestring(&err, dev, user_uid, OPAL_UID_LENGTH);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_bytestring(&err, dev, opaluid[OPAL_HALF_UID_BOOLEAN_ACE],
- OPAL_UID_LENGTH/2);
- add_token_u8(&err, dev, 1);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- add_token_u8(&err, dev, OPAL_ENDLIST);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- add_token_u8(&err, dev, OPAL_ENDLIST);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- if (err) {
- pr_debug("Error building add user to locking range command.\n");
- return err;
- }
- return finalize_and_send(dev, parse_and_check_status);
- }
- static int lock_unlock_locking_range(struct opal_dev *dev, void *data)
- {
- u8 lr_buffer[OPAL_UID_LENGTH];
- struct opal_lock_unlock *lkul = data;
- u8 read_locked = 1, write_locked = 1;
- int err = 0;
- if (build_locking_range(lr_buffer, sizeof(lr_buffer),
- lkul->session.opal_key.lr) < 0)
- return -ERANGE;
- switch (lkul->l_state) {
- case OPAL_RO:
- read_locked = 0;
- write_locked = 1;
- break;
- case OPAL_RW:
- read_locked = 0;
- write_locked = 0;
- break;
- case OPAL_LK:
- /* vars are initialized to locked */
- break;
- default:
- pr_debug("Tried to set an invalid locking state... returning to uland\n");
- return OPAL_INVAL_PARAM;
- }
- err = cmd_start(dev, lr_buffer, opalmethod[OPAL_SET]);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_VALUES);
- add_token_u8(&err, dev, OPAL_STARTLIST);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_READLOCKED);
- add_token_u8(&err, dev, read_locked);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_WRITELOCKED);
- add_token_u8(&err, dev, write_locked);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- add_token_u8(&err, dev, OPAL_ENDLIST);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- if (err) {
- pr_debug("Error building SET command.\n");
- return err;
- }
- return finalize_and_send(dev, parse_and_check_status);
- }
- static int lock_unlock_locking_range_sum(struct opal_dev *dev, void *data)
- {
- u8 lr_buffer[OPAL_UID_LENGTH];
- u8 read_locked = 1, write_locked = 1;
- struct opal_lock_unlock *lkul = data;
- int ret;
- clear_opal_cmd(dev);
- set_comid(dev, dev->comid);
- if (build_locking_range(lr_buffer, sizeof(lr_buffer),
- lkul->session.opal_key.lr) < 0)
- return -ERANGE;
- switch (lkul->l_state) {
- case OPAL_RO:
- read_locked = 0;
- write_locked = 1;
- break;
- case OPAL_RW:
- read_locked = 0;
- write_locked = 0;
- break;
- case OPAL_LK:
- /* vars are initialized to locked */
- break;
- default:
- pr_debug("Tried to set an invalid locking state.\n");
- return OPAL_INVAL_PARAM;
- }
- ret = generic_lr_enable_disable(dev, lr_buffer, 1, 1,
- read_locked, write_locked);
- if (ret < 0) {
- pr_debug("Error building SET command.\n");
- return ret;
- }
- return finalize_and_send(dev, parse_and_check_status);
- }
- static int activate_lsp(struct opal_dev *dev, void *data)
- {
- struct opal_lr_act *opal_act = data;
- u8 user_lr[OPAL_UID_LENGTH];
- int err, i;
- err = cmd_start(dev, opaluid[OPAL_LOCKINGSP_UID],
- opalmethod[OPAL_ACTIVATE]);
- if (opal_act->sum) {
- err = build_locking_range(user_lr, sizeof(user_lr),
- opal_act->lr[0]);
- if (err)
- return err;
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u64(&err, dev, OPAL_SUM_SET_LIST);
- add_token_u8(&err, dev, OPAL_STARTLIST);
- add_token_bytestring(&err, dev, user_lr, OPAL_UID_LENGTH);
- for (i = 1; i < opal_act->num_lrs; i++) {
- user_lr[7] = opal_act->lr[i];
- add_token_bytestring(&err, dev, user_lr, OPAL_UID_LENGTH);
- }
- add_token_u8(&err, dev, OPAL_ENDLIST);
- add_token_u8(&err, dev, OPAL_ENDNAME);
- }
- if (err) {
- pr_debug("Error building Activate LockingSP command.\n");
- return err;
- }
- return finalize_and_send(dev, parse_and_check_status);
- }
- /* Determine if we're in the Manufactured Inactive or Active state */
- static int get_lsp_lifecycle(struct opal_dev *dev, void *data)
- {
- u8 lc_status;
- int err;
- err = generic_get_column(dev, opaluid[OPAL_LOCKINGSP_UID],
- OPAL_LIFECYCLE);
- if (err)
- return err;
- lc_status = response_get_u64(&dev->parsed, 4);
- /* 0x08 is Manufactured Inactive */
- /* 0x09 is Manufactured */
- if (lc_status != OPAL_MANUFACTURED_INACTIVE) {
- pr_debug("Couldn't determine the status of the Lifecycle state\n");
- return -ENODEV;
- }
- return 0;
- }
- static int get_msid_cpin_pin(struct opal_dev *dev, void *data)
- {
- const char *msid_pin;
- size_t strlen;
- int err;
- err = generic_get_column(dev, opaluid[OPAL_C_PIN_MSID], OPAL_PIN);
- if (err)
- return err;
- strlen = response_get_string(&dev->parsed, 4, &msid_pin);
- if (!msid_pin) {
- pr_debug("Couldn't extract MSID_CPIN from response\n");
- return OPAL_INVAL_PARAM;
- }
- dev->prev_data = kmemdup(msid_pin, strlen, GFP_KERNEL);
- if (!dev->prev_data)
- return -ENOMEM;
- dev->prev_d_len = strlen;
- return 0;
- }
- static int write_table_data(struct opal_dev *dev, void *data)
- {
- struct opal_read_write_table *write_tbl = data;
- return generic_table_write_data(dev, write_tbl->data, write_tbl->offset,
- write_tbl->size, write_tbl->table_uid);
- }
- static int read_table_data_cont(struct opal_dev *dev)
- {
- int err;
- const char *data_read;
- err = parse_and_check_status(dev);
- if (err)
- return err;
- dev->prev_d_len = response_get_string(&dev->parsed, 1, &data_read);
- dev->prev_data = (void *)data_read;
- if (!dev->prev_data) {
- pr_debug("%s: Couldn't read data from the table.\n", __func__);
- return OPAL_INVAL_PARAM;
- }
- return 0;
- }
- /*
- * IO_BUFFER_LENGTH = 2048
- * sizeof(header) = 56
- * No. of Token Bytes in the Response = 11
- * MAX size of data that can be carried in response buffer
- * at a time is : 2048 - (56 + 11) = 1981 = 0x7BD.
- */
- #define OPAL_MAX_READ_TABLE (0x7BD)
- static int read_table_data(struct opal_dev *dev, void *data)
- {
- struct opal_read_write_table *read_tbl = data;
- int err;
- size_t off = 0, max_read_size = OPAL_MAX_READ_TABLE;
- u64 table_len, len;
- u64 offset = read_tbl->offset, read_size = read_tbl->size - 1;
- u8 __user *dst;
- err = generic_get_table_info(dev, read_tbl->table_uid, OPAL_TABLE_ROWS);
- if (err) {
- pr_debug("Couldn't get the table size\n");
- return err;
- }
- table_len = response_get_u64(&dev->parsed, 4);
- /* Check if the user is trying to read from the table limits */
- if (read_size > table_len || offset > table_len - read_size) {
- pr_debug("Read size exceeds the Table size limits (%llu vs. %llu)\n",
- offset + read_size, table_len);
- return -EINVAL;
- }
- while (off < read_size) {
- err = cmd_start(dev, read_tbl->table_uid, opalmethod[OPAL_GET]);
- add_token_u8(&err, dev, OPAL_STARTLIST);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_STARTROW);
- add_token_u64(&err, dev, offset + off); /* start row value */
- add_token_u8(&err, dev, OPAL_ENDNAME);
- add_token_u8(&err, dev, OPAL_STARTNAME);
- add_token_u8(&err, dev, OPAL_ENDROW);
- len = min(max_read_size, (size_t)(read_size - off));
- add_token_u64(&err, dev, offset + off + len); /* end row value
- */
- add_token_u8(&err, dev, OPAL_ENDNAME);
- add_token_u8(&err, dev, OPAL_ENDLIST);
- if (err) {
- pr_debug("Error building read table data command.\n");
- break;
- }
- err = finalize_and_send(dev, read_table_data_cont);
- if (err)
- break;
- /* len+1: This includes the NULL terminator at the end*/
- if (dev->prev_d_len > len + 1) {
- err = -EOVERFLOW;
- break;
- }
- dst = (u8 __user *)(uintptr_t)read_tbl->data;
- if (copy_to_user(dst + off, dev->prev_data, dev->prev_d_len)) {
- pr_debug("Error copying data to userspace\n");
- err = -EFAULT;
- break;
- }
- dev->prev_data = NULL;
- off += len;
- }
- return err;
- }
- static int end_opal_session(struct opal_dev *dev, void *data)
- {
- int err = 0;
- clear_opal_cmd(dev);
- set_comid(dev, dev->comid);
- add_token_u8(&err, dev, OPAL_ENDOFSESSION);
- if (err < 0)
- return err;
- return finalize_and_send(dev, end_session_cont);
- }
- static int end_opal_session_error(struct opal_dev *dev)
- {
- const struct opal_step error_end_session = {
- end_opal_session,
- };
- return execute_step(dev, &error_end_session, 0);
- }
- static inline void setup_opal_dev(struct opal_dev *dev)
- {
- dev->tsn = 0;
- dev->hsn = 0;
- dev->prev_data = NULL;
- }
- static int check_opal_support(struct opal_dev *dev)
- {
- int ret;
- mutex_lock(&dev->dev_lock);
- setup_opal_dev(dev);
- ret = opal_discovery0_step(dev);
- if (!ret)
- dev->flags |= OPAL_FL_SUPPORTED;
- mutex_unlock(&dev->dev_lock);
- return ret;
- }
- static void clean_opal_dev(struct opal_dev *dev)
- {
- struct opal_suspend_data *suspend, *next;
- mutex_lock(&dev->dev_lock);
- list_for_each_entry_safe(suspend, next, &dev->unlk_lst, node) {
- list_del(&suspend->node);
- kfree(suspend);
- }
- mutex_unlock(&dev->dev_lock);
- }
- void free_opal_dev(struct opal_dev *dev)
- {
- if (!dev)
- return;
- clean_opal_dev(dev);
- kfree(dev->resp);
- kfree(dev->cmd);
- kfree(dev);
- }
- EXPORT_SYMBOL(free_opal_dev);
- struct opal_dev *init_opal_dev(void *data, sec_send_recv *send_recv)
- {
- struct opal_dev *dev;
- dev = kmalloc(sizeof(*dev), GFP_KERNEL);
- if (!dev)
- return NULL;
- /*
- * Presumably DMA-able buffers must be cache-aligned. Kmalloc makes
- * sure the allocated buffer is DMA-safe in that regard.
- */
- dev->cmd = kmalloc(IO_BUFFER_LENGTH, GFP_KERNEL);
- if (!dev->cmd)
- goto err_free_dev;
- dev->resp = kmalloc(IO_BUFFER_LENGTH, GFP_KERNEL);
- if (!dev->resp)
- goto err_free_cmd;
- INIT_LIST_HEAD(&dev->unlk_lst);
- mutex_init(&dev->dev_lock);
- dev->flags = 0;
- dev->data = data;
- dev->send_recv = send_recv;
- if (check_opal_support(dev) != 0) {
- pr_debug("Opal is not supported on this device\n");
- goto err_free_resp;
- }
- return dev;
- err_free_resp:
- kfree(dev->resp);
- err_free_cmd:
- kfree(dev->cmd);
- err_free_dev:
- kfree(dev);
- return NULL;
- }
- EXPORT_SYMBOL(init_opal_dev);
- static int opal_secure_erase_locking_range(struct opal_dev *dev,
- struct opal_session_info *opal_session)
- {
- const struct opal_step erase_steps[] = {
- { start_auth_opal_session, opal_session },
- { get_active_key, &opal_session->opal_key.lr },
- { gen_key, },
- { end_opal_session, }
- };
- int ret;
- mutex_lock(&dev->dev_lock);
- setup_opal_dev(dev);
- ret = execute_steps(dev, erase_steps, ARRAY_SIZE(erase_steps));
- mutex_unlock(&dev->dev_lock);
- return ret;
- }
- static int opal_erase_locking_range(struct opal_dev *dev,
- struct opal_session_info *opal_session)
- {
- const struct opal_step erase_steps[] = {
- { start_auth_opal_session, opal_session },
- { erase_locking_range, opal_session },
- { end_opal_session, }
- };
- int ret;
- mutex_lock(&dev->dev_lock);
- setup_opal_dev(dev);
- ret = execute_steps(dev, erase_steps, ARRAY_SIZE(erase_steps));
- mutex_unlock(&dev->dev_lock);
- return ret;
- }
- static int opal_enable_disable_shadow_mbr(struct opal_dev *dev,
- struct opal_mbr_data *opal_mbr)
- {
- u8 enable_disable = opal_mbr->enable_disable == OPAL_MBR_ENABLE ?
- OPAL_TRUE : OPAL_FALSE;
- const struct opal_step mbr_steps[] = {
- { start_admin1LSP_opal_session, &opal_mbr->key },
- { set_mbr_done, &enable_disable },
- { end_opal_session, },
- { start_admin1LSP_opal_session, &opal_mbr->key },
- { set_mbr_enable_disable, &enable_disable },
- { end_opal_session, }
- };
- int ret;
- if (opal_mbr->enable_disable != OPAL_MBR_ENABLE &&
- opal_mbr->enable_disable != OPAL_MBR_DISABLE)
- return -EINVAL;
- mutex_lock(&dev->dev_lock);
- setup_opal_dev(dev);
- ret = execute_steps(dev, mbr_steps, ARRAY_SIZE(mbr_steps));
- mutex_unlock(&dev->dev_lock);
- return ret;
- }
- static int opal_set_mbr_done(struct opal_dev *dev,
- struct opal_mbr_done *mbr_done)
- {
- u8 mbr_done_tf = mbr_done->done_flag == OPAL_MBR_DONE ?
- OPAL_TRUE : OPAL_FALSE;
- const struct opal_step mbr_steps[] = {
- { start_admin1LSP_opal_session, &mbr_done->key },
- { set_mbr_done, &mbr_done_tf },
- { end_opal_session, }
- };
- int ret;
- if (mbr_done->done_flag != OPAL_MBR_DONE &&
- mbr_done->done_flag != OPAL_MBR_NOT_DONE)
- return -EINVAL;
- mutex_lock(&dev->dev_lock);
- setup_opal_dev(dev);
- ret = execute_steps(dev, mbr_steps, ARRAY_SIZE(mbr_steps));
- mutex_unlock(&dev->dev_lock);
- return ret;
- }
- static int opal_write_shadow_mbr(struct opal_dev *dev,
- struct opal_shadow_mbr *info)
- {
- const struct opal_step mbr_steps[] = {
- { start_admin1LSP_opal_session, &info->key },
- { write_shadow_mbr, info },
- { end_opal_session, }
- };
- int ret;
- if (info->size == 0)
- return 0;
- mutex_lock(&dev->dev_lock);
- setup_opal_dev(dev);
- ret = execute_steps(dev, mbr_steps, ARRAY_SIZE(mbr_steps));
- mutex_unlock(&dev->dev_lock);
- return ret;
- }
- static int opal_save(struct opal_dev *dev, struct opal_lock_unlock *lk_unlk)
- {
- struct opal_suspend_data *suspend;
- suspend = kzalloc(sizeof(*suspend), GFP_KERNEL);
- if (!suspend)
- return -ENOMEM;
- suspend->unlk = *lk_unlk;
- suspend->lr = lk_unlk->session.opal_key.lr;
- mutex_lock(&dev->dev_lock);
- setup_opal_dev(dev);
- add_suspend_info(dev, suspend);
- mutex_unlock(&dev->dev_lock);
- return 0;
- }
- static int opal_add_user_to_lr(struct opal_dev *dev,
- struct opal_lock_unlock *lk_unlk)
- {
- const struct opal_step steps[] = {
- { start_admin1LSP_opal_session, &lk_unlk->session.opal_key },
- { add_user_to_lr, lk_unlk },
- { end_opal_session, }
- };
- int ret;
- if (lk_unlk->l_state != OPAL_RO &&
- lk_unlk->l_state != OPAL_RW) {
- pr_debug("Locking state was not RO or RW\n");
- return -EINVAL;
- }
- if (lk_unlk->session.who < OPAL_USER1 ||
- lk_unlk->session.who > OPAL_USER9) {
- pr_debug("Authority was not within the range of users: %d\n",
- lk_unlk->session.who);
- return -EINVAL;
- }
- if (lk_unlk->session.sum) {
- pr_debug("%s not supported in sum. Use setup locking range\n",
- __func__);
- return -EINVAL;
- }
- mutex_lock(&dev->dev_lock);
- setup_opal_dev(dev);
- ret = execute_steps(dev, steps, ARRAY_SIZE(steps));
- mutex_unlock(&dev->dev_lock);
- return ret;
- }
- static int opal_reverttper(struct opal_dev *dev, struct opal_key *opal, bool psid)
- {
- /* controller will terminate session */
- const struct opal_step revert_steps[] = {
- { start_SIDASP_opal_session, opal },
- { revert_tper, }
- };
- const struct opal_step psid_revert_steps[] = {
- { start_PSID_opal_session, opal },
- { revert_tper, }
- };
- int ret;
- mutex_lock(&dev->dev_lock);
- setup_opal_dev(dev);
- if (psid)
- ret = execute_steps(dev, psid_revert_steps,
- ARRAY_SIZE(psid_revert_steps));
- else
- ret = execute_steps(dev, revert_steps,
- ARRAY_SIZE(revert_steps));
- mutex_unlock(&dev->dev_lock);
- /*
- * If we successfully reverted lets clean
- * any saved locking ranges.
- */
- if (!ret)
- clean_opal_dev(dev);
- return ret;
- }
- static int __opal_lock_unlock(struct opal_dev *dev,
- struct opal_lock_unlock *lk_unlk)
- {
- const struct opal_step unlock_steps[] = {
- { start_auth_opal_session, &lk_unlk->session },
- { lock_unlock_locking_range, lk_unlk },
- { end_opal_session, }
- };
- const struct opal_step unlock_sum_steps[] = {
- { start_auth_opal_session, &lk_unlk->session },
- { lock_unlock_locking_range_sum, lk_unlk },
- { end_opal_session, }
- };
- if (lk_unlk->session.sum)
- return execute_steps(dev, unlock_sum_steps,
- ARRAY_SIZE(unlock_sum_steps));
- else
- return execute_steps(dev, unlock_steps,
- ARRAY_SIZE(unlock_steps));
- }
- static int __opal_set_mbr_done(struct opal_dev *dev, struct opal_key *key)
- {
- u8 mbr_done_tf = OPAL_TRUE;
- const struct opal_step mbrdone_step[] = {
- { start_admin1LSP_opal_session, key },
- { set_mbr_done, &mbr_done_tf },
- { end_opal_session, }
- };
- return execute_steps(dev, mbrdone_step, ARRAY_SIZE(mbrdone_step));
- }
- static int opal_lock_unlock(struct opal_dev *dev,
- struct opal_lock_unlock *lk_unlk)
- {
- int ret;
- if (lk_unlk->session.who > OPAL_USER9)
- return -EINVAL;
- mutex_lock(&dev->dev_lock);
- ret = __opal_lock_unlock(dev, lk_unlk);
- mutex_unlock(&dev->dev_lock);
- return ret;
- }
- static int opal_take_ownership(struct opal_dev *dev, struct opal_key *opal)
- {
- const struct opal_step owner_steps[] = {
- { start_anybodyASP_opal_session, },
- { get_msid_cpin_pin, },
- { end_opal_session, },
- { start_SIDASP_opal_session, opal },
- { set_sid_cpin_pin, opal },
- { end_opal_session, }
- };
- int ret;
- if (!dev)
- return -ENODEV;
- mutex_lock(&dev->dev_lock);
- setup_opal_dev(dev);
- ret = execute_steps(dev, owner_steps, ARRAY_SIZE(owner_steps));
- mutex_unlock(&dev->dev_lock);
- return ret;
- }
- static int opal_activate_lsp(struct opal_dev *dev,
- struct opal_lr_act *opal_lr_act)
- {
- const struct opal_step active_steps[] = {
- { start_SIDASP_opal_session, &opal_lr_act->key },
- { get_lsp_lifecycle, },
- { activate_lsp, opal_lr_act },
- { end_opal_session, }
- };
- int ret;
- if (!opal_lr_act->num_lrs || opal_lr_act->num_lrs > OPAL_MAX_LRS)
- return -EINVAL;
- mutex_lock(&dev->dev_lock);
- setup_opal_dev(dev);
- ret = execute_steps(dev, active_steps, ARRAY_SIZE(active_steps));
- mutex_unlock(&dev->dev_lock);
- return ret;
- }
- static int opal_setup_locking_range(struct opal_dev *dev,
- struct opal_user_lr_setup *opal_lrs)
- {
- const struct opal_step lr_steps[] = {
- { start_auth_opal_session, &opal_lrs->session },
- { setup_locking_range, opal_lrs },
- { end_opal_session, }
- };
- int ret;
- mutex_lock(&dev->dev_lock);
- setup_opal_dev(dev);
- ret = execute_steps(dev, lr_steps, ARRAY_SIZE(lr_steps));
- mutex_unlock(&dev->dev_lock);
- return ret;
- }
- static int opal_set_new_pw(struct opal_dev *dev, struct opal_new_pw *opal_pw)
- {
- const struct opal_step pw_steps[] = {
- { start_auth_opal_session, &opal_pw->session },
- { set_new_pw, &opal_pw->new_user_pw },
- { end_opal_session, }
- };
- int ret;
- if (opal_pw->session.who > OPAL_USER9 ||
- opal_pw->new_user_pw.who > OPAL_USER9)
- return -EINVAL;
- mutex_lock(&dev->dev_lock);
- setup_opal_dev(dev);
- ret = execute_steps(dev, pw_steps, ARRAY_SIZE(pw_steps));
- mutex_unlock(&dev->dev_lock);
- return ret;
- }
- static int opal_activate_user(struct opal_dev *dev,
- struct opal_session_info *opal_session)
- {
- const struct opal_step act_steps[] = {
- { start_admin1LSP_opal_session, &opal_session->opal_key },
- { internal_activate_user, opal_session },
- { end_opal_session, }
- };
- int ret;
- /* We can't activate Admin1 it's active as manufactured */
- if (opal_session->who < OPAL_USER1 ||
- opal_session->who > OPAL_USER9) {
- pr_debug("Who was not a valid user: %d\n", opal_session->who);
- return -EINVAL;
- }
- mutex_lock(&dev->dev_lock);
- setup_opal_dev(dev);
- ret = execute_steps(dev, act_steps, ARRAY_SIZE(act_steps));
- mutex_unlock(&dev->dev_lock);
- return ret;
- }
- bool opal_unlock_from_suspend(struct opal_dev *dev)
- {
- struct opal_suspend_data *suspend;
- bool was_failure = false;
- int ret = 0;
- if (!dev)
- return false;
- if (!(dev->flags & OPAL_FL_SUPPORTED))
- return false;
- mutex_lock(&dev->dev_lock);
- setup_opal_dev(dev);
- list_for_each_entry(suspend, &dev->unlk_lst, node) {
- dev->tsn = 0;
- dev->hsn = 0;
- ret = __opal_lock_unlock(dev, &suspend->unlk);
- if (ret) {
- pr_debug("Failed to unlock LR %hhu with sum %d\n",
- suspend->unlk.session.opal_key.lr,
- suspend->unlk.session.sum);
- was_failure = true;
- }
- if (dev->flags & OPAL_FL_MBR_ENABLED) {
- ret = __opal_set_mbr_done(dev, &suspend->unlk.session.opal_key);
- if (ret)
- pr_debug("Failed to set MBR Done in S3 resume\n");
- }
- }
- mutex_unlock(&dev->dev_lock);
- return was_failure;
- }
- EXPORT_SYMBOL(opal_unlock_from_suspend);
- static int opal_read_table(struct opal_dev *dev,
- struct opal_read_write_table *rw_tbl)
- {
- const struct opal_step read_table_steps[] = {
- { start_admin1LSP_opal_session, &rw_tbl->key },
- { read_table_data, rw_tbl },
- { end_opal_session, }
- };
- int ret = 0;
- if (!rw_tbl->size)
- return ret;
- return execute_steps(dev, read_table_steps,
- ARRAY_SIZE(read_table_steps));
- }
- static int opal_write_table(struct opal_dev *dev,
- struct opal_read_write_table *rw_tbl)
- {
- const struct opal_step write_table_steps[] = {
- { start_admin1LSP_opal_session, &rw_tbl->key },
- { write_table_data, rw_tbl },
- { end_opal_session, }
- };
- int ret = 0;
- if (!rw_tbl->size)
- return ret;
- return execute_steps(dev, write_table_steps,
- ARRAY_SIZE(write_table_steps));
- }
- static int opal_generic_read_write_table(struct opal_dev *dev,
- struct opal_read_write_table *rw_tbl)
- {
- int ret, bit_set;
- mutex_lock(&dev->dev_lock);
- setup_opal_dev(dev);
- bit_set = fls64(rw_tbl->flags) - 1;
- switch (bit_set) {
- case OPAL_READ_TABLE:
- ret = opal_read_table(dev, rw_tbl);
- break;
- case OPAL_WRITE_TABLE:
- ret = opal_write_table(dev, rw_tbl);
- break;
- default:
- pr_debug("Invalid bit set in the flag (%016llx).\n",
- rw_tbl->flags);
- ret = -EINVAL;
- break;
- }
- mutex_unlock(&dev->dev_lock);
- return ret;
- }
- static int opal_get_status(struct opal_dev *dev, void __user *data)
- {
- struct opal_status sts = {0};
- /*
- * check_opal_support() error is not fatal,
- * !dev->supported is a valid condition
- */
- if (!check_opal_support(dev))
- sts.flags = dev->flags;
- if (copy_to_user(data, &sts, sizeof(sts))) {
- pr_debug("Error copying status to userspace\n");
- return -EFAULT;
- }
- return 0;
- }
- int sed_ioctl(struct opal_dev *dev, unsigned int cmd, void __user *arg)
- {
- void *p;
- int ret = -ENOTTY;
- if (!capable(CAP_SYS_ADMIN))
- return -EACCES;
- if (!dev)
- return -ENOTSUPP;
- if (!(dev->flags & OPAL_FL_SUPPORTED))
- return -ENOTSUPP;
- if (cmd & IOC_IN) {
- p = memdup_user(arg, _IOC_SIZE(cmd));
- if (IS_ERR(p))
- return PTR_ERR(p);
- }
- switch (cmd) {
- case IOC_OPAL_SAVE:
- ret = opal_save(dev, p);
- break;
- case IOC_OPAL_LOCK_UNLOCK:
- ret = opal_lock_unlock(dev, p);
- break;
- case IOC_OPAL_TAKE_OWNERSHIP:
- ret = opal_take_ownership(dev, p);
- break;
- case IOC_OPAL_ACTIVATE_LSP:
- ret = opal_activate_lsp(dev, p);
- break;
- case IOC_OPAL_SET_PW:
- ret = opal_set_new_pw(dev, p);
- break;
- case IOC_OPAL_ACTIVATE_USR:
- ret = opal_activate_user(dev, p);
- break;
- case IOC_OPAL_REVERT_TPR:
- ret = opal_reverttper(dev, p, false);
- break;
- case IOC_OPAL_LR_SETUP:
- ret = opal_setup_locking_range(dev, p);
- break;
- case IOC_OPAL_ADD_USR_TO_LR:
- ret = opal_add_user_to_lr(dev, p);
- break;
- case IOC_OPAL_ENABLE_DISABLE_MBR:
- ret = opal_enable_disable_shadow_mbr(dev, p);
- break;
- case IOC_OPAL_MBR_DONE:
- ret = opal_set_mbr_done(dev, p);
- break;
- case IOC_OPAL_WRITE_SHADOW_MBR:
- ret = opal_write_shadow_mbr(dev, p);
- break;
- case IOC_OPAL_ERASE_LR:
- ret = opal_erase_locking_range(dev, p);
- break;
- case IOC_OPAL_SECURE_ERASE_LR:
- ret = opal_secure_erase_locking_range(dev, p);
- break;
- case IOC_OPAL_PSID_REVERT_TPR:
- ret = opal_reverttper(dev, p, true);
- break;
- case IOC_OPAL_GENERIC_TABLE_RW:
- ret = opal_generic_read_write_table(dev, p);
- break;
- case IOC_OPAL_GET_STATUS:
- ret = opal_get_status(dev, arg);
- break;
- default:
- break;
- }
- if (cmd & IOC_IN)
- kfree(p);
- return ret;
- }
- EXPORT_SYMBOL_GPL(sed_ioctl);
|