1 // SPDX-License-Identifier: GPL-2.0 2 /* 3 * Copyright © 2016 Intel Corporation 4 * 5 * Authors: 6 * Scott Bauer <scott.bauer@intel.com> 7 * Rafael Antognolli <rafael.antognolli@intel.com> 8 */ 9 10 #define pr_fmt(fmt) KBUILD_MODNAME ":OPAL: " fmt 11 12 #include <linux/delay.h> 13 #include <linux/device.h> 14 #include <linux/kernel.h> 15 #include <linux/list.h> 16 #include <linux/genhd.h> 17 #include <linux/slab.h> 18 #include <linux/uaccess.h> 19 #include <uapi/linux/sed-opal.h> 20 #include <linux/sed-opal.h> 21 #include <linux/string.h> 22 #include <linux/kdev_t.h> 23 24 #include "opal_proto.h" 25 26 #define IO_BUFFER_LENGTH 2048 27 #define MAX_TOKS 64 28 29 /* Number of bytes needed by cmd_finalize. */ 30 #define CMD_FINALIZE_BYTES_NEEDED 7 31 32 struct opal_step { 33 int (*fn)(struct opal_dev *dev, void *data); 34 void *data; 35 }; 36 typedef int (cont_fn)(struct opal_dev *dev); 37 38 enum opal_atom_width { 39 OPAL_WIDTH_TINY, 40 OPAL_WIDTH_SHORT, 41 OPAL_WIDTH_MEDIUM, 42 OPAL_WIDTH_LONG, 43 OPAL_WIDTH_TOKEN 44 }; 45 46 /* 47 * On the parsed response, we don't store again the toks that are already 48 * stored in the response buffer. Instead, for each token, we just store a 49 * pointer to the position in the buffer where the token starts, and the size 50 * of the token in bytes. 51 */ 52 struct opal_resp_tok { 53 const u8 *pos; 54 size_t len; 55 enum opal_response_token type; 56 enum opal_atom_width width; 57 union { 58 u64 u; 59 s64 s; 60 } stored; 61 }; 62 63 /* 64 * From the response header it's not possible to know how many tokens there are 65 * on the payload. So we hardcode that the maximum will be MAX_TOKS, and later 66 * if we start dealing with messages that have more than that, we can increase 67 * this number. This is done to avoid having to make two passes through the 68 * response, the first one counting how many tokens we have and the second one 69 * actually storing the positions. 70 */ 71 struct parsed_resp { 72 int num; 73 struct opal_resp_tok toks[MAX_TOKS]; 74 }; 75 76 struct opal_dev { 77 bool supported; 78 bool mbr_enabled; 79 80 void *data; 81 sec_send_recv *send_recv; 82 83 struct mutex dev_lock; 84 u16 comid; 85 u32 hsn; 86 u32 tsn; 87 u64 align; 88 u64 lowest_lba; 89 90 size_t pos; 91 u8 cmd[IO_BUFFER_LENGTH]; 92 u8 resp[IO_BUFFER_LENGTH]; 93 94 struct parsed_resp parsed; 95 size_t prev_d_len; 96 void *prev_data; 97 98 struct list_head unlk_lst; 99 }; 100 101 102 static const u8 opaluid[][OPAL_UID_LENGTH] = { 103 /* users */ 104 [OPAL_SMUID_UID] = 105 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff }, 106 [OPAL_THISSP_UID] = 107 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 }, 108 [OPAL_ADMINSP_UID] = 109 { 0x00, 0x00, 0x02, 0x05, 0x00, 0x00, 0x00, 0x01 }, 110 [OPAL_LOCKINGSP_UID] = 111 { 0x00, 0x00, 0x02, 0x05, 0x00, 0x00, 0x00, 0x02 }, 112 [OPAL_ENTERPRISE_LOCKINGSP_UID] = 113 { 0x00, 0x00, 0x02, 0x05, 0x00, 0x01, 0x00, 0x01 }, 114 [OPAL_ANYBODY_UID] = 115 { 0x00, 0x00, 0x00, 0x09, 0x00, 0x00, 0x00, 0x01 }, 116 [OPAL_SID_UID] = 117 { 0x00, 0x00, 0x00, 0x09, 0x00, 0x00, 0x00, 0x06 }, 118 [OPAL_ADMIN1_UID] = 119 { 0x00, 0x00, 0x00, 0x09, 0x00, 0x01, 0x00, 0x01 }, 120 [OPAL_USER1_UID] = 121 { 0x00, 0x00, 0x00, 0x09, 0x00, 0x03, 0x00, 0x01 }, 122 [OPAL_USER2_UID] = 123 { 0x00, 0x00, 0x00, 0x09, 0x00, 0x03, 0x00, 0x02 }, 124 [OPAL_PSID_UID] = 125 { 0x00, 0x00, 0x00, 0x09, 0x00, 0x01, 0xff, 0x01 }, 126 [OPAL_ENTERPRISE_BANDMASTER0_UID] = 127 { 0x00, 0x00, 0x00, 0x09, 0x00, 0x00, 0x80, 0x01 }, 128 [OPAL_ENTERPRISE_ERASEMASTER_UID] = 129 { 0x00, 0x00, 0x00, 0x09, 0x00, 0x00, 0x84, 0x01 }, 130 131 /* tables */ 132 [OPAL_TABLE_TABLE] 133 { 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x01 }, 134 [OPAL_LOCKINGRANGE_GLOBAL] = 135 { 0x00, 0x00, 0x08, 0x02, 0x00, 0x00, 0x00, 0x01 }, 136 [OPAL_LOCKINGRANGE_ACE_RDLOCKED] = 137 { 0x00, 0x00, 0x00, 0x08, 0x00, 0x03, 0xE0, 0x01 }, 138 [OPAL_LOCKINGRANGE_ACE_WRLOCKED] = 139 { 0x00, 0x00, 0x00, 0x08, 0x00, 0x03, 0xE8, 0x01 }, 140 [OPAL_MBRCONTROL] = 141 { 0x00, 0x00, 0x08, 0x03, 0x00, 0x00, 0x00, 0x01 }, 142 [OPAL_MBR] = 143 { 0x00, 0x00, 0x08, 0x04, 0x00, 0x00, 0x00, 0x00 }, 144 [OPAL_AUTHORITY_TABLE] = 145 { 0x00, 0x00, 0x00, 0x09, 0x00, 0x00, 0x00, 0x00}, 146 [OPAL_C_PIN_TABLE] = 147 { 0x00, 0x00, 0x00, 0x0B, 0x00, 0x00, 0x00, 0x00}, 148 [OPAL_LOCKING_INFO_TABLE] = 149 { 0x00, 0x00, 0x08, 0x01, 0x00, 0x00, 0x00, 0x01 }, 150 [OPAL_ENTERPRISE_LOCKING_INFO_TABLE] = 151 { 0x00, 0x00, 0x08, 0x01, 0x00, 0x00, 0x00, 0x00 }, 152 153 /* C_PIN_TABLE object ID's */ 154 [OPAL_C_PIN_MSID] = 155 { 0x00, 0x00, 0x00, 0x0B, 0x00, 0x00, 0x84, 0x02}, 156 [OPAL_C_PIN_SID] = 157 { 0x00, 0x00, 0x00, 0x0B, 0x00, 0x00, 0x00, 0x01}, 158 [OPAL_C_PIN_ADMIN1] = 159 { 0x00, 0x00, 0x00, 0x0B, 0x00, 0x01, 0x00, 0x01}, 160 161 /* half UID's (only first 4 bytes used) */ 162 [OPAL_HALF_UID_AUTHORITY_OBJ_REF] = 163 { 0x00, 0x00, 0x0C, 0x05, 0xff, 0xff, 0xff, 0xff }, 164 [OPAL_HALF_UID_BOOLEAN_ACE] = 165 { 0x00, 0x00, 0x04, 0x0E, 0xff, 0xff, 0xff, 0xff }, 166 167 /* special value for omitted optional parameter */ 168 [OPAL_UID_HEXFF] = 169 { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff}, 170 }; 171 172 /* 173 * TCG Storage SSC Methods. 174 * Derived from: TCG_Storage_Architecture_Core_Spec_v2.01_r1.00 175 * Section: 6.3 Assigned UIDs 176 */ 177 static const u8 opalmethod[][OPAL_METHOD_LENGTH] = { 178 [OPAL_PROPERTIES] = 179 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x01 }, 180 [OPAL_STARTSESSION] = 181 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x02 }, 182 [OPAL_REVERT] = 183 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x02, 0x02 }, 184 [OPAL_ACTIVATE] = 185 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x02, 0x03 }, 186 [OPAL_EGET] = 187 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x06 }, 188 [OPAL_ESET] = 189 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x07 }, 190 [OPAL_NEXT] = 191 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x08 }, 192 [OPAL_EAUTHENTICATE] = 193 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x0c }, 194 [OPAL_GETACL] = 195 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x0d }, 196 [OPAL_GENKEY] = 197 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x10 }, 198 [OPAL_REVERTSP] = 199 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x11 }, 200 [OPAL_GET] = 201 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x16 }, 202 [OPAL_SET] = 203 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x17 }, 204 [OPAL_AUTHENTICATE] = 205 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x1c }, 206 [OPAL_RANDOM] = 207 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x06, 0x01 }, 208 [OPAL_ERASE] = 209 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x08, 0x03 }, 210 }; 211 212 static int end_opal_session_error(struct opal_dev *dev); 213 static int opal_discovery0_step(struct opal_dev *dev); 214 215 struct opal_suspend_data { 216 struct opal_lock_unlock unlk; 217 u8 lr; 218 struct list_head node; 219 }; 220 221 /* 222 * Derived from: 223 * TCG_Storage_Architecture_Core_Spec_v2.01_r1.00 224 * Section: 5.1.5 Method Status Codes 225 */ 226 static const char * const opal_errors[] = { 227 "Success", 228 "Not Authorized", 229 "Unknown Error", 230 "SP Busy", 231 "SP Failed", 232 "SP Disabled", 233 "SP Frozen", 234 "No Sessions Available", 235 "Uniqueness Conflict", 236 "Insufficient Space", 237 "Insufficient Rows", 238 "Invalid Function", 239 "Invalid Parameter", 240 "Invalid Reference", 241 "Unknown Error", 242 "TPER Malfunction", 243 "Transaction Failure", 244 "Response Overflow", 245 "Authority Locked Out", 246 }; 247 248 static const char *opal_error_to_human(int error) 249 { 250 if (error == 0x3f) 251 return "Failed"; 252 253 if (error >= ARRAY_SIZE(opal_errors) || error < 0) 254 return "Unknown Error"; 255 256 return opal_errors[error]; 257 } 258 259 static void print_buffer(const u8 *ptr, u32 length) 260 { 261 #ifdef DEBUG 262 print_hex_dump_bytes("OPAL: ", DUMP_PREFIX_OFFSET, ptr, length); 263 pr_debug("\n"); 264 #endif 265 } 266 267 static bool check_tper(const void *data) 268 { 269 const struct d0_tper_features *tper = data; 270 u8 flags = tper->supported_features; 271 272 if (!(flags & TPER_SYNC_SUPPORTED)) { 273 pr_debug("TPer sync not supported. flags = %d\n", 274 tper->supported_features); 275 return false; 276 } 277 278 return true; 279 } 280 281 static bool check_mbrenabled(const void *data) 282 { 283 const struct d0_locking_features *lfeat = data; 284 u8 sup_feat = lfeat->supported_features; 285 286 return !!(sup_feat & MBR_ENABLED_MASK); 287 } 288 289 static bool check_sum(const void *data) 290 { 291 const struct d0_single_user_mode *sum = data; 292 u32 nlo = be32_to_cpu(sum->num_locking_objects); 293 294 if (nlo == 0) { 295 pr_debug("Need at least one locking object.\n"); 296 return false; 297 } 298 299 pr_debug("Number of locking objects: %d\n", nlo); 300 301 return true; 302 } 303 304 static u16 get_comid_v100(const void *data) 305 { 306 const struct d0_opal_v100 *v100 = data; 307 308 return be16_to_cpu(v100->baseComID); 309 } 310 311 static u16 get_comid_v200(const void *data) 312 { 313 const struct d0_opal_v200 *v200 = data; 314 315 return be16_to_cpu(v200->baseComID); 316 } 317 318 static int opal_send_cmd(struct opal_dev *dev) 319 { 320 return dev->send_recv(dev->data, dev->comid, TCG_SECP_01, 321 dev->cmd, IO_BUFFER_LENGTH, 322 true); 323 } 324 325 static int opal_recv_cmd(struct opal_dev *dev) 326 { 327 return dev->send_recv(dev->data, dev->comid, TCG_SECP_01, 328 dev->resp, IO_BUFFER_LENGTH, 329 false); 330 } 331 332 static int opal_recv_check(struct opal_dev *dev) 333 { 334 size_t buflen = IO_BUFFER_LENGTH; 335 void *buffer = dev->resp; 336 struct opal_header *hdr = buffer; 337 int ret; 338 339 do { 340 pr_debug("Sent OPAL command: outstanding=%d, minTransfer=%d\n", 341 hdr->cp.outstandingData, 342 hdr->cp.minTransfer); 343 344 if (hdr->cp.outstandingData == 0 || 345 hdr->cp.minTransfer != 0) 346 return 0; 347 348 memset(buffer, 0, buflen); 349 ret = opal_recv_cmd(dev); 350 } while (!ret); 351 352 return ret; 353 } 354 355 static int opal_send_recv(struct opal_dev *dev, cont_fn *cont) 356 { 357 int ret; 358 359 ret = opal_send_cmd(dev); 360 if (ret) 361 return ret; 362 ret = opal_recv_cmd(dev); 363 if (ret) 364 return ret; 365 ret = opal_recv_check(dev); 366 if (ret) 367 return ret; 368 return cont(dev); 369 } 370 371 static void check_geometry(struct opal_dev *dev, const void *data) 372 { 373 const struct d0_geometry_features *geo = data; 374 375 dev->align = geo->alignment_granularity; 376 dev->lowest_lba = geo->lowest_aligned_lba; 377 } 378 379 static int execute_step(struct opal_dev *dev, 380 const struct opal_step *step, size_t stepIndex) 381 { 382 int error = step->fn(dev, step->data); 383 384 if (error) { 385 pr_debug("Step %zu (%pS) failed with error %d: %s\n", 386 stepIndex, step->fn, error, 387 opal_error_to_human(error)); 388 } 389 390 return error; 391 } 392 393 static int execute_steps(struct opal_dev *dev, 394 const struct opal_step *steps, size_t n_steps) 395 { 396 size_t state = 0; 397 int error; 398 399 /* first do a discovery0 */ 400 error = opal_discovery0_step(dev); 401 if (error) 402 return error; 403 404 for (state = 0; state < n_steps; state++) { 405 error = execute_step(dev, &steps[state], state); 406 if (error) 407 goto out_error; 408 } 409 410 return 0; 411 412 out_error: 413 /* 414 * For each OPAL command the first step in steps starts some sort of 415 * session. If an error occurred in the initial discovery0 or if an 416 * error occurred in the first step (and thus stopping the loop with 417 * state == 0) then there was an error before or during the attempt to 418 * start a session. Therefore we shouldn't attempt to terminate a 419 * session, as one has not yet been created. 420 */ 421 if (state > 0) 422 end_opal_session_error(dev); 423 424 return error; 425 } 426 427 static int opal_discovery0_end(struct opal_dev *dev) 428 { 429 bool found_com_id = false, supported = true, single_user = false; 430 const struct d0_header *hdr = (struct d0_header *)dev->resp; 431 const u8 *epos = dev->resp, *cpos = dev->resp; 432 u16 comid = 0; 433 u32 hlen = be32_to_cpu(hdr->length); 434 435 print_buffer(dev->resp, hlen); 436 dev->mbr_enabled = false; 437 438 if (hlen > IO_BUFFER_LENGTH - sizeof(*hdr)) { 439 pr_debug("Discovery length overflows buffer (%zu+%u)/%u\n", 440 sizeof(*hdr), hlen, IO_BUFFER_LENGTH); 441 return -EFAULT; 442 } 443 444 epos += hlen; /* end of buffer */ 445 cpos += sizeof(*hdr); /* current position on buffer */ 446 447 while (cpos < epos && supported) { 448 const struct d0_features *body = 449 (const struct d0_features *)cpos; 450 451 switch (be16_to_cpu(body->code)) { 452 case FC_TPER: 453 supported = check_tper(body->features); 454 break; 455 case FC_SINGLEUSER: 456 single_user = check_sum(body->features); 457 break; 458 case FC_GEOMETRY: 459 check_geometry(dev, body); 460 break; 461 case FC_LOCKING: 462 dev->mbr_enabled = check_mbrenabled(body->features); 463 break; 464 case FC_ENTERPRISE: 465 case FC_DATASTORE: 466 /* some ignored properties */ 467 pr_debug("Found OPAL feature description: %d\n", 468 be16_to_cpu(body->code)); 469 break; 470 case FC_OPALV100: 471 comid = get_comid_v100(body->features); 472 found_com_id = true; 473 break; 474 case FC_OPALV200: 475 comid = get_comid_v200(body->features); 476 found_com_id = true; 477 break; 478 case 0xbfff ... 0xffff: 479 /* vendor specific, just ignore */ 480 break; 481 default: 482 pr_debug("OPAL Unknown feature: %d\n", 483 be16_to_cpu(body->code)); 484 485 } 486 cpos += body->length + 4; 487 } 488 489 if (!supported) { 490 pr_debug("This device is not Opal enabled. Not Supported!\n"); 491 return -EOPNOTSUPP; 492 } 493 494 if (!single_user) 495 pr_debug("Device doesn't support single user mode\n"); 496 497 498 if (!found_com_id) { 499 pr_debug("Could not find OPAL comid for device. Returning early\n"); 500 return -EOPNOTSUPP; 501 } 502 503 dev->comid = comid; 504 505 return 0; 506 } 507 508 static int opal_discovery0(struct opal_dev *dev, void *data) 509 { 510 int ret; 511 512 memset(dev->resp, 0, IO_BUFFER_LENGTH); 513 dev->comid = OPAL_DISCOVERY_COMID; 514 ret = opal_recv_cmd(dev); 515 if (ret) 516 return ret; 517 518 return opal_discovery0_end(dev); 519 } 520 521 static int opal_discovery0_step(struct opal_dev *dev) 522 { 523 const struct opal_step discovery0_step = { 524 opal_discovery0, 525 }; 526 527 return execute_step(dev, &discovery0_step, 0); 528 } 529 530 static size_t remaining_size(struct opal_dev *cmd) 531 { 532 return IO_BUFFER_LENGTH - cmd->pos; 533 } 534 535 static bool can_add(int *err, struct opal_dev *cmd, size_t len) 536 { 537 if (*err) 538 return false; 539 540 if (remaining_size(cmd) < len) { 541 pr_debug("Error adding %zu bytes: end of buffer.\n", len); 542 *err = -ERANGE; 543 return false; 544 } 545 546 return true; 547 } 548 549 static void add_token_u8(int *err, struct opal_dev *cmd, u8 tok) 550 { 551 if (!can_add(err, cmd, 1)) 552 return; 553 554 cmd->cmd[cmd->pos++] = tok; 555 } 556 557 static void add_short_atom_header(struct opal_dev *cmd, bool bytestring, 558 bool has_sign, int len) 559 { 560 u8 atom; 561 int err = 0; 562 563 atom = SHORT_ATOM_ID; 564 atom |= bytestring ? SHORT_ATOM_BYTESTRING : 0; 565 atom |= has_sign ? SHORT_ATOM_SIGNED : 0; 566 atom |= len & SHORT_ATOM_LEN_MASK; 567 568 add_token_u8(&err, cmd, atom); 569 } 570 571 static void add_medium_atom_header(struct opal_dev *cmd, bool bytestring, 572 bool has_sign, int len) 573 { 574 u8 header0; 575 576 header0 = MEDIUM_ATOM_ID; 577 header0 |= bytestring ? MEDIUM_ATOM_BYTESTRING : 0; 578 header0 |= has_sign ? MEDIUM_ATOM_SIGNED : 0; 579 header0 |= (len >> 8) & MEDIUM_ATOM_LEN_MASK; 580 581 cmd->cmd[cmd->pos++] = header0; 582 cmd->cmd[cmd->pos++] = len; 583 } 584 585 static void add_token_u64(int *err, struct opal_dev *cmd, u64 number) 586 { 587 size_t len; 588 int msb; 589 590 if (!(number & ~TINY_ATOM_DATA_MASK)) { 591 add_token_u8(err, cmd, number); 592 return; 593 } 594 595 msb = fls64(number); 596 len = DIV_ROUND_UP(msb, 8); 597 598 if (!can_add(err, cmd, len + 1)) { 599 pr_debug("Error adding u64: end of buffer.\n"); 600 return; 601 } 602 add_short_atom_header(cmd, false, false, len); 603 while (len--) 604 add_token_u8(err, cmd, number >> (len * 8)); 605 } 606 607 static u8 *add_bytestring_header(int *err, struct opal_dev *cmd, size_t len) 608 { 609 size_t header_len = 1; 610 bool is_short_atom = true; 611 612 if (len & ~SHORT_ATOM_LEN_MASK) { 613 header_len = 2; 614 is_short_atom = false; 615 } 616 617 if (!can_add(err, cmd, header_len + len)) { 618 pr_debug("Error adding bytestring: end of buffer.\n"); 619 return NULL; 620 } 621 622 if (is_short_atom) 623 add_short_atom_header(cmd, true, false, len); 624 else 625 add_medium_atom_header(cmd, true, false, len); 626 627 return &cmd->cmd[cmd->pos]; 628 } 629 630 static void add_token_bytestring(int *err, struct opal_dev *cmd, 631 const u8 *bytestring, size_t len) 632 { 633 u8 *start; 634 635 start = add_bytestring_header(err, cmd, len); 636 if (!start) 637 return; 638 memcpy(start, bytestring, len); 639 cmd->pos += len; 640 } 641 642 static int build_locking_range(u8 *buffer, size_t length, u8 lr) 643 { 644 if (length > OPAL_UID_LENGTH) { 645 pr_debug("Can't build locking range. Length OOB\n"); 646 return -ERANGE; 647 } 648 649 memcpy(buffer, opaluid[OPAL_LOCKINGRANGE_GLOBAL], OPAL_UID_LENGTH); 650 651 if (lr == 0) 652 return 0; 653 654 buffer[5] = LOCKING_RANGE_NON_GLOBAL; 655 buffer[7] = lr; 656 657 return 0; 658 } 659 660 static int build_locking_user(u8 *buffer, size_t length, u8 lr) 661 { 662 if (length > OPAL_UID_LENGTH) { 663 pr_debug("Can't build locking range user. Length OOB\n"); 664 return -ERANGE; 665 } 666 667 memcpy(buffer, opaluid[OPAL_USER1_UID], OPAL_UID_LENGTH); 668 669 buffer[7] = lr + 1; 670 671 return 0; 672 } 673 674 static void set_comid(struct opal_dev *cmd, u16 comid) 675 { 676 struct opal_header *hdr = (struct opal_header *)cmd->cmd; 677 678 hdr->cp.extendedComID[0] = comid >> 8; 679 hdr->cp.extendedComID[1] = comid; 680 hdr->cp.extendedComID[2] = 0; 681 hdr->cp.extendedComID[3] = 0; 682 } 683 684 static int cmd_finalize(struct opal_dev *cmd, u32 hsn, u32 tsn) 685 { 686 struct opal_header *hdr; 687 int err = 0; 688 689 /* 690 * Close the parameter list opened from cmd_start. 691 * The number of bytes added must be equal to 692 * CMD_FINALIZE_BYTES_NEEDED. 693 */ 694 add_token_u8(&err, cmd, OPAL_ENDLIST); 695 696 add_token_u8(&err, cmd, OPAL_ENDOFDATA); 697 add_token_u8(&err, cmd, OPAL_STARTLIST); 698 add_token_u8(&err, cmd, 0); 699 add_token_u8(&err, cmd, 0); 700 add_token_u8(&err, cmd, 0); 701 add_token_u8(&err, cmd, OPAL_ENDLIST); 702 703 if (err) { 704 pr_debug("Error finalizing command.\n"); 705 return -EFAULT; 706 } 707 708 hdr = (struct opal_header *) cmd->cmd; 709 710 hdr->pkt.tsn = cpu_to_be32(tsn); 711 hdr->pkt.hsn = cpu_to_be32(hsn); 712 713 hdr->subpkt.length = cpu_to_be32(cmd->pos - sizeof(*hdr)); 714 while (cmd->pos % 4) { 715 if (cmd->pos >= IO_BUFFER_LENGTH) { 716 pr_debug("Error: Buffer overrun\n"); 717 return -ERANGE; 718 } 719 cmd->cmd[cmd->pos++] = 0; 720 } 721 hdr->pkt.length = cpu_to_be32(cmd->pos - sizeof(hdr->cp) - 722 sizeof(hdr->pkt)); 723 hdr->cp.length = cpu_to_be32(cmd->pos - sizeof(hdr->cp)); 724 725 return 0; 726 } 727 728 static const struct opal_resp_tok *response_get_token( 729 const struct parsed_resp *resp, 730 int n) 731 { 732 const struct opal_resp_tok *tok; 733 734 if (!resp) { 735 pr_debug("Response is NULL\n"); 736 return ERR_PTR(-EINVAL); 737 } 738 739 if (n >= resp->num) { 740 pr_debug("Token number doesn't exist: %d, resp: %d\n", 741 n, resp->num); 742 return ERR_PTR(-EINVAL); 743 } 744 745 tok = &resp->toks[n]; 746 if (tok->len == 0) { 747 pr_debug("Token length must be non-zero\n"); 748 return ERR_PTR(-EINVAL); 749 } 750 751 return tok; 752 } 753 754 static ssize_t response_parse_tiny(struct opal_resp_tok *tok, 755 const u8 *pos) 756 { 757 tok->pos = pos; 758 tok->len = 1; 759 tok->width = OPAL_WIDTH_TINY; 760 761 if (pos[0] & TINY_ATOM_SIGNED) { 762 tok->type = OPAL_DTA_TOKENID_SINT; 763 } else { 764 tok->type = OPAL_DTA_TOKENID_UINT; 765 tok->stored.u = pos[0] & 0x3f; 766 } 767 768 return tok->len; 769 } 770 771 static ssize_t response_parse_short(struct opal_resp_tok *tok, 772 const u8 *pos) 773 { 774 tok->pos = pos; 775 tok->len = (pos[0] & SHORT_ATOM_LEN_MASK) + 1; 776 tok->width = OPAL_WIDTH_SHORT; 777 778 if (pos[0] & SHORT_ATOM_BYTESTRING) { 779 tok->type = OPAL_DTA_TOKENID_BYTESTRING; 780 } else if (pos[0] & SHORT_ATOM_SIGNED) { 781 tok->type = OPAL_DTA_TOKENID_SINT; 782 } else { 783 u64 u_integer = 0; 784 ssize_t i, b = 0; 785 786 tok->type = OPAL_DTA_TOKENID_UINT; 787 if (tok->len > 9) { 788 pr_debug("uint64 with more than 8 bytes\n"); 789 return -EINVAL; 790 } 791 for (i = tok->len - 1; i > 0; i--) { 792 u_integer |= ((u64)pos[i] << (8 * b)); 793 b++; 794 } 795 tok->stored.u = u_integer; 796 } 797 798 return tok->len; 799 } 800 801 static ssize_t response_parse_medium(struct opal_resp_tok *tok, 802 const u8 *pos) 803 { 804 tok->pos = pos; 805 tok->len = (((pos[0] & MEDIUM_ATOM_LEN_MASK) << 8) | pos[1]) + 2; 806 tok->width = OPAL_WIDTH_MEDIUM; 807 808 if (pos[0] & MEDIUM_ATOM_BYTESTRING) 809 tok->type = OPAL_DTA_TOKENID_BYTESTRING; 810 else if (pos[0] & MEDIUM_ATOM_SIGNED) 811 tok->type = OPAL_DTA_TOKENID_SINT; 812 else 813 tok->type = OPAL_DTA_TOKENID_UINT; 814 815 return tok->len; 816 } 817 818 static ssize_t response_parse_long(struct opal_resp_tok *tok, 819 const u8 *pos) 820 { 821 tok->pos = pos; 822 tok->len = ((pos[1] << 16) | (pos[2] << 8) | pos[3]) + 4; 823 tok->width = OPAL_WIDTH_LONG; 824 825 if (pos[0] & LONG_ATOM_BYTESTRING) 826 tok->type = OPAL_DTA_TOKENID_BYTESTRING; 827 else if (pos[0] & LONG_ATOM_SIGNED) 828 tok->type = OPAL_DTA_TOKENID_SINT; 829 else 830 tok->type = OPAL_DTA_TOKENID_UINT; 831 832 return tok->len; 833 } 834 835 static ssize_t response_parse_token(struct opal_resp_tok *tok, 836 const u8 *pos) 837 { 838 tok->pos = pos; 839 tok->len = 1; 840 tok->type = OPAL_DTA_TOKENID_TOKEN; 841 tok->width = OPAL_WIDTH_TOKEN; 842 843 return tok->len; 844 } 845 846 static int response_parse(const u8 *buf, size_t length, 847 struct parsed_resp *resp) 848 { 849 const struct opal_header *hdr; 850 struct opal_resp_tok *iter; 851 int num_entries = 0; 852 int total; 853 ssize_t token_length; 854 const u8 *pos; 855 u32 clen, plen, slen; 856 857 if (!buf) 858 return -EFAULT; 859 860 if (!resp) 861 return -EFAULT; 862 863 hdr = (struct opal_header *)buf; 864 pos = buf; 865 pos += sizeof(*hdr); 866 867 clen = be32_to_cpu(hdr->cp.length); 868 plen = be32_to_cpu(hdr->pkt.length); 869 slen = be32_to_cpu(hdr->subpkt.length); 870 pr_debug("Response size: cp: %u, pkt: %u, subpkt: %u\n", 871 clen, plen, slen); 872 873 if (clen == 0 || plen == 0 || slen == 0 || 874 slen > IO_BUFFER_LENGTH - sizeof(*hdr)) { 875 pr_debug("Bad header length. cp: %u, pkt: %u, subpkt: %u\n", 876 clen, plen, slen); 877 print_buffer(pos, sizeof(*hdr)); 878 return -EINVAL; 879 } 880 881 if (pos > buf + length) 882 return -EFAULT; 883 884 iter = resp->toks; 885 total = slen; 886 print_buffer(pos, total); 887 while (total > 0) { 888 if (pos[0] <= TINY_ATOM_BYTE) /* tiny atom */ 889 token_length = response_parse_tiny(iter, pos); 890 else if (pos[0] <= SHORT_ATOM_BYTE) /* short atom */ 891 token_length = response_parse_short(iter, pos); 892 else if (pos[0] <= MEDIUM_ATOM_BYTE) /* medium atom */ 893 token_length = response_parse_medium(iter, pos); 894 else if (pos[0] <= LONG_ATOM_BYTE) /* long atom */ 895 token_length = response_parse_long(iter, pos); 896 else /* TOKEN */ 897 token_length = response_parse_token(iter, pos); 898 899 if (token_length < 0) 900 return token_length; 901 902 pos += token_length; 903 total -= token_length; 904 iter++; 905 num_entries++; 906 } 907 908 resp->num = num_entries; 909 910 return 0; 911 } 912 913 static size_t response_get_string(const struct parsed_resp *resp, int n, 914 const char **store) 915 { 916 u8 skip; 917 const struct opal_resp_tok *tok; 918 919 *store = NULL; 920 tok = response_get_token(resp, n); 921 if (IS_ERR(tok)) 922 return 0; 923 924 if (tok->type != OPAL_DTA_TOKENID_BYTESTRING) { 925 pr_debug("Token is not a byte string!\n"); 926 return 0; 927 } 928 929 switch (tok->width) { 930 case OPAL_WIDTH_TINY: 931 case OPAL_WIDTH_SHORT: 932 skip = 1; 933 break; 934 case OPAL_WIDTH_MEDIUM: 935 skip = 2; 936 break; 937 case OPAL_WIDTH_LONG: 938 skip = 4; 939 break; 940 default: 941 pr_debug("Token has invalid width!\n"); 942 return 0; 943 } 944 945 *store = tok->pos + skip; 946 947 return tok->len - skip; 948 } 949 950 static u64 response_get_u64(const struct parsed_resp *resp, int n) 951 { 952 const struct opal_resp_tok *tok; 953 954 tok = response_get_token(resp, n); 955 if (IS_ERR(tok)) 956 return 0; 957 958 if (tok->type != OPAL_DTA_TOKENID_UINT) { 959 pr_debug("Token is not unsigned int: %d\n", tok->type); 960 return 0; 961 } 962 963 if (tok->width != OPAL_WIDTH_TINY && tok->width != OPAL_WIDTH_SHORT) { 964 pr_debug("Atom is not short or tiny: %d\n", tok->width); 965 return 0; 966 } 967 968 return tok->stored.u; 969 } 970 971 static bool response_token_matches(const struct opal_resp_tok *token, u8 match) 972 { 973 if (IS_ERR(token) || 974 token->type != OPAL_DTA_TOKENID_TOKEN || 975 token->pos[0] != match) 976 return false; 977 return true; 978 } 979 980 static u8 response_status(const struct parsed_resp *resp) 981 { 982 const struct opal_resp_tok *tok; 983 984 tok = response_get_token(resp, 0); 985 if (response_token_matches(tok, OPAL_ENDOFSESSION)) 986 return 0; 987 988 if (resp->num < 5) 989 return DTAERROR_NO_METHOD_STATUS; 990 991 tok = response_get_token(resp, resp->num - 5); 992 if (!response_token_matches(tok, OPAL_STARTLIST)) 993 return DTAERROR_NO_METHOD_STATUS; 994 995 tok = response_get_token(resp, resp->num - 1); 996 if (!response_token_matches(tok, OPAL_ENDLIST)) 997 return DTAERROR_NO_METHOD_STATUS; 998 999 return response_get_u64(resp, resp->num - 4); 1000 } 1001 1002 /* Parses and checks for errors */ 1003 static int parse_and_check_status(struct opal_dev *dev) 1004 { 1005 int error; 1006 1007 print_buffer(dev->cmd, dev->pos); 1008 1009 error = response_parse(dev->resp, IO_BUFFER_LENGTH, &dev->parsed); 1010 if (error) { 1011 pr_debug("Couldn't parse response.\n"); 1012 return error; 1013 } 1014 1015 return response_status(&dev->parsed); 1016 } 1017 1018 static void clear_opal_cmd(struct opal_dev *dev) 1019 { 1020 dev->pos = sizeof(struct opal_header); 1021 memset(dev->cmd, 0, IO_BUFFER_LENGTH); 1022 } 1023 1024 static int cmd_start(struct opal_dev *dev, const u8 *uid, const u8 *method) 1025 { 1026 int err = 0; 1027 1028 clear_opal_cmd(dev); 1029 set_comid(dev, dev->comid); 1030 1031 add_token_u8(&err, dev, OPAL_CALL); 1032 add_token_bytestring(&err, dev, uid, OPAL_UID_LENGTH); 1033 add_token_bytestring(&err, dev, method, OPAL_METHOD_LENGTH); 1034 1035 /* 1036 * Every method call is followed by its parameters enclosed within 1037 * OPAL_STARTLIST and OPAL_ENDLIST tokens. We automatically open the 1038 * parameter list here and close it later in cmd_finalize. 1039 */ 1040 add_token_u8(&err, dev, OPAL_STARTLIST); 1041 1042 return err; 1043 } 1044 1045 static int start_opal_session_cont(struct opal_dev *dev) 1046 { 1047 u32 hsn, tsn; 1048 int error = 0; 1049 1050 error = parse_and_check_status(dev); 1051 if (error) 1052 return error; 1053 1054 hsn = response_get_u64(&dev->parsed, 4); 1055 tsn = response_get_u64(&dev->parsed, 5); 1056 1057 if (hsn == 0 && tsn == 0) { 1058 pr_debug("Couldn't authenticate session\n"); 1059 return -EPERM; 1060 } 1061 1062 dev->hsn = hsn; 1063 dev->tsn = tsn; 1064 1065 return 0; 1066 } 1067 1068 static void add_suspend_info(struct opal_dev *dev, 1069 struct opal_suspend_data *sus) 1070 { 1071 struct opal_suspend_data *iter; 1072 1073 list_for_each_entry(iter, &dev->unlk_lst, node) { 1074 if (iter->lr == sus->lr) { 1075 list_del(&iter->node); 1076 kfree(iter); 1077 break; 1078 } 1079 } 1080 list_add_tail(&sus->node, &dev->unlk_lst); 1081 } 1082 1083 static int end_session_cont(struct opal_dev *dev) 1084 { 1085 dev->hsn = 0; 1086 dev->tsn = 0; 1087 1088 return parse_and_check_status(dev); 1089 } 1090 1091 static int finalize_and_send(struct opal_dev *dev, cont_fn cont) 1092 { 1093 int ret; 1094 1095 ret = cmd_finalize(dev, dev->hsn, dev->tsn); 1096 if (ret) { 1097 pr_debug("Error finalizing command buffer: %d\n", ret); 1098 return ret; 1099 } 1100 1101 print_buffer(dev->cmd, dev->pos); 1102 1103 return opal_send_recv(dev, cont); 1104 } 1105 1106 /* 1107 * request @column from table @table on device @dev. On success, the column 1108 * data will be available in dev->resp->tok[4] 1109 */ 1110 static int generic_get_column(struct opal_dev *dev, const u8 *table, 1111 u64 column) 1112 { 1113 int err; 1114 1115 err = cmd_start(dev, table, opalmethod[OPAL_GET]); 1116 1117 add_token_u8(&err, dev, OPAL_STARTLIST); 1118 1119 add_token_u8(&err, dev, OPAL_STARTNAME); 1120 add_token_u8(&err, dev, OPAL_STARTCOLUMN); 1121 add_token_u64(&err, dev, column); 1122 add_token_u8(&err, dev, OPAL_ENDNAME); 1123 1124 add_token_u8(&err, dev, OPAL_STARTNAME); 1125 add_token_u8(&err, dev, OPAL_ENDCOLUMN); 1126 add_token_u64(&err, dev, column); 1127 add_token_u8(&err, dev, OPAL_ENDNAME); 1128 1129 add_token_u8(&err, dev, OPAL_ENDLIST); 1130 1131 if (err) 1132 return err; 1133 1134 return finalize_and_send(dev, parse_and_check_status); 1135 } 1136 1137 /* 1138 * see TCG SAS 5.3.2.3 for a description of the available columns 1139 * 1140 * the result is provided in dev->resp->tok[4] 1141 */ 1142 static int generic_get_table_info(struct opal_dev *dev, enum opal_uid table, 1143 u64 column) 1144 { 1145 u8 uid[OPAL_UID_LENGTH]; 1146 const unsigned int half = OPAL_UID_LENGTH/2; 1147 1148 /* sed-opal UIDs can be split in two halves: 1149 * first: actual table index 1150 * second: relative index in the table 1151 * so we have to get the first half of the OPAL_TABLE_TABLE and use the 1152 * first part of the target table as relative index into that table 1153 */ 1154 memcpy(uid, opaluid[OPAL_TABLE_TABLE], half); 1155 memcpy(uid+half, opaluid[table], half); 1156 1157 return generic_get_column(dev, uid, column); 1158 } 1159 1160 static int gen_key(struct opal_dev *dev, void *data) 1161 { 1162 u8 uid[OPAL_UID_LENGTH]; 1163 int err; 1164 1165 memcpy(uid, dev->prev_data, min(sizeof(uid), dev->prev_d_len)); 1166 kfree(dev->prev_data); 1167 dev->prev_data = NULL; 1168 1169 err = cmd_start(dev, uid, opalmethod[OPAL_GENKEY]); 1170 1171 if (err) { 1172 pr_debug("Error building gen key command\n"); 1173 return err; 1174 1175 } 1176 1177 return finalize_and_send(dev, parse_and_check_status); 1178 } 1179 1180 static int get_active_key_cont(struct opal_dev *dev) 1181 { 1182 const char *activekey; 1183 size_t keylen; 1184 int error = 0; 1185 1186 error = parse_and_check_status(dev); 1187 if (error) 1188 return error; 1189 1190 keylen = response_get_string(&dev->parsed, 4, &activekey); 1191 if (!activekey) { 1192 pr_debug("%s: Couldn't extract the Activekey from the response\n", 1193 __func__); 1194 return OPAL_INVAL_PARAM; 1195 } 1196 1197 dev->prev_data = kmemdup(activekey, keylen, GFP_KERNEL); 1198 1199 if (!dev->prev_data) 1200 return -ENOMEM; 1201 1202 dev->prev_d_len = keylen; 1203 1204 return 0; 1205 } 1206 1207 static int get_active_key(struct opal_dev *dev, void *data) 1208 { 1209 u8 uid[OPAL_UID_LENGTH]; 1210 int err; 1211 u8 *lr = data; 1212 1213 err = build_locking_range(uid, sizeof(uid), *lr); 1214 if (err) 1215 return err; 1216 1217 err = generic_get_column(dev, uid, OPAL_ACTIVEKEY); 1218 if (err) 1219 return err; 1220 1221 return get_active_key_cont(dev); 1222 } 1223 1224 static int generic_lr_enable_disable(struct opal_dev *dev, 1225 u8 *uid, bool rle, bool wle, 1226 bool rl, bool wl) 1227 { 1228 int err; 1229 1230 err = cmd_start(dev, uid, opalmethod[OPAL_SET]); 1231 1232 add_token_u8(&err, dev, OPAL_STARTNAME); 1233 add_token_u8(&err, dev, OPAL_VALUES); 1234 add_token_u8(&err, dev, OPAL_STARTLIST); 1235 1236 add_token_u8(&err, dev, OPAL_STARTNAME); 1237 add_token_u8(&err, dev, OPAL_READLOCKENABLED); 1238 add_token_u8(&err, dev, rle); 1239 add_token_u8(&err, dev, OPAL_ENDNAME); 1240 1241 add_token_u8(&err, dev, OPAL_STARTNAME); 1242 add_token_u8(&err, dev, OPAL_WRITELOCKENABLED); 1243 add_token_u8(&err, dev, wle); 1244 add_token_u8(&err, dev, OPAL_ENDNAME); 1245 1246 add_token_u8(&err, dev, OPAL_STARTNAME); 1247 add_token_u8(&err, dev, OPAL_READLOCKED); 1248 add_token_u8(&err, dev, rl); 1249 add_token_u8(&err, dev, OPAL_ENDNAME); 1250 1251 add_token_u8(&err, dev, OPAL_STARTNAME); 1252 add_token_u8(&err, dev, OPAL_WRITELOCKED); 1253 add_token_u8(&err, dev, wl); 1254 add_token_u8(&err, dev, OPAL_ENDNAME); 1255 1256 add_token_u8(&err, dev, OPAL_ENDLIST); 1257 add_token_u8(&err, dev, OPAL_ENDNAME); 1258 1259 return err; 1260 } 1261 1262 static inline int enable_global_lr(struct opal_dev *dev, u8 *uid, 1263 struct opal_user_lr_setup *setup) 1264 { 1265 int err; 1266 1267 err = generic_lr_enable_disable(dev, uid, !!setup->RLE, !!setup->WLE, 1268 0, 0); 1269 if (err) 1270 pr_debug("Failed to create enable global lr command\n"); 1271 1272 return err; 1273 } 1274 1275 static int setup_locking_range(struct opal_dev *dev, void *data) 1276 { 1277 u8 uid[OPAL_UID_LENGTH]; 1278 struct opal_user_lr_setup *setup = data; 1279 u8 lr; 1280 int err; 1281 1282 lr = setup->session.opal_key.lr; 1283 err = build_locking_range(uid, sizeof(uid), lr); 1284 if (err) 1285 return err; 1286 1287 if (lr == 0) 1288 err = enable_global_lr(dev, uid, setup); 1289 else { 1290 err = cmd_start(dev, uid, opalmethod[OPAL_SET]); 1291 1292 add_token_u8(&err, dev, OPAL_STARTNAME); 1293 add_token_u8(&err, dev, OPAL_VALUES); 1294 add_token_u8(&err, dev, OPAL_STARTLIST); 1295 1296 add_token_u8(&err, dev, OPAL_STARTNAME); 1297 add_token_u8(&err, dev, OPAL_RANGESTART); 1298 add_token_u64(&err, dev, setup->range_start); 1299 add_token_u8(&err, dev, OPAL_ENDNAME); 1300 1301 add_token_u8(&err, dev, OPAL_STARTNAME); 1302 add_token_u8(&err, dev, OPAL_RANGELENGTH); 1303 add_token_u64(&err, dev, setup->range_length); 1304 add_token_u8(&err, dev, OPAL_ENDNAME); 1305 1306 add_token_u8(&err, dev, OPAL_STARTNAME); 1307 add_token_u8(&err, dev, OPAL_READLOCKENABLED); 1308 add_token_u64(&err, dev, !!setup->RLE); 1309 add_token_u8(&err, dev, OPAL_ENDNAME); 1310 1311 add_token_u8(&err, dev, OPAL_STARTNAME); 1312 add_token_u8(&err, dev, OPAL_WRITELOCKENABLED); 1313 add_token_u64(&err, dev, !!setup->WLE); 1314 add_token_u8(&err, dev, OPAL_ENDNAME); 1315 1316 add_token_u8(&err, dev, OPAL_ENDLIST); 1317 add_token_u8(&err, dev, OPAL_ENDNAME); 1318 } 1319 if (err) { 1320 pr_debug("Error building Setup Locking range command.\n"); 1321 return err; 1322 } 1323 1324 return finalize_and_send(dev, parse_and_check_status); 1325 } 1326 1327 static int start_generic_opal_session(struct opal_dev *dev, 1328 enum opal_uid auth, 1329 enum opal_uid sp_type, 1330 const char *key, 1331 u8 key_len) 1332 { 1333 u32 hsn; 1334 int err; 1335 1336 if (key == NULL && auth != OPAL_ANYBODY_UID) 1337 return OPAL_INVAL_PARAM; 1338 1339 hsn = GENERIC_HOST_SESSION_NUM; 1340 err = cmd_start(dev, opaluid[OPAL_SMUID_UID], 1341 opalmethod[OPAL_STARTSESSION]); 1342 1343 add_token_u64(&err, dev, hsn); 1344 add_token_bytestring(&err, dev, opaluid[sp_type], OPAL_UID_LENGTH); 1345 add_token_u8(&err, dev, 1); 1346 1347 switch (auth) { 1348 case OPAL_ANYBODY_UID: 1349 break; 1350 case OPAL_ADMIN1_UID: 1351 case OPAL_SID_UID: 1352 case OPAL_PSID_UID: 1353 add_token_u8(&err, dev, OPAL_STARTNAME); 1354 add_token_u8(&err, dev, 0); /* HostChallenge */ 1355 add_token_bytestring(&err, dev, key, key_len); 1356 add_token_u8(&err, dev, OPAL_ENDNAME); 1357 add_token_u8(&err, dev, OPAL_STARTNAME); 1358 add_token_u8(&err, dev, 3); /* HostSignAuth */ 1359 add_token_bytestring(&err, dev, opaluid[auth], 1360 OPAL_UID_LENGTH); 1361 add_token_u8(&err, dev, OPAL_ENDNAME); 1362 break; 1363 default: 1364 pr_debug("Cannot start Admin SP session with auth %d\n", auth); 1365 return OPAL_INVAL_PARAM; 1366 } 1367 1368 if (err) { 1369 pr_debug("Error building start adminsp session command.\n"); 1370 return err; 1371 } 1372 1373 return finalize_and_send(dev, start_opal_session_cont); 1374 } 1375 1376 static int start_anybodyASP_opal_session(struct opal_dev *dev, void *data) 1377 { 1378 return start_generic_opal_session(dev, OPAL_ANYBODY_UID, 1379 OPAL_ADMINSP_UID, NULL, 0); 1380 } 1381 1382 static int start_SIDASP_opal_session(struct opal_dev *dev, void *data) 1383 { 1384 int ret; 1385 const u8 *key = dev->prev_data; 1386 1387 if (!key) { 1388 const struct opal_key *okey = data; 1389 1390 ret = start_generic_opal_session(dev, OPAL_SID_UID, 1391 OPAL_ADMINSP_UID, 1392 okey->key, 1393 okey->key_len); 1394 } else { 1395 ret = start_generic_opal_session(dev, OPAL_SID_UID, 1396 OPAL_ADMINSP_UID, 1397 key, dev->prev_d_len); 1398 kfree(key); 1399 dev->prev_data = NULL; 1400 } 1401 1402 return ret; 1403 } 1404 1405 static int start_admin1LSP_opal_session(struct opal_dev *dev, void *data) 1406 { 1407 struct opal_key *key = data; 1408 1409 return start_generic_opal_session(dev, OPAL_ADMIN1_UID, 1410 OPAL_LOCKINGSP_UID, 1411 key->key, key->key_len); 1412 } 1413 1414 static int start_PSID_opal_session(struct opal_dev *dev, void *data) 1415 { 1416 const struct opal_key *okey = data; 1417 1418 return start_generic_opal_session(dev, OPAL_PSID_UID, 1419 OPAL_ADMINSP_UID, 1420 okey->key, 1421 okey->key_len); 1422 } 1423 1424 static int start_auth_opal_session(struct opal_dev *dev, void *data) 1425 { 1426 struct opal_session_info *session = data; 1427 u8 lk_ul_user[OPAL_UID_LENGTH]; 1428 size_t keylen = session->opal_key.key_len; 1429 int err = 0; 1430 1431 u8 *key = session->opal_key.key; 1432 u32 hsn = GENERIC_HOST_SESSION_NUM; 1433 1434 if (session->sum) 1435 err = build_locking_user(lk_ul_user, sizeof(lk_ul_user), 1436 session->opal_key.lr); 1437 else if (session->who != OPAL_ADMIN1 && !session->sum) 1438 err = build_locking_user(lk_ul_user, sizeof(lk_ul_user), 1439 session->who - 1); 1440 else 1441 memcpy(lk_ul_user, opaluid[OPAL_ADMIN1_UID], OPAL_UID_LENGTH); 1442 1443 if (err) 1444 return err; 1445 1446 err = cmd_start(dev, opaluid[OPAL_SMUID_UID], 1447 opalmethod[OPAL_STARTSESSION]); 1448 1449 add_token_u64(&err, dev, hsn); 1450 add_token_bytestring(&err, dev, opaluid[OPAL_LOCKINGSP_UID], 1451 OPAL_UID_LENGTH); 1452 add_token_u8(&err, dev, 1); 1453 add_token_u8(&err, dev, OPAL_STARTNAME); 1454 add_token_u8(&err, dev, 0); 1455 add_token_bytestring(&err, dev, key, keylen); 1456 add_token_u8(&err, dev, OPAL_ENDNAME); 1457 add_token_u8(&err, dev, OPAL_STARTNAME); 1458 add_token_u8(&err, dev, 3); 1459 add_token_bytestring(&err, dev, lk_ul_user, OPAL_UID_LENGTH); 1460 add_token_u8(&err, dev, OPAL_ENDNAME); 1461 1462 if (err) { 1463 pr_debug("Error building STARTSESSION command.\n"); 1464 return err; 1465 } 1466 1467 return finalize_and_send(dev, start_opal_session_cont); 1468 } 1469 1470 static int revert_tper(struct opal_dev *dev, void *data) 1471 { 1472 int err; 1473 1474 err = cmd_start(dev, opaluid[OPAL_ADMINSP_UID], 1475 opalmethod[OPAL_REVERT]); 1476 if (err) { 1477 pr_debug("Error building REVERT TPER command.\n"); 1478 return err; 1479 } 1480 1481 return finalize_and_send(dev, parse_and_check_status); 1482 } 1483 1484 static int internal_activate_user(struct opal_dev *dev, void *data) 1485 { 1486 struct opal_session_info *session = data; 1487 u8 uid[OPAL_UID_LENGTH]; 1488 int err; 1489 1490 memcpy(uid, opaluid[OPAL_USER1_UID], OPAL_UID_LENGTH); 1491 uid[7] = session->who; 1492 1493 err = cmd_start(dev, uid, opalmethod[OPAL_SET]); 1494 add_token_u8(&err, dev, OPAL_STARTNAME); 1495 add_token_u8(&err, dev, OPAL_VALUES); 1496 add_token_u8(&err, dev, OPAL_STARTLIST); 1497 add_token_u8(&err, dev, OPAL_STARTNAME); 1498 add_token_u8(&err, dev, 5); /* Enabled */ 1499 add_token_u8(&err, dev, OPAL_TRUE); 1500 add_token_u8(&err, dev, OPAL_ENDNAME); 1501 add_token_u8(&err, dev, OPAL_ENDLIST); 1502 add_token_u8(&err, dev, OPAL_ENDNAME); 1503 1504 if (err) { 1505 pr_debug("Error building Activate UserN command.\n"); 1506 return err; 1507 } 1508 1509 return finalize_and_send(dev, parse_and_check_status); 1510 } 1511 1512 static int erase_locking_range(struct opal_dev *dev, void *data) 1513 { 1514 struct opal_session_info *session = data; 1515 u8 uid[OPAL_UID_LENGTH]; 1516 int err; 1517 1518 if (build_locking_range(uid, sizeof(uid), session->opal_key.lr) < 0) 1519 return -ERANGE; 1520 1521 err = cmd_start(dev, uid, opalmethod[OPAL_ERASE]); 1522 1523 if (err) { 1524 pr_debug("Error building Erase Locking Range Command.\n"); 1525 return err; 1526 } 1527 1528 return finalize_and_send(dev, parse_and_check_status); 1529 } 1530 1531 static int set_mbr_done(struct opal_dev *dev, void *data) 1532 { 1533 u8 *mbr_done_tf = data; 1534 int err; 1535 1536 err = cmd_start(dev, opaluid[OPAL_MBRCONTROL], 1537 opalmethod[OPAL_SET]); 1538 1539 add_token_u8(&err, dev, OPAL_STARTNAME); 1540 add_token_u8(&err, dev, OPAL_VALUES); 1541 add_token_u8(&err, dev, OPAL_STARTLIST); 1542 add_token_u8(&err, dev, OPAL_STARTNAME); 1543 add_token_u8(&err, dev, OPAL_MBRDONE); 1544 add_token_u8(&err, dev, *mbr_done_tf); /* Done T or F */ 1545 add_token_u8(&err, dev, OPAL_ENDNAME); 1546 add_token_u8(&err, dev, OPAL_ENDLIST); 1547 add_token_u8(&err, dev, OPAL_ENDNAME); 1548 1549 if (err) { 1550 pr_debug("Error Building set MBR Done command\n"); 1551 return err; 1552 } 1553 1554 return finalize_and_send(dev, parse_and_check_status); 1555 } 1556 1557 static int set_mbr_enable_disable(struct opal_dev *dev, void *data) 1558 { 1559 u8 *mbr_en_dis = data; 1560 int err; 1561 1562 err = cmd_start(dev, opaluid[OPAL_MBRCONTROL], 1563 opalmethod[OPAL_SET]); 1564 1565 add_token_u8(&err, dev, OPAL_STARTNAME); 1566 add_token_u8(&err, dev, OPAL_VALUES); 1567 add_token_u8(&err, dev, OPAL_STARTLIST); 1568 add_token_u8(&err, dev, OPAL_STARTNAME); 1569 add_token_u8(&err, dev, OPAL_MBRENABLE); 1570 add_token_u8(&err, dev, *mbr_en_dis); 1571 add_token_u8(&err, dev, OPAL_ENDNAME); 1572 add_token_u8(&err, dev, OPAL_ENDLIST); 1573 add_token_u8(&err, dev, OPAL_ENDNAME); 1574 1575 if (err) { 1576 pr_debug("Error Building set MBR done command\n"); 1577 return err; 1578 } 1579 1580 return finalize_and_send(dev, parse_and_check_status); 1581 } 1582 1583 static int write_shadow_mbr(struct opal_dev *dev, void *data) 1584 { 1585 struct opal_shadow_mbr *shadow = data; 1586 const u8 __user *src; 1587 u8 *dst; 1588 size_t off = 0; 1589 u64 len; 1590 int err = 0; 1591 1592 /* do we fit in the available shadow mbr space? */ 1593 err = generic_get_table_info(dev, OPAL_MBR, OPAL_TABLE_ROWS); 1594 if (err) { 1595 pr_debug("MBR: could not get shadow size\n"); 1596 return err; 1597 } 1598 1599 len = response_get_u64(&dev->parsed, 4); 1600 if (shadow->size > len || shadow->offset > len - shadow->size) { 1601 pr_debug("MBR: does not fit in shadow (%llu vs. %llu)\n", 1602 shadow->offset + shadow->size, len); 1603 return -ENOSPC; 1604 } 1605 1606 /* do the actual transmission(s) */ 1607 src = (u8 __user *)(uintptr_t)shadow->data; 1608 while (off < shadow->size) { 1609 err = cmd_start(dev, opaluid[OPAL_MBR], opalmethod[OPAL_SET]); 1610 add_token_u8(&err, dev, OPAL_STARTNAME); 1611 add_token_u8(&err, dev, OPAL_WHERE); 1612 add_token_u64(&err, dev, shadow->offset + off); 1613 add_token_u8(&err, dev, OPAL_ENDNAME); 1614 1615 add_token_u8(&err, dev, OPAL_STARTNAME); 1616 add_token_u8(&err, dev, OPAL_VALUES); 1617 1618 /* 1619 * The bytestring header is either 1 or 2 bytes, so assume 2. 1620 * There also needs to be enough space to accommodate the 1621 * trailing OPAL_ENDNAME (1 byte) and tokens added by 1622 * cmd_finalize. 1623 */ 1624 len = min(remaining_size(dev) - (2+1+CMD_FINALIZE_BYTES_NEEDED), 1625 (size_t)(shadow->size - off)); 1626 pr_debug("MBR: write bytes %zu+%llu/%llu\n", 1627 off, len, shadow->size); 1628 1629 dst = add_bytestring_header(&err, dev, len); 1630 if (!dst) 1631 break; 1632 if (copy_from_user(dst, src + off, len)) 1633 err = -EFAULT; 1634 dev->pos += len; 1635 1636 add_token_u8(&err, dev, OPAL_ENDNAME); 1637 if (err) 1638 break; 1639 1640 err = finalize_and_send(dev, parse_and_check_status); 1641 if (err) 1642 break; 1643 1644 off += len; 1645 } 1646 1647 return err; 1648 } 1649 1650 static int generic_pw_cmd(u8 *key, size_t key_len, u8 *cpin_uid, 1651 struct opal_dev *dev) 1652 { 1653 int err; 1654 1655 err = cmd_start(dev, cpin_uid, opalmethod[OPAL_SET]); 1656 1657 add_token_u8(&err, dev, OPAL_STARTNAME); 1658 add_token_u8(&err, dev, OPAL_VALUES); 1659 add_token_u8(&err, dev, OPAL_STARTLIST); 1660 add_token_u8(&err, dev, OPAL_STARTNAME); 1661 add_token_u8(&err, dev, OPAL_PIN); 1662 add_token_bytestring(&err, dev, key, key_len); 1663 add_token_u8(&err, dev, OPAL_ENDNAME); 1664 add_token_u8(&err, dev, OPAL_ENDLIST); 1665 add_token_u8(&err, dev, OPAL_ENDNAME); 1666 1667 return err; 1668 } 1669 1670 static int set_new_pw(struct opal_dev *dev, void *data) 1671 { 1672 u8 cpin_uid[OPAL_UID_LENGTH]; 1673 struct opal_session_info *usr = data; 1674 1675 memcpy(cpin_uid, opaluid[OPAL_C_PIN_ADMIN1], OPAL_UID_LENGTH); 1676 1677 if (usr->who != OPAL_ADMIN1) { 1678 cpin_uid[5] = 0x03; 1679 if (usr->sum) 1680 cpin_uid[7] = usr->opal_key.lr + 1; 1681 else 1682 cpin_uid[7] = usr->who; 1683 } 1684 1685 if (generic_pw_cmd(usr->opal_key.key, usr->opal_key.key_len, 1686 cpin_uid, dev)) { 1687 pr_debug("Error building set password command.\n"); 1688 return -ERANGE; 1689 } 1690 1691 return finalize_and_send(dev, parse_and_check_status); 1692 } 1693 1694 static int set_sid_cpin_pin(struct opal_dev *dev, void *data) 1695 { 1696 u8 cpin_uid[OPAL_UID_LENGTH]; 1697 struct opal_key *key = data; 1698 1699 memcpy(cpin_uid, opaluid[OPAL_C_PIN_SID], OPAL_UID_LENGTH); 1700 1701 if (generic_pw_cmd(key->key, key->key_len, cpin_uid, dev)) { 1702 pr_debug("Error building Set SID cpin\n"); 1703 return -ERANGE; 1704 } 1705 return finalize_and_send(dev, parse_and_check_status); 1706 } 1707 1708 static int add_user_to_lr(struct opal_dev *dev, void *data) 1709 { 1710 u8 lr_buffer[OPAL_UID_LENGTH]; 1711 u8 user_uid[OPAL_UID_LENGTH]; 1712 struct opal_lock_unlock *lkul = data; 1713 int err; 1714 1715 memcpy(lr_buffer, opaluid[OPAL_LOCKINGRANGE_ACE_RDLOCKED], 1716 OPAL_UID_LENGTH); 1717 1718 if (lkul->l_state == OPAL_RW) 1719 memcpy(lr_buffer, opaluid[OPAL_LOCKINGRANGE_ACE_WRLOCKED], 1720 OPAL_UID_LENGTH); 1721 1722 lr_buffer[7] = lkul->session.opal_key.lr; 1723 1724 memcpy(user_uid, opaluid[OPAL_USER1_UID], OPAL_UID_LENGTH); 1725 1726 user_uid[7] = lkul->session.who; 1727 1728 err = cmd_start(dev, lr_buffer, opalmethod[OPAL_SET]); 1729 1730 add_token_u8(&err, dev, OPAL_STARTNAME); 1731 add_token_u8(&err, dev, OPAL_VALUES); 1732 1733 add_token_u8(&err, dev, OPAL_STARTLIST); 1734 add_token_u8(&err, dev, OPAL_STARTNAME); 1735 add_token_u8(&err, dev, 3); 1736 1737 add_token_u8(&err, dev, OPAL_STARTLIST); 1738 1739 1740 add_token_u8(&err, dev, OPAL_STARTNAME); 1741 add_token_bytestring(&err, dev, 1742 opaluid[OPAL_HALF_UID_AUTHORITY_OBJ_REF], 1743 OPAL_UID_LENGTH/2); 1744 add_token_bytestring(&err, dev, user_uid, OPAL_UID_LENGTH); 1745 add_token_u8(&err, dev, OPAL_ENDNAME); 1746 1747 1748 add_token_u8(&err, dev, OPAL_STARTNAME); 1749 add_token_bytestring(&err, dev, 1750 opaluid[OPAL_HALF_UID_AUTHORITY_OBJ_REF], 1751 OPAL_UID_LENGTH/2); 1752 add_token_bytestring(&err, dev, user_uid, OPAL_UID_LENGTH); 1753 add_token_u8(&err, dev, OPAL_ENDNAME); 1754 1755 1756 add_token_u8(&err, dev, OPAL_STARTNAME); 1757 add_token_bytestring(&err, dev, opaluid[OPAL_HALF_UID_BOOLEAN_ACE], 1758 OPAL_UID_LENGTH/2); 1759 add_token_u8(&err, dev, 1); 1760 add_token_u8(&err, dev, OPAL_ENDNAME); 1761 1762 1763 add_token_u8(&err, dev, OPAL_ENDLIST); 1764 add_token_u8(&err, dev, OPAL_ENDNAME); 1765 add_token_u8(&err, dev, OPAL_ENDLIST); 1766 add_token_u8(&err, dev, OPAL_ENDNAME); 1767 1768 if (err) { 1769 pr_debug("Error building add user to locking range command.\n"); 1770 return err; 1771 } 1772 1773 return finalize_and_send(dev, parse_and_check_status); 1774 } 1775 1776 static int lock_unlock_locking_range(struct opal_dev *dev, void *data) 1777 { 1778 u8 lr_buffer[OPAL_UID_LENGTH]; 1779 struct opal_lock_unlock *lkul = data; 1780 u8 read_locked = 1, write_locked = 1; 1781 int err = 0; 1782 1783 if (build_locking_range(lr_buffer, sizeof(lr_buffer), 1784 lkul->session.opal_key.lr) < 0) 1785 return -ERANGE; 1786 1787 switch (lkul->l_state) { 1788 case OPAL_RO: 1789 read_locked = 0; 1790 write_locked = 1; 1791 break; 1792 case OPAL_RW: 1793 read_locked = 0; 1794 write_locked = 0; 1795 break; 1796 case OPAL_LK: 1797 /* vars are initialized to locked */ 1798 break; 1799 default: 1800 pr_debug("Tried to set an invalid locking state... returning to uland\n"); 1801 return OPAL_INVAL_PARAM; 1802 } 1803 1804 err = cmd_start(dev, lr_buffer, opalmethod[OPAL_SET]); 1805 1806 add_token_u8(&err, dev, OPAL_STARTNAME); 1807 add_token_u8(&err, dev, OPAL_VALUES); 1808 add_token_u8(&err, dev, OPAL_STARTLIST); 1809 1810 add_token_u8(&err, dev, OPAL_STARTNAME); 1811 add_token_u8(&err, dev, OPAL_READLOCKED); 1812 add_token_u8(&err, dev, read_locked); 1813 add_token_u8(&err, dev, OPAL_ENDNAME); 1814 1815 add_token_u8(&err, dev, OPAL_STARTNAME); 1816 add_token_u8(&err, dev, OPAL_WRITELOCKED); 1817 add_token_u8(&err, dev, write_locked); 1818 add_token_u8(&err, dev, OPAL_ENDNAME); 1819 1820 add_token_u8(&err, dev, OPAL_ENDLIST); 1821 add_token_u8(&err, dev, OPAL_ENDNAME); 1822 1823 if (err) { 1824 pr_debug("Error building SET command.\n"); 1825 return err; 1826 } 1827 1828 return finalize_and_send(dev, parse_and_check_status); 1829 } 1830 1831 1832 static int lock_unlock_locking_range_sum(struct opal_dev *dev, void *data) 1833 { 1834 u8 lr_buffer[OPAL_UID_LENGTH]; 1835 u8 read_locked = 1, write_locked = 1; 1836 struct opal_lock_unlock *lkul = data; 1837 int ret; 1838 1839 clear_opal_cmd(dev); 1840 set_comid(dev, dev->comid); 1841 1842 if (build_locking_range(lr_buffer, sizeof(lr_buffer), 1843 lkul->session.opal_key.lr) < 0) 1844 return -ERANGE; 1845 1846 switch (lkul->l_state) { 1847 case OPAL_RO: 1848 read_locked = 0; 1849 write_locked = 1; 1850 break; 1851 case OPAL_RW: 1852 read_locked = 0; 1853 write_locked = 0; 1854 break; 1855 case OPAL_LK: 1856 /* vars are initialized to locked */ 1857 break; 1858 default: 1859 pr_debug("Tried to set an invalid locking state.\n"); 1860 return OPAL_INVAL_PARAM; 1861 } 1862 ret = generic_lr_enable_disable(dev, lr_buffer, 1, 1, 1863 read_locked, write_locked); 1864 1865 if (ret < 0) { 1866 pr_debug("Error building SET command.\n"); 1867 return ret; 1868 } 1869 1870 return finalize_and_send(dev, parse_and_check_status); 1871 } 1872 1873 static int activate_lsp(struct opal_dev *dev, void *data) 1874 { 1875 struct opal_lr_act *opal_act = data; 1876 u8 user_lr[OPAL_UID_LENGTH]; 1877 u8 uint_3 = 0x83; 1878 int err, i; 1879 1880 err = cmd_start(dev, opaluid[OPAL_LOCKINGSP_UID], 1881 opalmethod[OPAL_ACTIVATE]); 1882 1883 if (opal_act->sum) { 1884 err = build_locking_range(user_lr, sizeof(user_lr), 1885 opal_act->lr[0]); 1886 if (err) 1887 return err; 1888 1889 add_token_u8(&err, dev, OPAL_STARTNAME); 1890 add_token_u8(&err, dev, uint_3); 1891 add_token_u8(&err, dev, 6); 1892 add_token_u8(&err, dev, 0); 1893 add_token_u8(&err, dev, 0); 1894 1895 add_token_u8(&err, dev, OPAL_STARTLIST); 1896 add_token_bytestring(&err, dev, user_lr, OPAL_UID_LENGTH); 1897 for (i = 1; i < opal_act->num_lrs; i++) { 1898 user_lr[7] = opal_act->lr[i]; 1899 add_token_bytestring(&err, dev, user_lr, OPAL_UID_LENGTH); 1900 } 1901 add_token_u8(&err, dev, OPAL_ENDLIST); 1902 add_token_u8(&err, dev, OPAL_ENDNAME); 1903 } 1904 1905 if (err) { 1906 pr_debug("Error building Activate LockingSP command.\n"); 1907 return err; 1908 } 1909 1910 return finalize_and_send(dev, parse_and_check_status); 1911 } 1912 1913 /* Determine if we're in the Manufactured Inactive or Active state */ 1914 static int get_lsp_lifecycle(struct opal_dev *dev, void *data) 1915 { 1916 u8 lc_status; 1917 int err; 1918 1919 err = generic_get_column(dev, opaluid[OPAL_LOCKINGSP_UID], 1920 OPAL_LIFECYCLE); 1921 if (err) 1922 return err; 1923 1924 lc_status = response_get_u64(&dev->parsed, 4); 1925 /* 0x08 is Manufactured Inactive */ 1926 /* 0x09 is Manufactured */ 1927 if (lc_status != OPAL_MANUFACTURED_INACTIVE) { 1928 pr_debug("Couldn't determine the status of the Lifecycle state\n"); 1929 return -ENODEV; 1930 } 1931 1932 return 0; 1933 } 1934 1935 static int get_msid_cpin_pin(struct opal_dev *dev, void *data) 1936 { 1937 const char *msid_pin; 1938 size_t strlen; 1939 int err; 1940 1941 err = generic_get_column(dev, opaluid[OPAL_C_PIN_MSID], OPAL_PIN); 1942 if (err) 1943 return err; 1944 1945 strlen = response_get_string(&dev->parsed, 4, &msid_pin); 1946 if (!msid_pin) { 1947 pr_debug("Couldn't extract MSID_CPIN from response\n"); 1948 return OPAL_INVAL_PARAM; 1949 } 1950 1951 dev->prev_data = kmemdup(msid_pin, strlen, GFP_KERNEL); 1952 if (!dev->prev_data) 1953 return -ENOMEM; 1954 1955 dev->prev_d_len = strlen; 1956 1957 return 0; 1958 } 1959 1960 static int end_opal_session(struct opal_dev *dev, void *data) 1961 { 1962 int err = 0; 1963 1964 clear_opal_cmd(dev); 1965 set_comid(dev, dev->comid); 1966 add_token_u8(&err, dev, OPAL_ENDOFSESSION); 1967 1968 if (err < 0) 1969 return err; 1970 1971 return finalize_and_send(dev, end_session_cont); 1972 } 1973 1974 static int end_opal_session_error(struct opal_dev *dev) 1975 { 1976 const struct opal_step error_end_session = { 1977 end_opal_session, 1978 }; 1979 1980 return execute_step(dev, &error_end_session, 0); 1981 } 1982 1983 static inline void setup_opal_dev(struct opal_dev *dev) 1984 { 1985 dev->tsn = 0; 1986 dev->hsn = 0; 1987 dev->prev_data = NULL; 1988 } 1989 1990 static int check_opal_support(struct opal_dev *dev) 1991 { 1992 int ret; 1993 1994 mutex_lock(&dev->dev_lock); 1995 setup_opal_dev(dev); 1996 ret = opal_discovery0_step(dev); 1997 dev->supported = !ret; 1998 mutex_unlock(&dev->dev_lock); 1999 2000 return ret; 2001 } 2002 2003 static void clean_opal_dev(struct opal_dev *dev) 2004 { 2005 2006 struct opal_suspend_data *suspend, *next; 2007 2008 mutex_lock(&dev->dev_lock); 2009 list_for_each_entry_safe(suspend, next, &dev->unlk_lst, node) { 2010 list_del(&suspend->node); 2011 kfree(suspend); 2012 } 2013 mutex_unlock(&dev->dev_lock); 2014 } 2015 2016 void free_opal_dev(struct opal_dev *dev) 2017 { 2018 if (!dev) 2019 return; 2020 2021 clean_opal_dev(dev); 2022 kfree(dev); 2023 } 2024 EXPORT_SYMBOL(free_opal_dev); 2025 2026 struct opal_dev *init_opal_dev(void *data, sec_send_recv *send_recv) 2027 { 2028 struct opal_dev *dev; 2029 2030 dev = kmalloc(sizeof(*dev), GFP_KERNEL); 2031 if (!dev) 2032 return NULL; 2033 2034 INIT_LIST_HEAD(&dev->unlk_lst); 2035 mutex_init(&dev->dev_lock); 2036 dev->data = data; 2037 dev->send_recv = send_recv; 2038 if (check_opal_support(dev) != 0) { 2039 pr_debug("Opal is not supported on this device\n"); 2040 kfree(dev); 2041 return NULL; 2042 } 2043 2044 return dev; 2045 } 2046 EXPORT_SYMBOL(init_opal_dev); 2047 2048 static int opal_secure_erase_locking_range(struct opal_dev *dev, 2049 struct opal_session_info *opal_session) 2050 { 2051 const struct opal_step erase_steps[] = { 2052 { start_auth_opal_session, opal_session }, 2053 { get_active_key, &opal_session->opal_key.lr }, 2054 { gen_key, }, 2055 { end_opal_session, } 2056 }; 2057 int ret; 2058 2059 mutex_lock(&dev->dev_lock); 2060 setup_opal_dev(dev); 2061 ret = execute_steps(dev, erase_steps, ARRAY_SIZE(erase_steps)); 2062 mutex_unlock(&dev->dev_lock); 2063 2064 return ret; 2065 } 2066 2067 static int opal_erase_locking_range(struct opal_dev *dev, 2068 struct opal_session_info *opal_session) 2069 { 2070 const struct opal_step erase_steps[] = { 2071 { start_auth_opal_session, opal_session }, 2072 { erase_locking_range, opal_session }, 2073 { end_opal_session, } 2074 }; 2075 int ret; 2076 2077 mutex_lock(&dev->dev_lock); 2078 setup_opal_dev(dev); 2079 ret = execute_steps(dev, erase_steps, ARRAY_SIZE(erase_steps)); 2080 mutex_unlock(&dev->dev_lock); 2081 2082 return ret; 2083 } 2084 2085 static int opal_enable_disable_shadow_mbr(struct opal_dev *dev, 2086 struct opal_mbr_data *opal_mbr) 2087 { 2088 u8 enable_disable = opal_mbr->enable_disable == OPAL_MBR_ENABLE ? 2089 OPAL_TRUE : OPAL_FALSE; 2090 2091 const struct opal_step mbr_steps[] = { 2092 { start_admin1LSP_opal_session, &opal_mbr->key }, 2093 { set_mbr_done, &enable_disable }, 2094 { end_opal_session, }, 2095 { start_admin1LSP_opal_session, &opal_mbr->key }, 2096 { set_mbr_enable_disable, &enable_disable }, 2097 { end_opal_session, } 2098 }; 2099 int ret; 2100 2101 if (opal_mbr->enable_disable != OPAL_MBR_ENABLE && 2102 opal_mbr->enable_disable != OPAL_MBR_DISABLE) 2103 return -EINVAL; 2104 2105 mutex_lock(&dev->dev_lock); 2106 setup_opal_dev(dev); 2107 ret = execute_steps(dev, mbr_steps, ARRAY_SIZE(mbr_steps)); 2108 mutex_unlock(&dev->dev_lock); 2109 2110 return ret; 2111 } 2112 2113 static int opal_set_mbr_done(struct opal_dev *dev, 2114 struct opal_mbr_done *mbr_done) 2115 { 2116 u8 mbr_done_tf = mbr_done->done_flag == OPAL_MBR_DONE ? 2117 OPAL_TRUE : OPAL_FALSE; 2118 2119 const struct opal_step mbr_steps[] = { 2120 { start_admin1LSP_opal_session, &mbr_done->key }, 2121 { set_mbr_done, &mbr_done_tf }, 2122 { end_opal_session, } 2123 }; 2124 int ret; 2125 2126 if (mbr_done->done_flag != OPAL_MBR_DONE && 2127 mbr_done->done_flag != OPAL_MBR_NOT_DONE) 2128 return -EINVAL; 2129 2130 mutex_lock(&dev->dev_lock); 2131 setup_opal_dev(dev); 2132 ret = execute_steps(dev, mbr_steps, ARRAY_SIZE(mbr_steps)); 2133 mutex_unlock(&dev->dev_lock); 2134 2135 return ret; 2136 } 2137 2138 static int opal_write_shadow_mbr(struct opal_dev *dev, 2139 struct opal_shadow_mbr *info) 2140 { 2141 const struct opal_step mbr_steps[] = { 2142 { start_admin1LSP_opal_session, &info->key }, 2143 { write_shadow_mbr, info }, 2144 { end_opal_session, } 2145 }; 2146 int ret; 2147 2148 if (info->size == 0) 2149 return 0; 2150 2151 mutex_lock(&dev->dev_lock); 2152 setup_opal_dev(dev); 2153 ret = execute_steps(dev, mbr_steps, ARRAY_SIZE(mbr_steps)); 2154 mutex_unlock(&dev->dev_lock); 2155 2156 return ret; 2157 } 2158 2159 static int opal_save(struct opal_dev *dev, struct opal_lock_unlock *lk_unlk) 2160 { 2161 struct opal_suspend_data *suspend; 2162 2163 suspend = kzalloc(sizeof(*suspend), GFP_KERNEL); 2164 if (!suspend) 2165 return -ENOMEM; 2166 2167 suspend->unlk = *lk_unlk; 2168 suspend->lr = lk_unlk->session.opal_key.lr; 2169 2170 mutex_lock(&dev->dev_lock); 2171 setup_opal_dev(dev); 2172 add_suspend_info(dev, suspend); 2173 mutex_unlock(&dev->dev_lock); 2174 2175 return 0; 2176 } 2177 2178 static int opal_add_user_to_lr(struct opal_dev *dev, 2179 struct opal_lock_unlock *lk_unlk) 2180 { 2181 const struct opal_step steps[] = { 2182 { start_admin1LSP_opal_session, &lk_unlk->session.opal_key }, 2183 { add_user_to_lr, lk_unlk }, 2184 { end_opal_session, } 2185 }; 2186 int ret; 2187 2188 if (lk_unlk->l_state != OPAL_RO && 2189 lk_unlk->l_state != OPAL_RW) { 2190 pr_debug("Locking state was not RO or RW\n"); 2191 return -EINVAL; 2192 } 2193 2194 if (lk_unlk->session.who < OPAL_USER1 || 2195 lk_unlk->session.who > OPAL_USER9) { 2196 pr_debug("Authority was not within the range of users: %d\n", 2197 lk_unlk->session.who); 2198 return -EINVAL; 2199 } 2200 2201 if (lk_unlk->session.sum) { 2202 pr_debug("%s not supported in sum. Use setup locking range\n", 2203 __func__); 2204 return -EINVAL; 2205 } 2206 2207 mutex_lock(&dev->dev_lock); 2208 setup_opal_dev(dev); 2209 ret = execute_steps(dev, steps, ARRAY_SIZE(steps)); 2210 mutex_unlock(&dev->dev_lock); 2211 2212 return ret; 2213 } 2214 2215 static int opal_reverttper(struct opal_dev *dev, struct opal_key *opal, bool psid) 2216 { 2217 /* controller will terminate session */ 2218 const struct opal_step revert_steps[] = { 2219 { start_SIDASP_opal_session, opal }, 2220 { revert_tper, } 2221 }; 2222 const struct opal_step psid_revert_steps[] = { 2223 { start_PSID_opal_session, opal }, 2224 { revert_tper, } 2225 }; 2226 2227 int ret; 2228 2229 mutex_lock(&dev->dev_lock); 2230 setup_opal_dev(dev); 2231 if (psid) 2232 ret = execute_steps(dev, psid_revert_steps, 2233 ARRAY_SIZE(psid_revert_steps)); 2234 else 2235 ret = execute_steps(dev, revert_steps, 2236 ARRAY_SIZE(revert_steps)); 2237 mutex_unlock(&dev->dev_lock); 2238 2239 /* 2240 * If we successfully reverted lets clean 2241 * any saved locking ranges. 2242 */ 2243 if (!ret) 2244 clean_opal_dev(dev); 2245 2246 return ret; 2247 } 2248 2249 static int __opal_lock_unlock(struct opal_dev *dev, 2250 struct opal_lock_unlock *lk_unlk) 2251 { 2252 const struct opal_step unlock_steps[] = { 2253 { start_auth_opal_session, &lk_unlk->session }, 2254 { lock_unlock_locking_range, lk_unlk }, 2255 { end_opal_session, } 2256 }; 2257 const struct opal_step unlock_sum_steps[] = { 2258 { start_auth_opal_session, &lk_unlk->session }, 2259 { lock_unlock_locking_range_sum, lk_unlk }, 2260 { end_opal_session, } 2261 }; 2262 2263 if (lk_unlk->session.sum) 2264 return execute_steps(dev, unlock_sum_steps, 2265 ARRAY_SIZE(unlock_sum_steps)); 2266 else 2267 return execute_steps(dev, unlock_steps, 2268 ARRAY_SIZE(unlock_steps)); 2269 } 2270 2271 static int __opal_set_mbr_done(struct opal_dev *dev, struct opal_key *key) 2272 { 2273 u8 mbr_done_tf = OPAL_TRUE; 2274 const struct opal_step mbrdone_step[] = { 2275 { start_admin1LSP_opal_session, key }, 2276 { set_mbr_done, &mbr_done_tf }, 2277 { end_opal_session, } 2278 }; 2279 2280 return execute_steps(dev, mbrdone_step, ARRAY_SIZE(mbrdone_step)); 2281 } 2282 2283 static int opal_lock_unlock(struct opal_dev *dev, 2284 struct opal_lock_unlock *lk_unlk) 2285 { 2286 int ret; 2287 2288 if (lk_unlk->session.who > OPAL_USER9) 2289 return -EINVAL; 2290 2291 mutex_lock(&dev->dev_lock); 2292 ret = __opal_lock_unlock(dev, lk_unlk); 2293 mutex_unlock(&dev->dev_lock); 2294 2295 return ret; 2296 } 2297 2298 static int opal_take_ownership(struct opal_dev *dev, struct opal_key *opal) 2299 { 2300 const struct opal_step owner_steps[] = { 2301 { start_anybodyASP_opal_session, }, 2302 { get_msid_cpin_pin, }, 2303 { end_opal_session, }, 2304 { start_SIDASP_opal_session, opal }, 2305 { set_sid_cpin_pin, opal }, 2306 { end_opal_session, } 2307 }; 2308 int ret; 2309 2310 if (!dev) 2311 return -ENODEV; 2312 2313 mutex_lock(&dev->dev_lock); 2314 setup_opal_dev(dev); 2315 ret = execute_steps(dev, owner_steps, ARRAY_SIZE(owner_steps)); 2316 mutex_unlock(&dev->dev_lock); 2317 2318 return ret; 2319 } 2320 2321 static int opal_activate_lsp(struct opal_dev *dev, 2322 struct opal_lr_act *opal_lr_act) 2323 { 2324 const struct opal_step active_steps[] = { 2325 { start_SIDASP_opal_session, &opal_lr_act->key }, 2326 { get_lsp_lifecycle, }, 2327 { activate_lsp, opal_lr_act }, 2328 { end_opal_session, } 2329 }; 2330 int ret; 2331 2332 if (!opal_lr_act->num_lrs || opal_lr_act->num_lrs > OPAL_MAX_LRS) 2333 return -EINVAL; 2334 2335 mutex_lock(&dev->dev_lock); 2336 setup_opal_dev(dev); 2337 ret = execute_steps(dev, active_steps, ARRAY_SIZE(active_steps)); 2338 mutex_unlock(&dev->dev_lock); 2339 2340 return ret; 2341 } 2342 2343 static int opal_setup_locking_range(struct opal_dev *dev, 2344 struct opal_user_lr_setup *opal_lrs) 2345 { 2346 const struct opal_step lr_steps[] = { 2347 { start_auth_opal_session, &opal_lrs->session }, 2348 { setup_locking_range, opal_lrs }, 2349 { end_opal_session, } 2350 }; 2351 int ret; 2352 2353 mutex_lock(&dev->dev_lock); 2354 setup_opal_dev(dev); 2355 ret = execute_steps(dev, lr_steps, ARRAY_SIZE(lr_steps)); 2356 mutex_unlock(&dev->dev_lock); 2357 2358 return ret; 2359 } 2360 2361 static int opal_set_new_pw(struct opal_dev *dev, struct opal_new_pw *opal_pw) 2362 { 2363 const struct opal_step pw_steps[] = { 2364 { start_auth_opal_session, &opal_pw->session }, 2365 { set_new_pw, &opal_pw->new_user_pw }, 2366 { end_opal_session, } 2367 }; 2368 int ret; 2369 2370 if (opal_pw->session.who > OPAL_USER9 || 2371 opal_pw->new_user_pw.who > OPAL_USER9) 2372 return -EINVAL; 2373 2374 mutex_lock(&dev->dev_lock); 2375 setup_opal_dev(dev); 2376 ret = execute_steps(dev, pw_steps, ARRAY_SIZE(pw_steps)); 2377 mutex_unlock(&dev->dev_lock); 2378 2379 return ret; 2380 } 2381 2382 static int opal_activate_user(struct opal_dev *dev, 2383 struct opal_session_info *opal_session) 2384 { 2385 const struct opal_step act_steps[] = { 2386 { start_admin1LSP_opal_session, &opal_session->opal_key }, 2387 { internal_activate_user, opal_session }, 2388 { end_opal_session, } 2389 }; 2390 int ret; 2391 2392 /* We can't activate Admin1 it's active as manufactured */ 2393 if (opal_session->who < OPAL_USER1 || 2394 opal_session->who > OPAL_USER9) { 2395 pr_debug("Who was not a valid user: %d\n", opal_session->who); 2396 return -EINVAL; 2397 } 2398 2399 mutex_lock(&dev->dev_lock); 2400 setup_opal_dev(dev); 2401 ret = execute_steps(dev, act_steps, ARRAY_SIZE(act_steps)); 2402 mutex_unlock(&dev->dev_lock); 2403 2404 return ret; 2405 } 2406 2407 bool opal_unlock_from_suspend(struct opal_dev *dev) 2408 { 2409 struct opal_suspend_data *suspend; 2410 bool was_failure = false; 2411 int ret = 0; 2412 2413 if (!dev) 2414 return false; 2415 2416 if (!dev->supported) 2417 return false; 2418 2419 mutex_lock(&dev->dev_lock); 2420 setup_opal_dev(dev); 2421 2422 list_for_each_entry(suspend, &dev->unlk_lst, node) { 2423 dev->tsn = 0; 2424 dev->hsn = 0; 2425 2426 ret = __opal_lock_unlock(dev, &suspend->unlk); 2427 if (ret) { 2428 pr_debug("Failed to unlock LR %hhu with sum %d\n", 2429 suspend->unlk.session.opal_key.lr, 2430 suspend->unlk.session.sum); 2431 was_failure = true; 2432 } 2433 2434 if (dev->mbr_enabled) { 2435 ret = __opal_set_mbr_done(dev, &suspend->unlk.session.opal_key); 2436 if (ret) 2437 pr_debug("Failed to set MBR Done in S3 resume\n"); 2438 } 2439 } 2440 mutex_unlock(&dev->dev_lock); 2441 2442 return was_failure; 2443 } 2444 EXPORT_SYMBOL(opal_unlock_from_suspend); 2445 2446 int sed_ioctl(struct opal_dev *dev, unsigned int cmd, void __user *arg) 2447 { 2448 void *p; 2449 int ret = -ENOTTY; 2450 2451 if (!capable(CAP_SYS_ADMIN)) 2452 return -EACCES; 2453 if (!dev) 2454 return -ENOTSUPP; 2455 if (!dev->supported) 2456 return -ENOTSUPP; 2457 2458 p = memdup_user(arg, _IOC_SIZE(cmd)); 2459 if (IS_ERR(p)) 2460 return PTR_ERR(p); 2461 2462 switch (cmd) { 2463 case IOC_OPAL_SAVE: 2464 ret = opal_save(dev, p); 2465 break; 2466 case IOC_OPAL_LOCK_UNLOCK: 2467 ret = opal_lock_unlock(dev, p); 2468 break; 2469 case IOC_OPAL_TAKE_OWNERSHIP: 2470 ret = opal_take_ownership(dev, p); 2471 break; 2472 case IOC_OPAL_ACTIVATE_LSP: 2473 ret = opal_activate_lsp(dev, p); 2474 break; 2475 case IOC_OPAL_SET_PW: 2476 ret = opal_set_new_pw(dev, p); 2477 break; 2478 case IOC_OPAL_ACTIVATE_USR: 2479 ret = opal_activate_user(dev, p); 2480 break; 2481 case IOC_OPAL_REVERT_TPR: 2482 ret = opal_reverttper(dev, p, false); 2483 break; 2484 case IOC_OPAL_LR_SETUP: 2485 ret = opal_setup_locking_range(dev, p); 2486 break; 2487 case IOC_OPAL_ADD_USR_TO_LR: 2488 ret = opal_add_user_to_lr(dev, p); 2489 break; 2490 case IOC_OPAL_ENABLE_DISABLE_MBR: 2491 ret = opal_enable_disable_shadow_mbr(dev, p); 2492 break; 2493 case IOC_OPAL_MBR_DONE: 2494 ret = opal_set_mbr_done(dev, p); 2495 break; 2496 case IOC_OPAL_WRITE_SHADOW_MBR: 2497 ret = opal_write_shadow_mbr(dev, p); 2498 break; 2499 case IOC_OPAL_ERASE_LR: 2500 ret = opal_erase_locking_range(dev, p); 2501 break; 2502 case IOC_OPAL_SECURE_ERASE_LR: 2503 ret = opal_secure_erase_locking_range(dev, p); 2504 break; 2505 case IOC_OPAL_PSID_REVERT_TPR: 2506 ret = opal_reverttper(dev, p, true); 2507 break; 2508 default: 2509 break; 2510 } 2511 2512 kfree(p); 2513 return ret; 2514 } 2515 EXPORT_SYMBOL_GPL(sed_ioctl); 2516