Merge tag 'kvmarm-fixes-5.4-1' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmar...
[platform/kernel/linux-rpi.git] / block / sed-opal.c
1 // SPDX-License-Identifier: GPL-2.0
2 /*
3  * Copyright © 2016 Intel Corporation
4  *
5  * Authors:
6  *    Scott  Bauer      <scott.bauer@intel.com>
7  *    Rafael Antognolli <rafael.antognolli@intel.com>
8  */
9
10 #define pr_fmt(fmt) KBUILD_MODNAME ":OPAL: " fmt
11
12 #include <linux/delay.h>
13 #include <linux/device.h>
14 #include <linux/kernel.h>
15 #include <linux/list.h>
16 #include <linux/genhd.h>
17 #include <linux/slab.h>
18 #include <linux/uaccess.h>
19 #include <uapi/linux/sed-opal.h>
20 #include <linux/sed-opal.h>
21 #include <linux/string.h>
22 #include <linux/kdev_t.h>
23
24 #include "opal_proto.h"
25
26 #define IO_BUFFER_LENGTH 2048
27 #define MAX_TOKS 64
28
29 /* Number of bytes needed by cmd_finalize. */
30 #define CMD_FINALIZE_BYTES_NEEDED 7
31
32 struct opal_step {
33         int (*fn)(struct opal_dev *dev, void *data);
34         void *data;
35 };
36 typedef int (cont_fn)(struct opal_dev *dev);
37
38 enum opal_atom_width {
39         OPAL_WIDTH_TINY,
40         OPAL_WIDTH_SHORT,
41         OPAL_WIDTH_MEDIUM,
42         OPAL_WIDTH_LONG,
43         OPAL_WIDTH_TOKEN
44 };
45
46 /*
47  * On the parsed response, we don't store again the toks that are already
48  * stored in the response buffer. Instead, for each token, we just store a
49  * pointer to the position in the buffer where the token starts, and the size
50  * of the token in bytes.
51  */
52 struct opal_resp_tok {
53         const u8 *pos;
54         size_t len;
55         enum opal_response_token type;
56         enum opal_atom_width width;
57         union {
58                 u64 u;
59                 s64 s;
60         } stored;
61 };
62
63 /*
64  * From the response header it's not possible to know how many tokens there are
65  * on the payload. So we hardcode that the maximum will be MAX_TOKS, and later
66  * if we start dealing with messages that have more than that, we can increase
67  * this number. This is done to avoid having to make two passes through the
68  * response, the first one counting how many tokens we have and the second one
69  * actually storing the positions.
70  */
71 struct parsed_resp {
72         int num;
73         struct opal_resp_tok toks[MAX_TOKS];
74 };
75
76 struct opal_dev {
77         bool supported;
78         bool mbr_enabled;
79
80         void *data;
81         sec_send_recv *send_recv;
82
83         struct mutex dev_lock;
84         u16 comid;
85         u32 hsn;
86         u32 tsn;
87         u64 align;
88         u64 lowest_lba;
89
90         size_t pos;
91         u8 cmd[IO_BUFFER_LENGTH];
92         u8 resp[IO_BUFFER_LENGTH];
93
94         struct parsed_resp parsed;
95         size_t prev_d_len;
96         void *prev_data;
97
98         struct list_head unlk_lst;
99 };
100
101
102 static const u8 opaluid[][OPAL_UID_LENGTH] = {
103         /* users */
104         [OPAL_SMUID_UID] =
105                 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff },
106         [OPAL_THISSP_UID] =
107                 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 },
108         [OPAL_ADMINSP_UID] =
109                 { 0x00, 0x00, 0x02, 0x05, 0x00, 0x00, 0x00, 0x01 },
110         [OPAL_LOCKINGSP_UID] =
111                 { 0x00, 0x00, 0x02, 0x05, 0x00, 0x00, 0x00, 0x02 },
112         [OPAL_ENTERPRISE_LOCKINGSP_UID] =
113                 { 0x00, 0x00, 0x02, 0x05, 0x00, 0x01, 0x00, 0x01 },
114         [OPAL_ANYBODY_UID] =
115                 { 0x00, 0x00, 0x00, 0x09, 0x00, 0x00, 0x00, 0x01 },
116         [OPAL_SID_UID] =
117                 { 0x00, 0x00, 0x00, 0x09, 0x00, 0x00, 0x00, 0x06 },
118         [OPAL_ADMIN1_UID] =
119                 { 0x00, 0x00, 0x00, 0x09, 0x00, 0x01, 0x00, 0x01 },
120         [OPAL_USER1_UID] =
121                 { 0x00, 0x00, 0x00, 0x09, 0x00, 0x03, 0x00, 0x01 },
122         [OPAL_USER2_UID] =
123                 { 0x00, 0x00, 0x00, 0x09, 0x00, 0x03, 0x00, 0x02 },
124         [OPAL_PSID_UID] =
125                 { 0x00, 0x00, 0x00, 0x09, 0x00, 0x01, 0xff, 0x01 },
126         [OPAL_ENTERPRISE_BANDMASTER0_UID] =
127                 { 0x00, 0x00, 0x00, 0x09, 0x00, 0x00, 0x80, 0x01 },
128         [OPAL_ENTERPRISE_ERASEMASTER_UID] =
129                 { 0x00, 0x00, 0x00, 0x09, 0x00, 0x00, 0x84, 0x01 },
130
131         /* tables */
132         [OPAL_TABLE_TABLE]
133                 { 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x01 },
134         [OPAL_LOCKINGRANGE_GLOBAL] =
135                 { 0x00, 0x00, 0x08, 0x02, 0x00, 0x00, 0x00, 0x01 },
136         [OPAL_LOCKINGRANGE_ACE_RDLOCKED] =
137                 { 0x00, 0x00, 0x00, 0x08, 0x00, 0x03, 0xE0, 0x01 },
138         [OPAL_LOCKINGRANGE_ACE_WRLOCKED] =
139                 { 0x00, 0x00, 0x00, 0x08, 0x00, 0x03, 0xE8, 0x01 },
140         [OPAL_MBRCONTROL] =
141                 { 0x00, 0x00, 0x08, 0x03, 0x00, 0x00, 0x00, 0x01 },
142         [OPAL_MBR] =
143                 { 0x00, 0x00, 0x08, 0x04, 0x00, 0x00, 0x00, 0x00 },
144         [OPAL_AUTHORITY_TABLE] =
145                 { 0x00, 0x00, 0x00, 0x09, 0x00, 0x00, 0x00, 0x00},
146         [OPAL_C_PIN_TABLE] =
147                 { 0x00, 0x00, 0x00, 0x0B, 0x00, 0x00, 0x00, 0x00},
148         [OPAL_LOCKING_INFO_TABLE] =
149                 { 0x00, 0x00, 0x08, 0x01, 0x00, 0x00, 0x00, 0x01 },
150         [OPAL_ENTERPRISE_LOCKING_INFO_TABLE] =
151                 { 0x00, 0x00, 0x08, 0x01, 0x00, 0x00, 0x00, 0x00 },
152
153         /* C_PIN_TABLE object ID's */
154         [OPAL_C_PIN_MSID] =
155                 { 0x00, 0x00, 0x00, 0x0B, 0x00, 0x00, 0x84, 0x02},
156         [OPAL_C_PIN_SID] =
157                 { 0x00, 0x00, 0x00, 0x0B, 0x00, 0x00, 0x00, 0x01},
158         [OPAL_C_PIN_ADMIN1] =
159                 { 0x00, 0x00, 0x00, 0x0B, 0x00, 0x01, 0x00, 0x01},
160
161         /* half UID's (only first 4 bytes used) */
162         [OPAL_HALF_UID_AUTHORITY_OBJ_REF] =
163                 { 0x00, 0x00, 0x0C, 0x05, 0xff, 0xff, 0xff, 0xff },
164         [OPAL_HALF_UID_BOOLEAN_ACE] =
165                 { 0x00, 0x00, 0x04, 0x0E, 0xff, 0xff, 0xff, 0xff },
166
167         /* special value for omitted optional parameter */
168         [OPAL_UID_HEXFF] =
169                 { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff},
170 };
171
172 /*
173  * TCG Storage SSC Methods.
174  * Derived from: TCG_Storage_Architecture_Core_Spec_v2.01_r1.00
175  * Section: 6.3 Assigned UIDs
176  */
177 static const u8 opalmethod[][OPAL_METHOD_LENGTH] = {
178         [OPAL_PROPERTIES] =
179                 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x01 },
180         [OPAL_STARTSESSION] =
181                 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x02 },
182         [OPAL_REVERT] =
183                 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x02, 0x02 },
184         [OPAL_ACTIVATE] =
185                 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x02, 0x03 },
186         [OPAL_EGET] =
187                 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x06 },
188         [OPAL_ESET] =
189                 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x07 },
190         [OPAL_NEXT] =
191                 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x08 },
192         [OPAL_EAUTHENTICATE] =
193                 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x0c },
194         [OPAL_GETACL] =
195                 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x0d },
196         [OPAL_GENKEY] =
197                 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x10 },
198         [OPAL_REVERTSP] =
199                 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x11 },
200         [OPAL_GET] =
201                 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x16 },
202         [OPAL_SET] =
203                 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x17 },
204         [OPAL_AUTHENTICATE] =
205                 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x1c },
206         [OPAL_RANDOM] =
207                 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x06, 0x01 },
208         [OPAL_ERASE] =
209                 { 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x08, 0x03 },
210 };
211
212 static int end_opal_session_error(struct opal_dev *dev);
213 static int opal_discovery0_step(struct opal_dev *dev);
214
215 struct opal_suspend_data {
216         struct opal_lock_unlock unlk;
217         u8 lr;
218         struct list_head node;
219 };
220
221 /*
222  * Derived from:
223  * TCG_Storage_Architecture_Core_Spec_v2.01_r1.00
224  * Section: 5.1.5 Method Status Codes
225  */
226 static const char * const opal_errors[] = {
227         "Success",
228         "Not Authorized",
229         "Unknown Error",
230         "SP Busy",
231         "SP Failed",
232         "SP Disabled",
233         "SP Frozen",
234         "No Sessions Available",
235         "Uniqueness Conflict",
236         "Insufficient Space",
237         "Insufficient Rows",
238         "Invalid Function",
239         "Invalid Parameter",
240         "Invalid Reference",
241         "Unknown Error",
242         "TPER Malfunction",
243         "Transaction Failure",
244         "Response Overflow",
245         "Authority Locked Out",
246 };
247
248 static const char *opal_error_to_human(int error)
249 {
250         if (error == 0x3f)
251                 return "Failed";
252
253         if (error >= ARRAY_SIZE(opal_errors) || error < 0)
254                 return "Unknown Error";
255
256         return opal_errors[error];
257 }
258
259 static void print_buffer(const u8 *ptr, u32 length)
260 {
261 #ifdef DEBUG
262         print_hex_dump_bytes("OPAL: ", DUMP_PREFIX_OFFSET, ptr, length);
263         pr_debug("\n");
264 #endif
265 }
266
267 static bool check_tper(const void *data)
268 {
269         const struct d0_tper_features *tper = data;
270         u8 flags = tper->supported_features;
271
272         if (!(flags & TPER_SYNC_SUPPORTED)) {
273                 pr_debug("TPer sync not supported. flags = %d\n",
274                          tper->supported_features);
275                 return false;
276         }
277
278         return true;
279 }
280
281 static bool check_mbrenabled(const void *data)
282 {
283         const struct d0_locking_features *lfeat = data;
284         u8 sup_feat = lfeat->supported_features;
285
286         return !!(sup_feat & MBR_ENABLED_MASK);
287 }
288
289 static bool check_sum(const void *data)
290 {
291         const struct d0_single_user_mode *sum = data;
292         u32 nlo = be32_to_cpu(sum->num_locking_objects);
293
294         if (nlo == 0) {
295                 pr_debug("Need at least one locking object.\n");
296                 return false;
297         }
298
299         pr_debug("Number of locking objects: %d\n", nlo);
300
301         return true;
302 }
303
304 static u16 get_comid_v100(const void *data)
305 {
306         const struct d0_opal_v100 *v100 = data;
307
308         return be16_to_cpu(v100->baseComID);
309 }
310
311 static u16 get_comid_v200(const void *data)
312 {
313         const struct d0_opal_v200 *v200 = data;
314
315         return be16_to_cpu(v200->baseComID);
316 }
317
318 static int opal_send_cmd(struct opal_dev *dev)
319 {
320         return dev->send_recv(dev->data, dev->comid, TCG_SECP_01,
321                               dev->cmd, IO_BUFFER_LENGTH,
322                               true);
323 }
324
325 static int opal_recv_cmd(struct opal_dev *dev)
326 {
327         return dev->send_recv(dev->data, dev->comid, TCG_SECP_01,
328                               dev->resp, IO_BUFFER_LENGTH,
329                               false);
330 }
331
332 static int opal_recv_check(struct opal_dev *dev)
333 {
334         size_t buflen = IO_BUFFER_LENGTH;
335         void *buffer = dev->resp;
336         struct opal_header *hdr = buffer;
337         int ret;
338
339         do {
340                 pr_debug("Sent OPAL command: outstanding=%d, minTransfer=%d\n",
341                          hdr->cp.outstandingData,
342                          hdr->cp.minTransfer);
343
344                 if (hdr->cp.outstandingData == 0 ||
345                     hdr->cp.minTransfer != 0)
346                         return 0;
347
348                 memset(buffer, 0, buflen);
349                 ret = opal_recv_cmd(dev);
350         } while (!ret);
351
352         return ret;
353 }
354
355 static int opal_send_recv(struct opal_dev *dev, cont_fn *cont)
356 {
357         int ret;
358
359         ret = opal_send_cmd(dev);
360         if (ret)
361                 return ret;
362         ret = opal_recv_cmd(dev);
363         if (ret)
364                 return ret;
365         ret = opal_recv_check(dev);
366         if (ret)
367                 return ret;
368         return cont(dev);
369 }
370
371 static void check_geometry(struct opal_dev *dev, const void *data)
372 {
373         const struct d0_geometry_features *geo = data;
374
375         dev->align = geo->alignment_granularity;
376         dev->lowest_lba = geo->lowest_aligned_lba;
377 }
378
379 static int execute_step(struct opal_dev *dev,
380                         const struct opal_step *step, size_t stepIndex)
381 {
382         int error = step->fn(dev, step->data);
383
384         if (error) {
385                 pr_debug("Step %zu (%pS) failed with error %d: %s\n",
386                          stepIndex, step->fn, error,
387                          opal_error_to_human(error));
388         }
389
390         return error;
391 }
392
393 static int execute_steps(struct opal_dev *dev,
394                          const struct opal_step *steps, size_t n_steps)
395 {
396         size_t state = 0;
397         int error;
398
399         /* first do a discovery0 */
400         error = opal_discovery0_step(dev);
401         if (error)
402                 return error;
403
404         for (state = 0; state < n_steps; state++) {
405                 error = execute_step(dev, &steps[state], state);
406                 if (error)
407                         goto out_error;
408         }
409
410         return 0;
411
412 out_error:
413         /*
414          * For each OPAL command the first step in steps starts some sort of
415          * session. If an error occurred in the initial discovery0 or if an
416          * error occurred in the first step (and thus stopping the loop with
417          * state == 0) then there was an error before or during the attempt to
418          * start a session. Therefore we shouldn't attempt to terminate a
419          * session, as one has not yet been created.
420          */
421         if (state > 0)
422                 end_opal_session_error(dev);
423
424         return error;
425 }
426
427 static int opal_discovery0_end(struct opal_dev *dev)
428 {
429         bool found_com_id = false, supported = true, single_user = false;
430         const struct d0_header *hdr = (struct d0_header *)dev->resp;
431         const u8 *epos = dev->resp, *cpos = dev->resp;
432         u16 comid = 0;
433         u32 hlen = be32_to_cpu(hdr->length);
434
435         print_buffer(dev->resp, hlen);
436         dev->mbr_enabled = false;
437
438         if (hlen > IO_BUFFER_LENGTH - sizeof(*hdr)) {
439                 pr_debug("Discovery length overflows buffer (%zu+%u)/%u\n",
440                          sizeof(*hdr), hlen, IO_BUFFER_LENGTH);
441                 return -EFAULT;
442         }
443
444         epos += hlen; /* end of buffer */
445         cpos += sizeof(*hdr); /* current position on buffer */
446
447         while (cpos < epos && supported) {
448                 const struct d0_features *body =
449                         (const struct d0_features *)cpos;
450
451                 switch (be16_to_cpu(body->code)) {
452                 case FC_TPER:
453                         supported = check_tper(body->features);
454                         break;
455                 case FC_SINGLEUSER:
456                         single_user = check_sum(body->features);
457                         break;
458                 case FC_GEOMETRY:
459                         check_geometry(dev, body);
460                         break;
461                 case FC_LOCKING:
462                         dev->mbr_enabled = check_mbrenabled(body->features);
463                         break;
464                 case FC_ENTERPRISE:
465                 case FC_DATASTORE:
466                         /* some ignored properties */
467                         pr_debug("Found OPAL feature description: %d\n",
468                                  be16_to_cpu(body->code));
469                         break;
470                 case FC_OPALV100:
471                         comid = get_comid_v100(body->features);
472                         found_com_id = true;
473                         break;
474                 case FC_OPALV200:
475                         comid = get_comid_v200(body->features);
476                         found_com_id = true;
477                         break;
478                 case 0xbfff ... 0xffff:
479                         /* vendor specific, just ignore */
480                         break;
481                 default:
482                         pr_debug("OPAL Unknown feature: %d\n",
483                                  be16_to_cpu(body->code));
484
485                 }
486                 cpos += body->length + 4;
487         }
488
489         if (!supported) {
490                 pr_debug("This device is not Opal enabled. Not Supported!\n");
491                 return -EOPNOTSUPP;
492         }
493
494         if (!single_user)
495                 pr_debug("Device doesn't support single user mode\n");
496
497
498         if (!found_com_id) {
499                 pr_debug("Could not find OPAL comid for device. Returning early\n");
500                 return -EOPNOTSUPP;
501         }
502
503         dev->comid = comid;
504
505         return 0;
506 }
507
508 static int opal_discovery0(struct opal_dev *dev, void *data)
509 {
510         int ret;
511
512         memset(dev->resp, 0, IO_BUFFER_LENGTH);
513         dev->comid = OPAL_DISCOVERY_COMID;
514         ret = opal_recv_cmd(dev);
515         if (ret)
516                 return ret;
517
518         return opal_discovery0_end(dev);
519 }
520
521 static int opal_discovery0_step(struct opal_dev *dev)
522 {
523         const struct opal_step discovery0_step = {
524                 opal_discovery0,
525         };
526
527         return execute_step(dev, &discovery0_step, 0);
528 }
529
530 static size_t remaining_size(struct opal_dev *cmd)
531 {
532         return IO_BUFFER_LENGTH - cmd->pos;
533 }
534
535 static bool can_add(int *err, struct opal_dev *cmd, size_t len)
536 {
537         if (*err)
538                 return false;
539
540         if (remaining_size(cmd) < len) {
541                 pr_debug("Error adding %zu bytes: end of buffer.\n", len);
542                 *err = -ERANGE;
543                 return false;
544         }
545
546         return true;
547 }
548
549 static void add_token_u8(int *err, struct opal_dev *cmd, u8 tok)
550 {
551         if (!can_add(err, cmd, 1))
552                 return;
553
554         cmd->cmd[cmd->pos++] = tok;
555 }
556
557 static void add_short_atom_header(struct opal_dev *cmd, bool bytestring,
558                                   bool has_sign, int len)
559 {
560         u8 atom;
561         int err = 0;
562
563         atom = SHORT_ATOM_ID;
564         atom |= bytestring ? SHORT_ATOM_BYTESTRING : 0;
565         atom |= has_sign ? SHORT_ATOM_SIGNED : 0;
566         atom |= len & SHORT_ATOM_LEN_MASK;
567
568         add_token_u8(&err, cmd, atom);
569 }
570
571 static void add_medium_atom_header(struct opal_dev *cmd, bool bytestring,
572                                    bool has_sign, int len)
573 {
574         u8 header0;
575
576         header0 = MEDIUM_ATOM_ID;
577         header0 |= bytestring ? MEDIUM_ATOM_BYTESTRING : 0;
578         header0 |= has_sign ? MEDIUM_ATOM_SIGNED : 0;
579         header0 |= (len >> 8) & MEDIUM_ATOM_LEN_MASK;
580
581         cmd->cmd[cmd->pos++] = header0;
582         cmd->cmd[cmd->pos++] = len;
583 }
584
585 static void add_token_u64(int *err, struct opal_dev *cmd, u64 number)
586 {
587         size_t len;
588         int msb;
589
590         if (!(number & ~TINY_ATOM_DATA_MASK)) {
591                 add_token_u8(err, cmd, number);
592                 return;
593         }
594
595         msb = fls64(number);
596         len = DIV_ROUND_UP(msb, 8);
597
598         if (!can_add(err, cmd, len + 1)) {
599                 pr_debug("Error adding u64: end of buffer.\n");
600                 return;
601         }
602         add_short_atom_header(cmd, false, false, len);
603         while (len--)
604                 add_token_u8(err, cmd, number >> (len * 8));
605 }
606
607 static u8 *add_bytestring_header(int *err, struct opal_dev *cmd, size_t len)
608 {
609         size_t header_len = 1;
610         bool is_short_atom = true;
611
612         if (len & ~SHORT_ATOM_LEN_MASK) {
613                 header_len = 2;
614                 is_short_atom = false;
615         }
616
617         if (!can_add(err, cmd, header_len + len)) {
618                 pr_debug("Error adding bytestring: end of buffer.\n");
619                 return NULL;
620         }
621
622         if (is_short_atom)
623                 add_short_atom_header(cmd, true, false, len);
624         else
625                 add_medium_atom_header(cmd, true, false, len);
626
627         return &cmd->cmd[cmd->pos];
628 }
629
630 static void add_token_bytestring(int *err, struct opal_dev *cmd,
631                                  const u8 *bytestring, size_t len)
632 {
633         u8 *start;
634
635         start = add_bytestring_header(err, cmd, len);
636         if (!start)
637                 return;
638         memcpy(start, bytestring, len);
639         cmd->pos += len;
640 }
641
642 static int build_locking_range(u8 *buffer, size_t length, u8 lr)
643 {
644         if (length > OPAL_UID_LENGTH) {
645                 pr_debug("Can't build locking range. Length OOB\n");
646                 return -ERANGE;
647         }
648
649         memcpy(buffer, opaluid[OPAL_LOCKINGRANGE_GLOBAL], OPAL_UID_LENGTH);
650
651         if (lr == 0)
652                 return 0;
653
654         buffer[5] = LOCKING_RANGE_NON_GLOBAL;
655         buffer[7] = lr;
656
657         return 0;
658 }
659
660 static int build_locking_user(u8 *buffer, size_t length, u8 lr)
661 {
662         if (length > OPAL_UID_LENGTH) {
663                 pr_debug("Can't build locking range user. Length OOB\n");
664                 return -ERANGE;
665         }
666
667         memcpy(buffer, opaluid[OPAL_USER1_UID], OPAL_UID_LENGTH);
668
669         buffer[7] = lr + 1;
670
671         return 0;
672 }
673
674 static void set_comid(struct opal_dev *cmd, u16 comid)
675 {
676         struct opal_header *hdr = (struct opal_header *)cmd->cmd;
677
678         hdr->cp.extendedComID[0] = comid >> 8;
679         hdr->cp.extendedComID[1] = comid;
680         hdr->cp.extendedComID[2] = 0;
681         hdr->cp.extendedComID[3] = 0;
682 }
683
684 static int cmd_finalize(struct opal_dev *cmd, u32 hsn, u32 tsn)
685 {
686         struct opal_header *hdr;
687         int err = 0;
688
689         /*
690          * Close the parameter list opened from cmd_start.
691          * The number of bytes added must be equal to
692          * CMD_FINALIZE_BYTES_NEEDED.
693          */
694         add_token_u8(&err, cmd, OPAL_ENDLIST);
695
696         add_token_u8(&err, cmd, OPAL_ENDOFDATA);
697         add_token_u8(&err, cmd, OPAL_STARTLIST);
698         add_token_u8(&err, cmd, 0);
699         add_token_u8(&err, cmd, 0);
700         add_token_u8(&err, cmd, 0);
701         add_token_u8(&err, cmd, OPAL_ENDLIST);
702
703         if (err) {
704                 pr_debug("Error finalizing command.\n");
705                 return -EFAULT;
706         }
707
708         hdr = (struct opal_header *) cmd->cmd;
709
710         hdr->pkt.tsn = cpu_to_be32(tsn);
711         hdr->pkt.hsn = cpu_to_be32(hsn);
712
713         hdr->subpkt.length = cpu_to_be32(cmd->pos - sizeof(*hdr));
714         while (cmd->pos % 4) {
715                 if (cmd->pos >= IO_BUFFER_LENGTH) {
716                         pr_debug("Error: Buffer overrun\n");
717                         return -ERANGE;
718                 }
719                 cmd->cmd[cmd->pos++] = 0;
720         }
721         hdr->pkt.length = cpu_to_be32(cmd->pos - sizeof(hdr->cp) -
722                                       sizeof(hdr->pkt));
723         hdr->cp.length = cpu_to_be32(cmd->pos - sizeof(hdr->cp));
724
725         return 0;
726 }
727
728 static const struct opal_resp_tok *response_get_token(
729                                 const struct parsed_resp *resp,
730                                 int n)
731 {
732         const struct opal_resp_tok *tok;
733
734         if (!resp) {
735                 pr_debug("Response is NULL\n");
736                 return ERR_PTR(-EINVAL);
737         }
738
739         if (n >= resp->num) {
740                 pr_debug("Token number doesn't exist: %d, resp: %d\n",
741                          n, resp->num);
742                 return ERR_PTR(-EINVAL);
743         }
744
745         tok = &resp->toks[n];
746         if (tok->len == 0) {
747                 pr_debug("Token length must be non-zero\n");
748                 return ERR_PTR(-EINVAL);
749         }
750
751         return tok;
752 }
753
754 static ssize_t response_parse_tiny(struct opal_resp_tok *tok,
755                                    const u8 *pos)
756 {
757         tok->pos = pos;
758         tok->len = 1;
759         tok->width = OPAL_WIDTH_TINY;
760
761         if (pos[0] & TINY_ATOM_SIGNED) {
762                 tok->type = OPAL_DTA_TOKENID_SINT;
763         } else {
764                 tok->type = OPAL_DTA_TOKENID_UINT;
765                 tok->stored.u = pos[0] & 0x3f;
766         }
767
768         return tok->len;
769 }
770
771 static ssize_t response_parse_short(struct opal_resp_tok *tok,
772                                     const u8 *pos)
773 {
774         tok->pos = pos;
775         tok->len = (pos[0] & SHORT_ATOM_LEN_MASK) + 1;
776         tok->width = OPAL_WIDTH_SHORT;
777
778         if (pos[0] & SHORT_ATOM_BYTESTRING) {
779                 tok->type = OPAL_DTA_TOKENID_BYTESTRING;
780         } else if (pos[0] & SHORT_ATOM_SIGNED) {
781                 tok->type = OPAL_DTA_TOKENID_SINT;
782         } else {
783                 u64 u_integer = 0;
784                 ssize_t i, b = 0;
785
786                 tok->type = OPAL_DTA_TOKENID_UINT;
787                 if (tok->len > 9) {
788                         pr_debug("uint64 with more than 8 bytes\n");
789                         return -EINVAL;
790                 }
791                 for (i = tok->len - 1; i > 0; i--) {
792                         u_integer |= ((u64)pos[i] << (8 * b));
793                         b++;
794                 }
795                 tok->stored.u = u_integer;
796         }
797
798         return tok->len;
799 }
800
801 static ssize_t response_parse_medium(struct opal_resp_tok *tok,
802                                      const u8 *pos)
803 {
804         tok->pos = pos;
805         tok->len = (((pos[0] & MEDIUM_ATOM_LEN_MASK) << 8) | pos[1]) + 2;
806         tok->width = OPAL_WIDTH_MEDIUM;
807
808         if (pos[0] & MEDIUM_ATOM_BYTESTRING)
809                 tok->type = OPAL_DTA_TOKENID_BYTESTRING;
810         else if (pos[0] & MEDIUM_ATOM_SIGNED)
811                 tok->type = OPAL_DTA_TOKENID_SINT;
812         else
813                 tok->type = OPAL_DTA_TOKENID_UINT;
814
815         return tok->len;
816 }
817
818 static ssize_t response_parse_long(struct opal_resp_tok *tok,
819                                    const u8 *pos)
820 {
821         tok->pos = pos;
822         tok->len = ((pos[1] << 16) | (pos[2] << 8) | pos[3]) + 4;
823         tok->width = OPAL_WIDTH_LONG;
824
825         if (pos[0] & LONG_ATOM_BYTESTRING)
826                 tok->type = OPAL_DTA_TOKENID_BYTESTRING;
827         else if (pos[0] & LONG_ATOM_SIGNED)
828                 tok->type = OPAL_DTA_TOKENID_SINT;
829         else
830                 tok->type = OPAL_DTA_TOKENID_UINT;
831
832         return tok->len;
833 }
834
835 static ssize_t response_parse_token(struct opal_resp_tok *tok,
836                                     const u8 *pos)
837 {
838         tok->pos = pos;
839         tok->len = 1;
840         tok->type = OPAL_DTA_TOKENID_TOKEN;
841         tok->width = OPAL_WIDTH_TOKEN;
842
843         return tok->len;
844 }
845
846 static int response_parse(const u8 *buf, size_t length,
847                           struct parsed_resp *resp)
848 {
849         const struct opal_header *hdr;
850         struct opal_resp_tok *iter;
851         int num_entries = 0;
852         int total;
853         ssize_t token_length;
854         const u8 *pos;
855         u32 clen, plen, slen;
856
857         if (!buf)
858                 return -EFAULT;
859
860         if (!resp)
861                 return -EFAULT;
862
863         hdr = (struct opal_header *)buf;
864         pos = buf;
865         pos += sizeof(*hdr);
866
867         clen = be32_to_cpu(hdr->cp.length);
868         plen = be32_to_cpu(hdr->pkt.length);
869         slen = be32_to_cpu(hdr->subpkt.length);
870         pr_debug("Response size: cp: %u, pkt: %u, subpkt: %u\n",
871                  clen, plen, slen);
872
873         if (clen == 0 || plen == 0 || slen == 0 ||
874             slen > IO_BUFFER_LENGTH - sizeof(*hdr)) {
875                 pr_debug("Bad header length. cp: %u, pkt: %u, subpkt: %u\n",
876                          clen, plen, slen);
877                 print_buffer(pos, sizeof(*hdr));
878                 return -EINVAL;
879         }
880
881         if (pos > buf + length)
882                 return -EFAULT;
883
884         iter = resp->toks;
885         total = slen;
886         print_buffer(pos, total);
887         while (total > 0) {
888                 if (pos[0] <= TINY_ATOM_BYTE) /* tiny atom */
889                         token_length = response_parse_tiny(iter, pos);
890                 else if (pos[0] <= SHORT_ATOM_BYTE) /* short atom */
891                         token_length = response_parse_short(iter, pos);
892                 else if (pos[0] <= MEDIUM_ATOM_BYTE) /* medium atom */
893                         token_length = response_parse_medium(iter, pos);
894                 else if (pos[0] <= LONG_ATOM_BYTE) /* long atom */
895                         token_length = response_parse_long(iter, pos);
896                 else /* TOKEN */
897                         token_length = response_parse_token(iter, pos);
898
899                 if (token_length < 0)
900                         return token_length;
901
902                 pos += token_length;
903                 total -= token_length;
904                 iter++;
905                 num_entries++;
906         }
907
908         resp->num = num_entries;
909
910         return 0;
911 }
912
913 static size_t response_get_string(const struct parsed_resp *resp, int n,
914                                   const char **store)
915 {
916         u8 skip;
917         const struct opal_resp_tok *tok;
918
919         *store = NULL;
920         tok = response_get_token(resp, n);
921         if (IS_ERR(tok))
922                 return 0;
923
924         if (tok->type != OPAL_DTA_TOKENID_BYTESTRING) {
925                 pr_debug("Token is not a byte string!\n");
926                 return 0;
927         }
928
929         switch (tok->width) {
930         case OPAL_WIDTH_TINY:
931         case OPAL_WIDTH_SHORT:
932                 skip = 1;
933                 break;
934         case OPAL_WIDTH_MEDIUM:
935                 skip = 2;
936                 break;
937         case OPAL_WIDTH_LONG:
938                 skip = 4;
939                 break;
940         default:
941                 pr_debug("Token has invalid width!\n");
942                 return 0;
943         }
944
945         *store = tok->pos + skip;
946
947         return tok->len - skip;
948 }
949
950 static u64 response_get_u64(const struct parsed_resp *resp, int n)
951 {
952         const struct opal_resp_tok *tok;
953
954         tok = response_get_token(resp, n);
955         if (IS_ERR(tok))
956                 return 0;
957
958         if (tok->type != OPAL_DTA_TOKENID_UINT) {
959                 pr_debug("Token is not unsigned int: %d\n", tok->type);
960                 return 0;
961         }
962
963         if (tok->width != OPAL_WIDTH_TINY && tok->width != OPAL_WIDTH_SHORT) {
964                 pr_debug("Atom is not short or tiny: %d\n", tok->width);
965                 return 0;
966         }
967
968         return tok->stored.u;
969 }
970
971 static bool response_token_matches(const struct opal_resp_tok *token, u8 match)
972 {
973         if (IS_ERR(token) ||
974             token->type != OPAL_DTA_TOKENID_TOKEN ||
975             token->pos[0] != match)
976                 return false;
977         return true;
978 }
979
980 static u8 response_status(const struct parsed_resp *resp)
981 {
982         const struct opal_resp_tok *tok;
983
984         tok = response_get_token(resp, 0);
985         if (response_token_matches(tok, OPAL_ENDOFSESSION))
986                 return 0;
987
988         if (resp->num < 5)
989                 return DTAERROR_NO_METHOD_STATUS;
990
991         tok = response_get_token(resp, resp->num - 5);
992         if (!response_token_matches(tok, OPAL_STARTLIST))
993                 return DTAERROR_NO_METHOD_STATUS;
994
995         tok = response_get_token(resp, resp->num - 1);
996         if (!response_token_matches(tok, OPAL_ENDLIST))
997                 return DTAERROR_NO_METHOD_STATUS;
998
999         return response_get_u64(resp, resp->num - 4);
1000 }
1001
1002 /* Parses and checks for errors */
1003 static int parse_and_check_status(struct opal_dev *dev)
1004 {
1005         int error;
1006
1007         print_buffer(dev->cmd, dev->pos);
1008
1009         error = response_parse(dev->resp, IO_BUFFER_LENGTH, &dev->parsed);
1010         if (error) {
1011                 pr_debug("Couldn't parse response.\n");
1012                 return error;
1013         }
1014
1015         return response_status(&dev->parsed);
1016 }
1017
1018 static void clear_opal_cmd(struct opal_dev *dev)
1019 {
1020         dev->pos = sizeof(struct opal_header);
1021         memset(dev->cmd, 0, IO_BUFFER_LENGTH);
1022 }
1023
1024 static int cmd_start(struct opal_dev *dev, const u8 *uid, const u8 *method)
1025 {
1026         int err = 0;
1027
1028         clear_opal_cmd(dev);
1029         set_comid(dev, dev->comid);
1030
1031         add_token_u8(&err, dev, OPAL_CALL);
1032         add_token_bytestring(&err, dev, uid, OPAL_UID_LENGTH);
1033         add_token_bytestring(&err, dev, method, OPAL_METHOD_LENGTH);
1034
1035         /*
1036          * Every method call is followed by its parameters enclosed within
1037          * OPAL_STARTLIST and OPAL_ENDLIST tokens. We automatically open the
1038          * parameter list here and close it later in cmd_finalize.
1039          */
1040         add_token_u8(&err, dev, OPAL_STARTLIST);
1041
1042         return err;
1043 }
1044
1045 static int start_opal_session_cont(struct opal_dev *dev)
1046 {
1047         u32 hsn, tsn;
1048         int error = 0;
1049
1050         error = parse_and_check_status(dev);
1051         if (error)
1052                 return error;
1053
1054         hsn = response_get_u64(&dev->parsed, 4);
1055         tsn = response_get_u64(&dev->parsed, 5);
1056
1057         if (hsn == 0 && tsn == 0) {
1058                 pr_debug("Couldn't authenticate session\n");
1059                 return -EPERM;
1060         }
1061
1062         dev->hsn = hsn;
1063         dev->tsn = tsn;
1064
1065         return 0;
1066 }
1067
1068 static void add_suspend_info(struct opal_dev *dev,
1069                              struct opal_suspend_data *sus)
1070 {
1071         struct opal_suspend_data *iter;
1072
1073         list_for_each_entry(iter, &dev->unlk_lst, node) {
1074                 if (iter->lr == sus->lr) {
1075                         list_del(&iter->node);
1076                         kfree(iter);
1077                         break;
1078                 }
1079         }
1080         list_add_tail(&sus->node, &dev->unlk_lst);
1081 }
1082
1083 static int end_session_cont(struct opal_dev *dev)
1084 {
1085         dev->hsn = 0;
1086         dev->tsn = 0;
1087
1088         return parse_and_check_status(dev);
1089 }
1090
1091 static int finalize_and_send(struct opal_dev *dev, cont_fn cont)
1092 {
1093         int ret;
1094
1095         ret = cmd_finalize(dev, dev->hsn, dev->tsn);
1096         if (ret) {
1097                 pr_debug("Error finalizing command buffer: %d\n", ret);
1098                 return ret;
1099         }
1100
1101         print_buffer(dev->cmd, dev->pos);
1102
1103         return opal_send_recv(dev, cont);
1104 }
1105
1106 /*
1107  * request @column from table @table on device @dev. On success, the column
1108  * data will be available in dev->resp->tok[4]
1109  */
1110 static int generic_get_column(struct opal_dev *dev, const u8 *table,
1111                               u64 column)
1112 {
1113         int err;
1114
1115         err = cmd_start(dev, table, opalmethod[OPAL_GET]);
1116
1117         add_token_u8(&err, dev, OPAL_STARTLIST);
1118
1119         add_token_u8(&err, dev, OPAL_STARTNAME);
1120         add_token_u8(&err, dev, OPAL_STARTCOLUMN);
1121         add_token_u64(&err, dev, column);
1122         add_token_u8(&err, dev, OPAL_ENDNAME);
1123
1124         add_token_u8(&err, dev, OPAL_STARTNAME);
1125         add_token_u8(&err, dev, OPAL_ENDCOLUMN);
1126         add_token_u64(&err, dev, column);
1127         add_token_u8(&err, dev, OPAL_ENDNAME);
1128
1129         add_token_u8(&err, dev, OPAL_ENDLIST);
1130
1131         if (err)
1132                 return err;
1133
1134         return finalize_and_send(dev, parse_and_check_status);
1135 }
1136
1137 /*
1138  * see TCG SAS 5.3.2.3 for a description of the available columns
1139  *
1140  * the result is provided in dev->resp->tok[4]
1141  */
1142 static int generic_get_table_info(struct opal_dev *dev, enum opal_uid table,
1143                                   u64 column)
1144 {
1145         u8 uid[OPAL_UID_LENGTH];
1146         const unsigned int half = OPAL_UID_LENGTH/2;
1147
1148         /* sed-opal UIDs can be split in two halves:
1149          *  first:  actual table index
1150          *  second: relative index in the table
1151          * so we have to get the first half of the OPAL_TABLE_TABLE and use the
1152          * first part of the target table as relative index into that table
1153          */
1154         memcpy(uid, opaluid[OPAL_TABLE_TABLE], half);
1155         memcpy(uid+half, opaluid[table], half);
1156
1157         return generic_get_column(dev, uid, column);
1158 }
1159
1160 static int gen_key(struct opal_dev *dev, void *data)
1161 {
1162         u8 uid[OPAL_UID_LENGTH];
1163         int err;
1164
1165         memcpy(uid, dev->prev_data, min(sizeof(uid), dev->prev_d_len));
1166         kfree(dev->prev_data);
1167         dev->prev_data = NULL;
1168
1169         err = cmd_start(dev, uid, opalmethod[OPAL_GENKEY]);
1170
1171         if (err) {
1172                 pr_debug("Error building gen key command\n");
1173                 return err;
1174
1175         }
1176
1177         return finalize_and_send(dev, parse_and_check_status);
1178 }
1179
1180 static int get_active_key_cont(struct opal_dev *dev)
1181 {
1182         const char *activekey;
1183         size_t keylen;
1184         int error = 0;
1185
1186         error = parse_and_check_status(dev);
1187         if (error)
1188                 return error;
1189
1190         keylen = response_get_string(&dev->parsed, 4, &activekey);
1191         if (!activekey) {
1192                 pr_debug("%s: Couldn't extract the Activekey from the response\n",
1193                          __func__);
1194                 return OPAL_INVAL_PARAM;
1195         }
1196
1197         dev->prev_data = kmemdup(activekey, keylen, GFP_KERNEL);
1198
1199         if (!dev->prev_data)
1200                 return -ENOMEM;
1201
1202         dev->prev_d_len = keylen;
1203
1204         return 0;
1205 }
1206
1207 static int get_active_key(struct opal_dev *dev, void *data)
1208 {
1209         u8 uid[OPAL_UID_LENGTH];
1210         int err;
1211         u8 *lr = data;
1212
1213         err = build_locking_range(uid, sizeof(uid), *lr);
1214         if (err)
1215                 return err;
1216
1217         err = generic_get_column(dev, uid, OPAL_ACTIVEKEY);
1218         if (err)
1219                 return err;
1220
1221         return get_active_key_cont(dev);
1222 }
1223
1224 static int generic_lr_enable_disable(struct opal_dev *dev,
1225                                      u8 *uid, bool rle, bool wle,
1226                                      bool rl, bool wl)
1227 {
1228         int err;
1229
1230         err = cmd_start(dev, uid, opalmethod[OPAL_SET]);
1231
1232         add_token_u8(&err, dev, OPAL_STARTNAME);
1233         add_token_u8(&err, dev, OPAL_VALUES);
1234         add_token_u8(&err, dev, OPAL_STARTLIST);
1235
1236         add_token_u8(&err, dev, OPAL_STARTNAME);
1237         add_token_u8(&err, dev, OPAL_READLOCKENABLED);
1238         add_token_u8(&err, dev, rle);
1239         add_token_u8(&err, dev, OPAL_ENDNAME);
1240
1241         add_token_u8(&err, dev, OPAL_STARTNAME);
1242         add_token_u8(&err, dev, OPAL_WRITELOCKENABLED);
1243         add_token_u8(&err, dev, wle);
1244         add_token_u8(&err, dev, OPAL_ENDNAME);
1245
1246         add_token_u8(&err, dev, OPAL_STARTNAME);
1247         add_token_u8(&err, dev, OPAL_READLOCKED);
1248         add_token_u8(&err, dev, rl);
1249         add_token_u8(&err, dev, OPAL_ENDNAME);
1250
1251         add_token_u8(&err, dev, OPAL_STARTNAME);
1252         add_token_u8(&err, dev, OPAL_WRITELOCKED);
1253         add_token_u8(&err, dev, wl);
1254         add_token_u8(&err, dev, OPAL_ENDNAME);
1255
1256         add_token_u8(&err, dev, OPAL_ENDLIST);
1257         add_token_u8(&err, dev, OPAL_ENDNAME);
1258
1259         return err;
1260 }
1261
1262 static inline int enable_global_lr(struct opal_dev *dev, u8 *uid,
1263                                    struct opal_user_lr_setup *setup)
1264 {
1265         int err;
1266
1267         err = generic_lr_enable_disable(dev, uid, !!setup->RLE, !!setup->WLE,
1268                                         0, 0);
1269         if (err)
1270                 pr_debug("Failed to create enable global lr command\n");
1271
1272         return err;
1273 }
1274
1275 static int setup_locking_range(struct opal_dev *dev, void *data)
1276 {
1277         u8 uid[OPAL_UID_LENGTH];
1278         struct opal_user_lr_setup *setup = data;
1279         u8 lr;
1280         int err;
1281
1282         lr = setup->session.opal_key.lr;
1283         err = build_locking_range(uid, sizeof(uid), lr);
1284         if (err)
1285                 return err;
1286
1287         if (lr == 0)
1288                 err = enable_global_lr(dev, uid, setup);
1289         else {
1290                 err = cmd_start(dev, uid, opalmethod[OPAL_SET]);
1291
1292                 add_token_u8(&err, dev, OPAL_STARTNAME);
1293                 add_token_u8(&err, dev, OPAL_VALUES);
1294                 add_token_u8(&err, dev, OPAL_STARTLIST);
1295
1296                 add_token_u8(&err, dev, OPAL_STARTNAME);
1297                 add_token_u8(&err, dev, OPAL_RANGESTART);
1298                 add_token_u64(&err, dev, setup->range_start);
1299                 add_token_u8(&err, dev, OPAL_ENDNAME);
1300
1301                 add_token_u8(&err, dev, OPAL_STARTNAME);
1302                 add_token_u8(&err, dev, OPAL_RANGELENGTH);
1303                 add_token_u64(&err, dev, setup->range_length);
1304                 add_token_u8(&err, dev, OPAL_ENDNAME);
1305
1306                 add_token_u8(&err, dev, OPAL_STARTNAME);
1307                 add_token_u8(&err, dev, OPAL_READLOCKENABLED);
1308                 add_token_u64(&err, dev, !!setup->RLE);
1309                 add_token_u8(&err, dev, OPAL_ENDNAME);
1310
1311                 add_token_u8(&err, dev, OPAL_STARTNAME);
1312                 add_token_u8(&err, dev, OPAL_WRITELOCKENABLED);
1313                 add_token_u64(&err, dev, !!setup->WLE);
1314                 add_token_u8(&err, dev, OPAL_ENDNAME);
1315
1316                 add_token_u8(&err, dev, OPAL_ENDLIST);
1317                 add_token_u8(&err, dev, OPAL_ENDNAME);
1318         }
1319         if (err) {
1320                 pr_debug("Error building Setup Locking range command.\n");
1321                 return err;
1322         }
1323
1324         return finalize_and_send(dev, parse_and_check_status);
1325 }
1326
1327 static int start_generic_opal_session(struct opal_dev *dev,
1328                                       enum opal_uid auth,
1329                                       enum opal_uid sp_type,
1330                                       const char *key,
1331                                       u8 key_len)
1332 {
1333         u32 hsn;
1334         int err;
1335
1336         if (key == NULL && auth != OPAL_ANYBODY_UID)
1337                 return OPAL_INVAL_PARAM;
1338
1339         hsn = GENERIC_HOST_SESSION_NUM;
1340         err = cmd_start(dev, opaluid[OPAL_SMUID_UID],
1341                         opalmethod[OPAL_STARTSESSION]);
1342
1343         add_token_u64(&err, dev, hsn);
1344         add_token_bytestring(&err, dev, opaluid[sp_type], OPAL_UID_LENGTH);
1345         add_token_u8(&err, dev, 1);
1346
1347         switch (auth) {
1348         case OPAL_ANYBODY_UID:
1349                 break;
1350         case OPAL_ADMIN1_UID:
1351         case OPAL_SID_UID:
1352         case OPAL_PSID_UID:
1353                 add_token_u8(&err, dev, OPAL_STARTNAME);
1354                 add_token_u8(&err, dev, 0); /* HostChallenge */
1355                 add_token_bytestring(&err, dev, key, key_len);
1356                 add_token_u8(&err, dev, OPAL_ENDNAME);
1357                 add_token_u8(&err, dev, OPAL_STARTNAME);
1358                 add_token_u8(&err, dev, 3); /* HostSignAuth */
1359                 add_token_bytestring(&err, dev, opaluid[auth],
1360                                      OPAL_UID_LENGTH);
1361                 add_token_u8(&err, dev, OPAL_ENDNAME);
1362                 break;
1363         default:
1364                 pr_debug("Cannot start Admin SP session with auth %d\n", auth);
1365                 return OPAL_INVAL_PARAM;
1366         }
1367
1368         if (err) {
1369                 pr_debug("Error building start adminsp session command.\n");
1370                 return err;
1371         }
1372
1373         return finalize_and_send(dev, start_opal_session_cont);
1374 }
1375
1376 static int start_anybodyASP_opal_session(struct opal_dev *dev, void *data)
1377 {
1378         return start_generic_opal_session(dev, OPAL_ANYBODY_UID,
1379                                           OPAL_ADMINSP_UID, NULL, 0);
1380 }
1381
1382 static int start_SIDASP_opal_session(struct opal_dev *dev, void *data)
1383 {
1384         int ret;
1385         const u8 *key = dev->prev_data;
1386
1387         if (!key) {
1388                 const struct opal_key *okey = data;
1389
1390                 ret = start_generic_opal_session(dev, OPAL_SID_UID,
1391                                                  OPAL_ADMINSP_UID,
1392                                                  okey->key,
1393                                                  okey->key_len);
1394         } else {
1395                 ret = start_generic_opal_session(dev, OPAL_SID_UID,
1396                                                  OPAL_ADMINSP_UID,
1397                                                  key, dev->prev_d_len);
1398                 kfree(key);
1399                 dev->prev_data = NULL;
1400         }
1401
1402         return ret;
1403 }
1404
1405 static int start_admin1LSP_opal_session(struct opal_dev *dev, void *data)
1406 {
1407         struct opal_key *key = data;
1408
1409         return start_generic_opal_session(dev, OPAL_ADMIN1_UID,
1410                                           OPAL_LOCKINGSP_UID,
1411                                           key->key, key->key_len);
1412 }
1413
1414 static int start_PSID_opal_session(struct opal_dev *dev, void *data)
1415 {
1416         const struct opal_key *okey = data;
1417
1418         return start_generic_opal_session(dev, OPAL_PSID_UID,
1419                                           OPAL_ADMINSP_UID,
1420                                           okey->key,
1421                                           okey->key_len);
1422 }
1423
1424 static int start_auth_opal_session(struct opal_dev *dev, void *data)
1425 {
1426         struct opal_session_info *session = data;
1427         u8 lk_ul_user[OPAL_UID_LENGTH];
1428         size_t keylen = session->opal_key.key_len;
1429         int err = 0;
1430
1431         u8 *key = session->opal_key.key;
1432         u32 hsn = GENERIC_HOST_SESSION_NUM;
1433
1434         if (session->sum)
1435                 err = build_locking_user(lk_ul_user, sizeof(lk_ul_user),
1436                                          session->opal_key.lr);
1437         else if (session->who != OPAL_ADMIN1 && !session->sum)
1438                 err = build_locking_user(lk_ul_user, sizeof(lk_ul_user),
1439                                          session->who - 1);
1440         else
1441                 memcpy(lk_ul_user, opaluid[OPAL_ADMIN1_UID], OPAL_UID_LENGTH);
1442
1443         if (err)
1444                 return err;
1445
1446         err = cmd_start(dev, opaluid[OPAL_SMUID_UID],
1447                         opalmethod[OPAL_STARTSESSION]);
1448
1449         add_token_u64(&err, dev, hsn);
1450         add_token_bytestring(&err, dev, opaluid[OPAL_LOCKINGSP_UID],
1451                              OPAL_UID_LENGTH);
1452         add_token_u8(&err, dev, 1);
1453         add_token_u8(&err, dev, OPAL_STARTNAME);
1454         add_token_u8(&err, dev, 0);
1455         add_token_bytestring(&err, dev, key, keylen);
1456         add_token_u8(&err, dev, OPAL_ENDNAME);
1457         add_token_u8(&err, dev, OPAL_STARTNAME);
1458         add_token_u8(&err, dev, 3);
1459         add_token_bytestring(&err, dev, lk_ul_user, OPAL_UID_LENGTH);
1460         add_token_u8(&err, dev, OPAL_ENDNAME);
1461
1462         if (err) {
1463                 pr_debug("Error building STARTSESSION command.\n");
1464                 return err;
1465         }
1466
1467         return finalize_and_send(dev, start_opal_session_cont);
1468 }
1469
1470 static int revert_tper(struct opal_dev *dev, void *data)
1471 {
1472         int err;
1473
1474         err = cmd_start(dev, opaluid[OPAL_ADMINSP_UID],
1475                         opalmethod[OPAL_REVERT]);
1476         if (err) {
1477                 pr_debug("Error building REVERT TPER command.\n");
1478                 return err;
1479         }
1480
1481         return finalize_and_send(dev, parse_and_check_status);
1482 }
1483
1484 static int internal_activate_user(struct opal_dev *dev, void *data)
1485 {
1486         struct opal_session_info *session = data;
1487         u8 uid[OPAL_UID_LENGTH];
1488         int err;
1489
1490         memcpy(uid, opaluid[OPAL_USER1_UID], OPAL_UID_LENGTH);
1491         uid[7] = session->who;
1492
1493         err = cmd_start(dev, uid, opalmethod[OPAL_SET]);
1494         add_token_u8(&err, dev, OPAL_STARTNAME);
1495         add_token_u8(&err, dev, OPAL_VALUES);
1496         add_token_u8(&err, dev, OPAL_STARTLIST);
1497         add_token_u8(&err, dev, OPAL_STARTNAME);
1498         add_token_u8(&err, dev, 5); /* Enabled */
1499         add_token_u8(&err, dev, OPAL_TRUE);
1500         add_token_u8(&err, dev, OPAL_ENDNAME);
1501         add_token_u8(&err, dev, OPAL_ENDLIST);
1502         add_token_u8(&err, dev, OPAL_ENDNAME);
1503
1504         if (err) {
1505                 pr_debug("Error building Activate UserN command.\n");
1506                 return err;
1507         }
1508
1509         return finalize_and_send(dev, parse_and_check_status);
1510 }
1511
1512 static int erase_locking_range(struct opal_dev *dev, void *data)
1513 {
1514         struct opal_session_info *session = data;
1515         u8 uid[OPAL_UID_LENGTH];
1516         int err;
1517
1518         if (build_locking_range(uid, sizeof(uid), session->opal_key.lr) < 0)
1519                 return -ERANGE;
1520
1521         err = cmd_start(dev, uid, opalmethod[OPAL_ERASE]);
1522
1523         if (err) {
1524                 pr_debug("Error building Erase Locking Range Command.\n");
1525                 return err;
1526         }
1527
1528         return finalize_and_send(dev, parse_and_check_status);
1529 }
1530
1531 static int set_mbr_done(struct opal_dev *dev, void *data)
1532 {
1533         u8 *mbr_done_tf = data;
1534         int err;
1535
1536         err = cmd_start(dev, opaluid[OPAL_MBRCONTROL],
1537                         opalmethod[OPAL_SET]);
1538
1539         add_token_u8(&err, dev, OPAL_STARTNAME);
1540         add_token_u8(&err, dev, OPAL_VALUES);
1541         add_token_u8(&err, dev, OPAL_STARTLIST);
1542         add_token_u8(&err, dev, OPAL_STARTNAME);
1543         add_token_u8(&err, dev, OPAL_MBRDONE);
1544         add_token_u8(&err, dev, *mbr_done_tf); /* Done T or F */
1545         add_token_u8(&err, dev, OPAL_ENDNAME);
1546         add_token_u8(&err, dev, OPAL_ENDLIST);
1547         add_token_u8(&err, dev, OPAL_ENDNAME);
1548
1549         if (err) {
1550                 pr_debug("Error Building set MBR Done command\n");
1551                 return err;
1552         }
1553
1554         return finalize_and_send(dev, parse_and_check_status);
1555 }
1556
1557 static int set_mbr_enable_disable(struct opal_dev *dev, void *data)
1558 {
1559         u8 *mbr_en_dis = data;
1560         int err;
1561
1562         err = cmd_start(dev, opaluid[OPAL_MBRCONTROL],
1563                         opalmethod[OPAL_SET]);
1564
1565         add_token_u8(&err, dev, OPAL_STARTNAME);
1566         add_token_u8(&err, dev, OPAL_VALUES);
1567         add_token_u8(&err, dev, OPAL_STARTLIST);
1568         add_token_u8(&err, dev, OPAL_STARTNAME);
1569         add_token_u8(&err, dev, OPAL_MBRENABLE);
1570         add_token_u8(&err, dev, *mbr_en_dis);
1571         add_token_u8(&err, dev, OPAL_ENDNAME);
1572         add_token_u8(&err, dev, OPAL_ENDLIST);
1573         add_token_u8(&err, dev, OPAL_ENDNAME);
1574
1575         if (err) {
1576                 pr_debug("Error Building set MBR done command\n");
1577                 return err;
1578         }
1579
1580         return finalize_and_send(dev, parse_and_check_status);
1581 }
1582
1583 static int write_shadow_mbr(struct opal_dev *dev, void *data)
1584 {
1585         struct opal_shadow_mbr *shadow = data;
1586         const u8 __user *src;
1587         u8 *dst;
1588         size_t off = 0;
1589         u64 len;
1590         int err = 0;
1591
1592         /* do we fit in the available shadow mbr space? */
1593         err = generic_get_table_info(dev, OPAL_MBR, OPAL_TABLE_ROWS);
1594         if (err) {
1595                 pr_debug("MBR: could not get shadow size\n");
1596                 return err;
1597         }
1598
1599         len = response_get_u64(&dev->parsed, 4);
1600         if (shadow->size > len || shadow->offset > len - shadow->size) {
1601                 pr_debug("MBR: does not fit in shadow (%llu vs. %llu)\n",
1602                          shadow->offset + shadow->size, len);
1603                 return -ENOSPC;
1604         }
1605
1606         /* do the actual transmission(s) */
1607         src = (u8 __user *)(uintptr_t)shadow->data;
1608         while (off < shadow->size) {
1609                 err = cmd_start(dev, opaluid[OPAL_MBR], opalmethod[OPAL_SET]);
1610                 add_token_u8(&err, dev, OPAL_STARTNAME);
1611                 add_token_u8(&err, dev, OPAL_WHERE);
1612                 add_token_u64(&err, dev, shadow->offset + off);
1613                 add_token_u8(&err, dev, OPAL_ENDNAME);
1614
1615                 add_token_u8(&err, dev, OPAL_STARTNAME);
1616                 add_token_u8(&err, dev, OPAL_VALUES);
1617
1618                 /*
1619                  * The bytestring header is either 1 or 2 bytes, so assume 2.
1620                  * There also needs to be enough space to accommodate the
1621                  * trailing OPAL_ENDNAME (1 byte) and tokens added by
1622                  * cmd_finalize.
1623                  */
1624                 len = min(remaining_size(dev) - (2+1+CMD_FINALIZE_BYTES_NEEDED),
1625                           (size_t)(shadow->size - off));
1626                 pr_debug("MBR: write bytes %zu+%llu/%llu\n",
1627                          off, len, shadow->size);
1628
1629                 dst = add_bytestring_header(&err, dev, len);
1630                 if (!dst)
1631                         break;
1632                 if (copy_from_user(dst, src + off, len))
1633                         err = -EFAULT;
1634                 dev->pos += len;
1635
1636                 add_token_u8(&err, dev, OPAL_ENDNAME);
1637                 if (err)
1638                         break;
1639
1640                 err = finalize_and_send(dev, parse_and_check_status);
1641                 if (err)
1642                         break;
1643
1644                 off += len;
1645         }
1646
1647         return err;
1648 }
1649
1650 static int generic_pw_cmd(u8 *key, size_t key_len, u8 *cpin_uid,
1651                           struct opal_dev *dev)
1652 {
1653         int err;
1654
1655         err = cmd_start(dev, cpin_uid, opalmethod[OPAL_SET]);
1656
1657         add_token_u8(&err, dev, OPAL_STARTNAME);
1658         add_token_u8(&err, dev, OPAL_VALUES);
1659         add_token_u8(&err, dev, OPAL_STARTLIST);
1660         add_token_u8(&err, dev, OPAL_STARTNAME);
1661         add_token_u8(&err, dev, OPAL_PIN);
1662         add_token_bytestring(&err, dev, key, key_len);
1663         add_token_u8(&err, dev, OPAL_ENDNAME);
1664         add_token_u8(&err, dev, OPAL_ENDLIST);
1665         add_token_u8(&err, dev, OPAL_ENDNAME);
1666
1667         return err;
1668 }
1669
1670 static int set_new_pw(struct opal_dev *dev, void *data)
1671 {
1672         u8 cpin_uid[OPAL_UID_LENGTH];
1673         struct opal_session_info *usr = data;
1674
1675         memcpy(cpin_uid, opaluid[OPAL_C_PIN_ADMIN1], OPAL_UID_LENGTH);
1676
1677         if (usr->who != OPAL_ADMIN1) {
1678                 cpin_uid[5] = 0x03;
1679                 if (usr->sum)
1680                         cpin_uid[7] = usr->opal_key.lr + 1;
1681                 else
1682                         cpin_uid[7] = usr->who;
1683         }
1684
1685         if (generic_pw_cmd(usr->opal_key.key, usr->opal_key.key_len,
1686                            cpin_uid, dev)) {
1687                 pr_debug("Error building set password command.\n");
1688                 return -ERANGE;
1689         }
1690
1691         return finalize_and_send(dev, parse_and_check_status);
1692 }
1693
1694 static int set_sid_cpin_pin(struct opal_dev *dev, void *data)
1695 {
1696         u8 cpin_uid[OPAL_UID_LENGTH];
1697         struct opal_key *key = data;
1698
1699         memcpy(cpin_uid, opaluid[OPAL_C_PIN_SID], OPAL_UID_LENGTH);
1700
1701         if (generic_pw_cmd(key->key, key->key_len, cpin_uid, dev)) {
1702                 pr_debug("Error building Set SID cpin\n");
1703                 return -ERANGE;
1704         }
1705         return finalize_and_send(dev, parse_and_check_status);
1706 }
1707
1708 static int add_user_to_lr(struct opal_dev *dev, void *data)
1709 {
1710         u8 lr_buffer[OPAL_UID_LENGTH];
1711         u8 user_uid[OPAL_UID_LENGTH];
1712         struct opal_lock_unlock *lkul = data;
1713         int err;
1714
1715         memcpy(lr_buffer, opaluid[OPAL_LOCKINGRANGE_ACE_RDLOCKED],
1716                OPAL_UID_LENGTH);
1717
1718         if (lkul->l_state == OPAL_RW)
1719                 memcpy(lr_buffer, opaluid[OPAL_LOCKINGRANGE_ACE_WRLOCKED],
1720                        OPAL_UID_LENGTH);
1721
1722         lr_buffer[7] = lkul->session.opal_key.lr;
1723
1724         memcpy(user_uid, opaluid[OPAL_USER1_UID], OPAL_UID_LENGTH);
1725
1726         user_uid[7] = lkul->session.who;
1727
1728         err = cmd_start(dev, lr_buffer, opalmethod[OPAL_SET]);
1729
1730         add_token_u8(&err, dev, OPAL_STARTNAME);
1731         add_token_u8(&err, dev, OPAL_VALUES);
1732
1733         add_token_u8(&err, dev, OPAL_STARTLIST);
1734         add_token_u8(&err, dev, OPAL_STARTNAME);
1735         add_token_u8(&err, dev, 3);
1736
1737         add_token_u8(&err, dev, OPAL_STARTLIST);
1738
1739
1740         add_token_u8(&err, dev, OPAL_STARTNAME);
1741         add_token_bytestring(&err, dev,
1742                              opaluid[OPAL_HALF_UID_AUTHORITY_OBJ_REF],
1743                              OPAL_UID_LENGTH/2);
1744         add_token_bytestring(&err, dev, user_uid, OPAL_UID_LENGTH);
1745         add_token_u8(&err, dev, OPAL_ENDNAME);
1746
1747
1748         add_token_u8(&err, dev, OPAL_STARTNAME);
1749         add_token_bytestring(&err, dev,
1750                              opaluid[OPAL_HALF_UID_AUTHORITY_OBJ_REF],
1751                              OPAL_UID_LENGTH/2);
1752         add_token_bytestring(&err, dev, user_uid, OPAL_UID_LENGTH);
1753         add_token_u8(&err, dev, OPAL_ENDNAME);
1754
1755
1756         add_token_u8(&err, dev, OPAL_STARTNAME);
1757         add_token_bytestring(&err, dev, opaluid[OPAL_HALF_UID_BOOLEAN_ACE],
1758                              OPAL_UID_LENGTH/2);
1759         add_token_u8(&err, dev, 1);
1760         add_token_u8(&err, dev, OPAL_ENDNAME);
1761
1762
1763         add_token_u8(&err, dev, OPAL_ENDLIST);
1764         add_token_u8(&err, dev, OPAL_ENDNAME);
1765         add_token_u8(&err, dev, OPAL_ENDLIST);
1766         add_token_u8(&err, dev, OPAL_ENDNAME);
1767
1768         if (err) {
1769                 pr_debug("Error building add user to locking range command.\n");
1770                 return err;
1771         }
1772
1773         return finalize_and_send(dev, parse_and_check_status);
1774 }
1775
1776 static int lock_unlock_locking_range(struct opal_dev *dev, void *data)
1777 {
1778         u8 lr_buffer[OPAL_UID_LENGTH];
1779         struct opal_lock_unlock *lkul = data;
1780         u8 read_locked = 1, write_locked = 1;
1781         int err = 0;
1782
1783         if (build_locking_range(lr_buffer, sizeof(lr_buffer),
1784                                 lkul->session.opal_key.lr) < 0)
1785                 return -ERANGE;
1786
1787         switch (lkul->l_state) {
1788         case OPAL_RO:
1789                 read_locked = 0;
1790                 write_locked = 1;
1791                 break;
1792         case OPAL_RW:
1793                 read_locked = 0;
1794                 write_locked = 0;
1795                 break;
1796         case OPAL_LK:
1797                 /* vars are initialized to locked */
1798                 break;
1799         default:
1800                 pr_debug("Tried to set an invalid locking state... returning to uland\n");
1801                 return OPAL_INVAL_PARAM;
1802         }
1803
1804         err = cmd_start(dev, lr_buffer, opalmethod[OPAL_SET]);
1805
1806         add_token_u8(&err, dev, OPAL_STARTNAME);
1807         add_token_u8(&err, dev, OPAL_VALUES);
1808         add_token_u8(&err, dev, OPAL_STARTLIST);
1809
1810         add_token_u8(&err, dev, OPAL_STARTNAME);
1811         add_token_u8(&err, dev, OPAL_READLOCKED);
1812         add_token_u8(&err, dev, read_locked);
1813         add_token_u8(&err, dev, OPAL_ENDNAME);
1814
1815         add_token_u8(&err, dev, OPAL_STARTNAME);
1816         add_token_u8(&err, dev, OPAL_WRITELOCKED);
1817         add_token_u8(&err, dev, write_locked);
1818         add_token_u8(&err, dev, OPAL_ENDNAME);
1819
1820         add_token_u8(&err, dev, OPAL_ENDLIST);
1821         add_token_u8(&err, dev, OPAL_ENDNAME);
1822
1823         if (err) {
1824                 pr_debug("Error building SET command.\n");
1825                 return err;
1826         }
1827
1828         return finalize_and_send(dev, parse_and_check_status);
1829 }
1830
1831
1832 static int lock_unlock_locking_range_sum(struct opal_dev *dev, void *data)
1833 {
1834         u8 lr_buffer[OPAL_UID_LENGTH];
1835         u8 read_locked = 1, write_locked = 1;
1836         struct opal_lock_unlock *lkul = data;
1837         int ret;
1838
1839         clear_opal_cmd(dev);
1840         set_comid(dev, dev->comid);
1841
1842         if (build_locking_range(lr_buffer, sizeof(lr_buffer),
1843                                 lkul->session.opal_key.lr) < 0)
1844                 return -ERANGE;
1845
1846         switch (lkul->l_state) {
1847         case OPAL_RO:
1848                 read_locked = 0;
1849                 write_locked = 1;
1850                 break;
1851         case OPAL_RW:
1852                 read_locked = 0;
1853                 write_locked = 0;
1854                 break;
1855         case OPAL_LK:
1856                 /* vars are initialized to locked */
1857                 break;
1858         default:
1859                 pr_debug("Tried to set an invalid locking state.\n");
1860                 return OPAL_INVAL_PARAM;
1861         }
1862         ret = generic_lr_enable_disable(dev, lr_buffer, 1, 1,
1863                                         read_locked, write_locked);
1864
1865         if (ret < 0) {
1866                 pr_debug("Error building SET command.\n");
1867                 return ret;
1868         }
1869
1870         return finalize_and_send(dev, parse_and_check_status);
1871 }
1872
1873 static int activate_lsp(struct opal_dev *dev, void *data)
1874 {
1875         struct opal_lr_act *opal_act = data;
1876         u8 user_lr[OPAL_UID_LENGTH];
1877         u8 uint_3 = 0x83;
1878         int err, i;
1879
1880         err = cmd_start(dev, opaluid[OPAL_LOCKINGSP_UID],
1881                         opalmethod[OPAL_ACTIVATE]);
1882
1883         if (opal_act->sum) {
1884                 err = build_locking_range(user_lr, sizeof(user_lr),
1885                                           opal_act->lr[0]);
1886                 if (err)
1887                         return err;
1888
1889                 add_token_u8(&err, dev, OPAL_STARTNAME);
1890                 add_token_u8(&err, dev, uint_3);
1891                 add_token_u8(&err, dev, 6);
1892                 add_token_u8(&err, dev, 0);
1893                 add_token_u8(&err, dev, 0);
1894
1895                 add_token_u8(&err, dev, OPAL_STARTLIST);
1896                 add_token_bytestring(&err, dev, user_lr, OPAL_UID_LENGTH);
1897                 for (i = 1; i < opal_act->num_lrs; i++) {
1898                         user_lr[7] = opal_act->lr[i];
1899                         add_token_bytestring(&err, dev, user_lr, OPAL_UID_LENGTH);
1900                 }
1901                 add_token_u8(&err, dev, OPAL_ENDLIST);
1902                 add_token_u8(&err, dev, OPAL_ENDNAME);
1903         }
1904
1905         if (err) {
1906                 pr_debug("Error building Activate LockingSP command.\n");
1907                 return err;
1908         }
1909
1910         return finalize_and_send(dev, parse_and_check_status);
1911 }
1912
1913 /* Determine if we're in the Manufactured Inactive or Active state */
1914 static int get_lsp_lifecycle(struct opal_dev *dev, void *data)
1915 {
1916         u8 lc_status;
1917         int err;
1918
1919         err = generic_get_column(dev, opaluid[OPAL_LOCKINGSP_UID],
1920                                  OPAL_LIFECYCLE);
1921         if (err)
1922                 return err;
1923
1924         lc_status = response_get_u64(&dev->parsed, 4);
1925         /* 0x08 is Manufactured Inactive */
1926         /* 0x09 is Manufactured */
1927         if (lc_status != OPAL_MANUFACTURED_INACTIVE) {
1928                 pr_debug("Couldn't determine the status of the Lifecycle state\n");
1929                 return -ENODEV;
1930         }
1931
1932         return 0;
1933 }
1934
1935 static int get_msid_cpin_pin(struct opal_dev *dev, void *data)
1936 {
1937         const char *msid_pin;
1938         size_t strlen;
1939         int err;
1940
1941         err = generic_get_column(dev, opaluid[OPAL_C_PIN_MSID], OPAL_PIN);
1942         if (err)
1943                 return err;
1944
1945         strlen = response_get_string(&dev->parsed, 4, &msid_pin);
1946         if (!msid_pin) {
1947                 pr_debug("Couldn't extract MSID_CPIN from response\n");
1948                 return OPAL_INVAL_PARAM;
1949         }
1950
1951         dev->prev_data = kmemdup(msid_pin, strlen, GFP_KERNEL);
1952         if (!dev->prev_data)
1953                 return -ENOMEM;
1954
1955         dev->prev_d_len = strlen;
1956
1957         return 0;
1958 }
1959
1960 static int end_opal_session(struct opal_dev *dev, void *data)
1961 {
1962         int err = 0;
1963
1964         clear_opal_cmd(dev);
1965         set_comid(dev, dev->comid);
1966         add_token_u8(&err, dev, OPAL_ENDOFSESSION);
1967
1968         if (err < 0)
1969                 return err;
1970
1971         return finalize_and_send(dev, end_session_cont);
1972 }
1973
1974 static int end_opal_session_error(struct opal_dev *dev)
1975 {
1976         const struct opal_step error_end_session = {
1977                 end_opal_session,
1978         };
1979
1980         return execute_step(dev, &error_end_session, 0);
1981 }
1982
1983 static inline void setup_opal_dev(struct opal_dev *dev)
1984 {
1985         dev->tsn = 0;
1986         dev->hsn = 0;
1987         dev->prev_data = NULL;
1988 }
1989
1990 static int check_opal_support(struct opal_dev *dev)
1991 {
1992         int ret;
1993
1994         mutex_lock(&dev->dev_lock);
1995         setup_opal_dev(dev);
1996         ret = opal_discovery0_step(dev);
1997         dev->supported = !ret;
1998         mutex_unlock(&dev->dev_lock);
1999
2000         return ret;
2001 }
2002
2003 static void clean_opal_dev(struct opal_dev *dev)
2004 {
2005
2006         struct opal_suspend_data *suspend, *next;
2007
2008         mutex_lock(&dev->dev_lock);
2009         list_for_each_entry_safe(suspend, next, &dev->unlk_lst, node) {
2010                 list_del(&suspend->node);
2011                 kfree(suspend);
2012         }
2013         mutex_unlock(&dev->dev_lock);
2014 }
2015
2016 void free_opal_dev(struct opal_dev *dev)
2017 {
2018         if (!dev)
2019                 return;
2020
2021         clean_opal_dev(dev);
2022         kfree(dev);
2023 }
2024 EXPORT_SYMBOL(free_opal_dev);
2025
2026 struct opal_dev *init_opal_dev(void *data, sec_send_recv *send_recv)
2027 {
2028         struct opal_dev *dev;
2029
2030         dev = kmalloc(sizeof(*dev), GFP_KERNEL);
2031         if (!dev)
2032                 return NULL;
2033
2034         INIT_LIST_HEAD(&dev->unlk_lst);
2035         mutex_init(&dev->dev_lock);
2036         dev->data = data;
2037         dev->send_recv = send_recv;
2038         if (check_opal_support(dev) != 0) {
2039                 pr_debug("Opal is not supported on this device\n");
2040                 kfree(dev);
2041                 return NULL;
2042         }
2043
2044         return dev;
2045 }
2046 EXPORT_SYMBOL(init_opal_dev);
2047
2048 static int opal_secure_erase_locking_range(struct opal_dev *dev,
2049                                            struct opal_session_info *opal_session)
2050 {
2051         const struct opal_step erase_steps[] = {
2052                 { start_auth_opal_session, opal_session },
2053                 { get_active_key, &opal_session->opal_key.lr },
2054                 { gen_key, },
2055                 { end_opal_session, }
2056         };
2057         int ret;
2058
2059         mutex_lock(&dev->dev_lock);
2060         setup_opal_dev(dev);
2061         ret = execute_steps(dev, erase_steps, ARRAY_SIZE(erase_steps));
2062         mutex_unlock(&dev->dev_lock);
2063
2064         return ret;
2065 }
2066
2067 static int opal_erase_locking_range(struct opal_dev *dev,
2068                                     struct opal_session_info *opal_session)
2069 {
2070         const struct opal_step erase_steps[] = {
2071                 { start_auth_opal_session, opal_session },
2072                 { erase_locking_range, opal_session },
2073                 { end_opal_session, }
2074         };
2075         int ret;
2076
2077         mutex_lock(&dev->dev_lock);
2078         setup_opal_dev(dev);
2079         ret = execute_steps(dev, erase_steps, ARRAY_SIZE(erase_steps));
2080         mutex_unlock(&dev->dev_lock);
2081
2082         return ret;
2083 }
2084
2085 static int opal_enable_disable_shadow_mbr(struct opal_dev *dev,
2086                                           struct opal_mbr_data *opal_mbr)
2087 {
2088         u8 enable_disable = opal_mbr->enable_disable == OPAL_MBR_ENABLE ?
2089                 OPAL_TRUE : OPAL_FALSE;
2090
2091         const struct opal_step mbr_steps[] = {
2092                 { start_admin1LSP_opal_session, &opal_mbr->key },
2093                 { set_mbr_done, &enable_disable },
2094                 { end_opal_session, },
2095                 { start_admin1LSP_opal_session, &opal_mbr->key },
2096                 { set_mbr_enable_disable, &enable_disable },
2097                 { end_opal_session, }
2098         };
2099         int ret;
2100
2101         if (opal_mbr->enable_disable != OPAL_MBR_ENABLE &&
2102             opal_mbr->enable_disable != OPAL_MBR_DISABLE)
2103                 return -EINVAL;
2104
2105         mutex_lock(&dev->dev_lock);
2106         setup_opal_dev(dev);
2107         ret = execute_steps(dev, mbr_steps, ARRAY_SIZE(mbr_steps));
2108         mutex_unlock(&dev->dev_lock);
2109
2110         return ret;
2111 }
2112
2113 static int opal_set_mbr_done(struct opal_dev *dev,
2114                              struct opal_mbr_done *mbr_done)
2115 {
2116         u8 mbr_done_tf = mbr_done->done_flag == OPAL_MBR_DONE ?
2117                 OPAL_TRUE : OPAL_FALSE;
2118
2119         const struct opal_step mbr_steps[] = {
2120                 { start_admin1LSP_opal_session, &mbr_done->key },
2121                 { set_mbr_done, &mbr_done_tf },
2122                 { end_opal_session, }
2123         };
2124         int ret;
2125
2126         if (mbr_done->done_flag != OPAL_MBR_DONE &&
2127             mbr_done->done_flag != OPAL_MBR_NOT_DONE)
2128                 return -EINVAL;
2129
2130         mutex_lock(&dev->dev_lock);
2131         setup_opal_dev(dev);
2132         ret = execute_steps(dev, mbr_steps, ARRAY_SIZE(mbr_steps));
2133         mutex_unlock(&dev->dev_lock);
2134
2135         return ret;
2136 }
2137
2138 static int opal_write_shadow_mbr(struct opal_dev *dev,
2139                                  struct opal_shadow_mbr *info)
2140 {
2141         const struct opal_step mbr_steps[] = {
2142                 { start_admin1LSP_opal_session, &info->key },
2143                 { write_shadow_mbr, info },
2144                 { end_opal_session, }
2145         };
2146         int ret;
2147
2148         if (info->size == 0)
2149                 return 0;
2150
2151         mutex_lock(&dev->dev_lock);
2152         setup_opal_dev(dev);
2153         ret = execute_steps(dev, mbr_steps, ARRAY_SIZE(mbr_steps));
2154         mutex_unlock(&dev->dev_lock);
2155
2156         return ret;
2157 }
2158
2159 static int opal_save(struct opal_dev *dev, struct opal_lock_unlock *lk_unlk)
2160 {
2161         struct opal_suspend_data *suspend;
2162
2163         suspend = kzalloc(sizeof(*suspend), GFP_KERNEL);
2164         if (!suspend)
2165                 return -ENOMEM;
2166
2167         suspend->unlk = *lk_unlk;
2168         suspend->lr = lk_unlk->session.opal_key.lr;
2169
2170         mutex_lock(&dev->dev_lock);
2171         setup_opal_dev(dev);
2172         add_suspend_info(dev, suspend);
2173         mutex_unlock(&dev->dev_lock);
2174
2175         return 0;
2176 }
2177
2178 static int opal_add_user_to_lr(struct opal_dev *dev,
2179                                struct opal_lock_unlock *lk_unlk)
2180 {
2181         const struct opal_step steps[] = {
2182                 { start_admin1LSP_opal_session, &lk_unlk->session.opal_key },
2183                 { add_user_to_lr, lk_unlk },
2184                 { end_opal_session, }
2185         };
2186         int ret;
2187
2188         if (lk_unlk->l_state != OPAL_RO &&
2189             lk_unlk->l_state != OPAL_RW) {
2190                 pr_debug("Locking state was not RO or RW\n");
2191                 return -EINVAL;
2192         }
2193
2194         if (lk_unlk->session.who < OPAL_USER1 ||
2195             lk_unlk->session.who > OPAL_USER9) {
2196                 pr_debug("Authority was not within the range of users: %d\n",
2197                          lk_unlk->session.who);
2198                 return -EINVAL;
2199         }
2200
2201         if (lk_unlk->session.sum) {
2202                 pr_debug("%s not supported in sum. Use setup locking range\n",
2203                          __func__);
2204                 return -EINVAL;
2205         }
2206
2207         mutex_lock(&dev->dev_lock);
2208         setup_opal_dev(dev);
2209         ret = execute_steps(dev, steps, ARRAY_SIZE(steps));
2210         mutex_unlock(&dev->dev_lock);
2211
2212         return ret;
2213 }
2214
2215 static int opal_reverttper(struct opal_dev *dev, struct opal_key *opal, bool psid)
2216 {
2217         /* controller will terminate session */
2218         const struct opal_step revert_steps[] = {
2219                 { start_SIDASP_opal_session, opal },
2220                 { revert_tper, }
2221         };
2222         const struct opal_step psid_revert_steps[] = {
2223                 { start_PSID_opal_session, opal },
2224                 { revert_tper, }
2225         };
2226
2227         int ret;
2228
2229         mutex_lock(&dev->dev_lock);
2230         setup_opal_dev(dev);
2231         if (psid)
2232                 ret = execute_steps(dev, psid_revert_steps,
2233                                     ARRAY_SIZE(psid_revert_steps));
2234         else
2235                 ret = execute_steps(dev, revert_steps,
2236                                     ARRAY_SIZE(revert_steps));
2237         mutex_unlock(&dev->dev_lock);
2238
2239         /*
2240          * If we successfully reverted lets clean
2241          * any saved locking ranges.
2242          */
2243         if (!ret)
2244                 clean_opal_dev(dev);
2245
2246         return ret;
2247 }
2248
2249 static int __opal_lock_unlock(struct opal_dev *dev,
2250                               struct opal_lock_unlock *lk_unlk)
2251 {
2252         const struct opal_step unlock_steps[] = {
2253                 { start_auth_opal_session, &lk_unlk->session },
2254                 { lock_unlock_locking_range, lk_unlk },
2255                 { end_opal_session, }
2256         };
2257         const struct opal_step unlock_sum_steps[] = {
2258                 { start_auth_opal_session, &lk_unlk->session },
2259                 { lock_unlock_locking_range_sum, lk_unlk },
2260                 { end_opal_session, }
2261         };
2262
2263         if (lk_unlk->session.sum)
2264                 return execute_steps(dev, unlock_sum_steps,
2265                                      ARRAY_SIZE(unlock_sum_steps));
2266         else
2267                 return execute_steps(dev, unlock_steps,
2268                                      ARRAY_SIZE(unlock_steps));
2269 }
2270
2271 static int __opal_set_mbr_done(struct opal_dev *dev, struct opal_key *key)
2272 {
2273         u8 mbr_done_tf = OPAL_TRUE;
2274         const struct opal_step mbrdone_step[] = {
2275                 { start_admin1LSP_opal_session, key },
2276                 { set_mbr_done, &mbr_done_tf },
2277                 { end_opal_session, }
2278         };
2279
2280         return execute_steps(dev, mbrdone_step, ARRAY_SIZE(mbrdone_step));
2281 }
2282
2283 static int opal_lock_unlock(struct opal_dev *dev,
2284                             struct opal_lock_unlock *lk_unlk)
2285 {
2286         int ret;
2287
2288         if (lk_unlk->session.who > OPAL_USER9)
2289                 return -EINVAL;
2290
2291         mutex_lock(&dev->dev_lock);
2292         ret = __opal_lock_unlock(dev, lk_unlk);
2293         mutex_unlock(&dev->dev_lock);
2294
2295         return ret;
2296 }
2297
2298 static int opal_take_ownership(struct opal_dev *dev, struct opal_key *opal)
2299 {
2300         const struct opal_step owner_steps[] = {
2301                 { start_anybodyASP_opal_session, },
2302                 { get_msid_cpin_pin, },
2303                 { end_opal_session, },
2304                 { start_SIDASP_opal_session, opal },
2305                 { set_sid_cpin_pin, opal },
2306                 { end_opal_session, }
2307         };
2308         int ret;
2309
2310         if (!dev)
2311                 return -ENODEV;
2312
2313         mutex_lock(&dev->dev_lock);
2314         setup_opal_dev(dev);
2315         ret = execute_steps(dev, owner_steps, ARRAY_SIZE(owner_steps));
2316         mutex_unlock(&dev->dev_lock);
2317
2318         return ret;
2319 }
2320
2321 static int opal_activate_lsp(struct opal_dev *dev,
2322                              struct opal_lr_act *opal_lr_act)
2323 {
2324         const struct opal_step active_steps[] = {
2325                 { start_SIDASP_opal_session, &opal_lr_act->key },
2326                 { get_lsp_lifecycle, },
2327                 { activate_lsp, opal_lr_act },
2328                 { end_opal_session, }
2329         };
2330         int ret;
2331
2332         if (!opal_lr_act->num_lrs || opal_lr_act->num_lrs > OPAL_MAX_LRS)
2333                 return -EINVAL;
2334
2335         mutex_lock(&dev->dev_lock);
2336         setup_opal_dev(dev);
2337         ret = execute_steps(dev, active_steps, ARRAY_SIZE(active_steps));
2338         mutex_unlock(&dev->dev_lock);
2339
2340         return ret;
2341 }
2342
2343 static int opal_setup_locking_range(struct opal_dev *dev,
2344                                     struct opal_user_lr_setup *opal_lrs)
2345 {
2346         const struct opal_step lr_steps[] = {
2347                 { start_auth_opal_session, &opal_lrs->session },
2348                 { setup_locking_range, opal_lrs },
2349                 { end_opal_session, }
2350         };
2351         int ret;
2352
2353         mutex_lock(&dev->dev_lock);
2354         setup_opal_dev(dev);
2355         ret = execute_steps(dev, lr_steps, ARRAY_SIZE(lr_steps));
2356         mutex_unlock(&dev->dev_lock);
2357
2358         return ret;
2359 }
2360
2361 static int opal_set_new_pw(struct opal_dev *dev, struct opal_new_pw *opal_pw)
2362 {
2363         const struct opal_step pw_steps[] = {
2364                 { start_auth_opal_session, &opal_pw->session },
2365                 { set_new_pw, &opal_pw->new_user_pw },
2366                 { end_opal_session, }
2367         };
2368         int ret;
2369
2370         if (opal_pw->session.who > OPAL_USER9  ||
2371             opal_pw->new_user_pw.who > OPAL_USER9)
2372                 return -EINVAL;
2373
2374         mutex_lock(&dev->dev_lock);
2375         setup_opal_dev(dev);
2376         ret = execute_steps(dev, pw_steps, ARRAY_SIZE(pw_steps));
2377         mutex_unlock(&dev->dev_lock);
2378
2379         return ret;
2380 }
2381
2382 static int opal_activate_user(struct opal_dev *dev,
2383                               struct opal_session_info *opal_session)
2384 {
2385         const struct opal_step act_steps[] = {
2386                 { start_admin1LSP_opal_session, &opal_session->opal_key },
2387                 { internal_activate_user, opal_session },
2388                 { end_opal_session, }
2389         };
2390         int ret;
2391
2392         /* We can't activate Admin1 it's active as manufactured */
2393         if (opal_session->who < OPAL_USER1 ||
2394             opal_session->who > OPAL_USER9) {
2395                 pr_debug("Who was not a valid user: %d\n", opal_session->who);
2396                 return -EINVAL;
2397         }
2398
2399         mutex_lock(&dev->dev_lock);
2400         setup_opal_dev(dev);
2401         ret = execute_steps(dev, act_steps, ARRAY_SIZE(act_steps));
2402         mutex_unlock(&dev->dev_lock);
2403
2404         return ret;
2405 }
2406
2407 bool opal_unlock_from_suspend(struct opal_dev *dev)
2408 {
2409         struct opal_suspend_data *suspend;
2410         bool was_failure = false;
2411         int ret = 0;
2412
2413         if (!dev)
2414                 return false;
2415
2416         if (!dev->supported)
2417                 return false;
2418
2419         mutex_lock(&dev->dev_lock);
2420         setup_opal_dev(dev);
2421
2422         list_for_each_entry(suspend, &dev->unlk_lst, node) {
2423                 dev->tsn = 0;
2424                 dev->hsn = 0;
2425
2426                 ret = __opal_lock_unlock(dev, &suspend->unlk);
2427                 if (ret) {
2428                         pr_debug("Failed to unlock LR %hhu with sum %d\n",
2429                                  suspend->unlk.session.opal_key.lr,
2430                                  suspend->unlk.session.sum);
2431                         was_failure = true;
2432                 }
2433
2434                 if (dev->mbr_enabled) {
2435                         ret = __opal_set_mbr_done(dev, &suspend->unlk.session.opal_key);
2436                         if (ret)
2437                                 pr_debug("Failed to set MBR Done in S3 resume\n");
2438                 }
2439         }
2440         mutex_unlock(&dev->dev_lock);
2441
2442         return was_failure;
2443 }
2444 EXPORT_SYMBOL(opal_unlock_from_suspend);
2445
2446 int sed_ioctl(struct opal_dev *dev, unsigned int cmd, void __user *arg)
2447 {
2448         void *p;
2449         int ret = -ENOTTY;
2450
2451         if (!capable(CAP_SYS_ADMIN))
2452                 return -EACCES;
2453         if (!dev)
2454                 return -ENOTSUPP;
2455         if (!dev->supported)
2456                 return -ENOTSUPP;
2457
2458         p = memdup_user(arg, _IOC_SIZE(cmd));
2459         if (IS_ERR(p))
2460                 return PTR_ERR(p);
2461
2462         switch (cmd) {
2463         case IOC_OPAL_SAVE:
2464                 ret = opal_save(dev, p);
2465                 break;
2466         case IOC_OPAL_LOCK_UNLOCK:
2467                 ret = opal_lock_unlock(dev, p);
2468                 break;
2469         case IOC_OPAL_TAKE_OWNERSHIP:
2470                 ret = opal_take_ownership(dev, p);
2471                 break;
2472         case IOC_OPAL_ACTIVATE_LSP:
2473                 ret = opal_activate_lsp(dev, p);
2474                 break;
2475         case IOC_OPAL_SET_PW:
2476                 ret = opal_set_new_pw(dev, p);
2477                 break;
2478         case IOC_OPAL_ACTIVATE_USR:
2479                 ret = opal_activate_user(dev, p);
2480                 break;
2481         case IOC_OPAL_REVERT_TPR:
2482                 ret = opal_reverttper(dev, p, false);
2483                 break;
2484         case IOC_OPAL_LR_SETUP:
2485                 ret = opal_setup_locking_range(dev, p);
2486                 break;
2487         case IOC_OPAL_ADD_USR_TO_LR:
2488                 ret = opal_add_user_to_lr(dev, p);
2489                 break;
2490         case IOC_OPAL_ENABLE_DISABLE_MBR:
2491                 ret = opal_enable_disable_shadow_mbr(dev, p);
2492                 break;
2493         case IOC_OPAL_MBR_DONE:
2494                 ret = opal_set_mbr_done(dev, p);
2495                 break;
2496         case IOC_OPAL_WRITE_SHADOW_MBR:
2497                 ret = opal_write_shadow_mbr(dev, p);
2498                 break;
2499         case IOC_OPAL_ERASE_LR:
2500                 ret = opal_erase_locking_range(dev, p);
2501                 break;
2502         case IOC_OPAL_SECURE_ERASE_LR:
2503                 ret = opal_secure_erase_locking_range(dev, p);
2504                 break;
2505         case IOC_OPAL_PSID_REVERT_TPR:
2506                 ret = opal_reverttper(dev, p, true);
2507                 break;
2508         default:
2509                 break;
2510         }
2511
2512         kfree(p);
2513         return ret;
2514 }
2515 EXPORT_SYMBOL_GPL(sed_ioctl);