14e1bc9a0SAchim Leubner /*******************************************************************************
24e1bc9a0SAchim Leubner *Copyright (c) 2014 PMC-Sierra, Inc. All rights reserved.
34e1bc9a0SAchim Leubner *
44e1bc9a0SAchim Leubner *Redistribution and use in source and binary forms, with or without modification, are permitted provided
54e1bc9a0SAchim Leubner *that the following conditions are met:
64e1bc9a0SAchim Leubner *1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
74e1bc9a0SAchim Leubner *following disclaimer.
84e1bc9a0SAchim Leubner *2. Redistributions in binary form must reproduce the above copyright notice,
94e1bc9a0SAchim Leubner *this list of conditions and the following disclaimer in the documentation and/or other materials provided
104e1bc9a0SAchim Leubner *with the distribution.
114e1bc9a0SAchim Leubner *
124e1bc9a0SAchim Leubner *THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED
134e1bc9a0SAchim Leubner *WARRANTIES,INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
144e1bc9a0SAchim Leubner *FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
154e1bc9a0SAchim Leubner *FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
164e1bc9a0SAchim Leubner *NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
174e1bc9a0SAchim Leubner *BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
184e1bc9a0SAchim Leubner *LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
194e1bc9a0SAchim Leubner *SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE
204e1bc9a0SAchim Leubner *
214e1bc9a0SAchim Leubner *
224e1bc9a0SAchim Leubner *******************************************************************************/
234e1bc9a0SAchim Leubner /*******************************************************************************
244e1bc9a0SAchim Leubner **
254e1bc9a0SAchim Leubner ** Version Control Information:
264e1bc9a0SAchim Leubner **
274e1bc9a0SAchim Leubner ** $Revision: 113920 $
284e1bc9a0SAchim Leubner ** $Author: mcleanda $
294e1bc9a0SAchim Leubner ** $Date: 2012-05-08 11:30:44 -0700 (Tue, 08 May 2012) $
304e1bc9a0SAchim Leubner ** $Id: lxencrypt.c 113920 2012-05-08 18:30:44Z mcleanda $
314e1bc9a0SAchim Leubner **
324e1bc9a0SAchim Leubner *******************************************************************************/
334e1bc9a0SAchim Leubner
344e1bc9a0SAchim Leubner #include <dev/pms/RefTisa/tisa/sassata/common/tdioctl.h>
354e1bc9a0SAchim Leubner #include <dev/pms/RefTisa/tisa/api/titypes.h>
364e1bc9a0SAchim Leubner
374e1bc9a0SAchim Leubner #include <dev/pms/freebsd/driver/common/lxencrypt.h>
384e1bc9a0SAchim Leubner #include <sys/param.h>
394e1bc9a0SAchim Leubner #include <sys/queue.h>
404e1bc9a0SAchim Leubner #include <vm/uma.h>
414e1bc9a0SAchim Leubner
424e1bc9a0SAchim Leubner
434e1bc9a0SAchim Leubner #ifdef ENCRYPT_ENHANCE
442efbd10aSRyan Libby static atomic_t ioerr_queue_count;
454e1bc9a0SAchim Leubner /******************************************************************************
464e1bc9a0SAchim Leubner careful_write():
474e1bc9a0SAchim Leubner
484e1bc9a0SAchim Leubner Purpose:
494e1bc9a0SAchim Leubner Parameters:
504e1bc9a0SAchim Leubner Return:
514e1bc9a0SAchim Leubner Note:
524e1bc9a0SAchim Leubner ******************************************************************************/
534e1bc9a0SAchim Leubner static int
careful_write(char * buf,int offset,int max,const char * fmt,...)544e1bc9a0SAchim Leubner careful_write(char *buf, int offset, int max, const char *fmt, ...)
554e1bc9a0SAchim Leubner {
564e1bc9a0SAchim Leubner static char s[PAGE_SIZE]; /* Assumes serialization */
574e1bc9a0SAchim Leubner va_list args;
584e1bc9a0SAchim Leubner int i;
594e1bc9a0SAchim Leubner
604e1bc9a0SAchim Leubner if(offset > max)
614e1bc9a0SAchim Leubner return 0;
624e1bc9a0SAchim Leubner s[PAGE_SIZE - 1] = '\0';
634e1bc9a0SAchim Leubner
644e1bc9a0SAchim Leubner va_start(args, fmt);
654e1bc9a0SAchim Leubner i = vsnprintf(s, PAGE_SIZE - 1, fmt, args);
664e1bc9a0SAchim Leubner if((offset + i) > max)
674e1bc9a0SAchim Leubner return 0;
684e1bc9a0SAchim Leubner memcpy(buf + offset, s, i);
694e1bc9a0SAchim Leubner va_end(args);
704e1bc9a0SAchim Leubner
714e1bc9a0SAchim Leubner return i;
724e1bc9a0SAchim Leubner }
734e1bc9a0SAchim Leubner
744e1bc9a0SAchim Leubner /******************************************************************************
754e1bc9a0SAchim Leubner set_dek_table_entry():
764e1bc9a0SAchim Leubner
774e1bc9a0SAchim Leubner Purpose:
784e1bc9a0SAchim Leubner Parameters:
794e1bc9a0SAchim Leubner Return:
804e1bc9a0SAchim Leubner Note:
814e1bc9a0SAchim Leubner ******************************************************************************/
824e1bc9a0SAchim Leubner static inline int
set_dek_table_entry(struct device * dev,const char * buf,size_t len,dek_table_e table)834e1bc9a0SAchim Leubner set_dek_table_entry(struct device *dev, const char *buf, size_t len, dek_table_e table)
844e1bc9a0SAchim Leubner {
854e1bc9a0SAchim Leubner int index;
864e1bc9a0SAchim Leubner struct Scsi_Host *shost = class_to_shost(dev);
874e1bc9a0SAchim Leubner struct agtiapi_softc *pCard = (struct agtiapi_softc *) shost->hostdata;
884e1bc9a0SAchim Leubner
894e1bc9a0SAchim Leubner /* Check permissions */
904e1bc9a0SAchim Leubner if(!capable(CAP_SYS_ADMIN))
914e1bc9a0SAchim Leubner return -EACCES;
924e1bc9a0SAchim Leubner
934e1bc9a0SAchim Leubner if(!pCard->encrypt)
944e1bc9a0SAchim Leubner return -EINVAL;
954e1bc9a0SAchim Leubner
964e1bc9a0SAchim Leubner if(table != DEK_TABLE_0 && table != DEK_TABLE_1)
974e1bc9a0SAchim Leubner return -EINVAL;
984e1bc9a0SAchim Leubner
994e1bc9a0SAchim Leubner sscanf(buf, "%d", &index);
1004e1bc9a0SAchim Leubner if(index >= 0 && index < DEK_MAX_TABLE_ITEMS) {
1014e1bc9a0SAchim Leubner pCard->dek_index[table] = index;
1024e1bc9a0SAchim Leubner return strlen(buf);
1034e1bc9a0SAchim Leubner }
1044e1bc9a0SAchim Leubner return -EINVAL;
1054e1bc9a0SAchim Leubner }
1064e1bc9a0SAchim Leubner
1074e1bc9a0SAchim Leubner /******************************************************************************
1084e1bc9a0SAchim Leubner set_dek_table_entry0():
1094e1bc9a0SAchim Leubner
1104e1bc9a0SAchim Leubner Purpose:
1114e1bc9a0SAchim Leubner Parameters:
1124e1bc9a0SAchim Leubner Return:
1134e1bc9a0SAchim Leubner Note:
1144e1bc9a0SAchim Leubner ******************************************************************************/
1154e1bc9a0SAchim Leubner ssize_t
set_dek_table_entry0(struct device * dev,struct device_attribute * attr,const char * buf,size_t len)1164e1bc9a0SAchim Leubner set_dek_table_entry0(struct device *dev, struct device_attribute *attr, const char *buf, size_t len)
1174e1bc9a0SAchim Leubner {
1184e1bc9a0SAchim Leubner return set_dek_table_entry(dev, buf, len, DEK_TABLE_0);
1194e1bc9a0SAchim Leubner }
1204e1bc9a0SAchim Leubner
1214e1bc9a0SAchim Leubner /******************************************************************************
1224e1bc9a0SAchim Leubner set_dek_table_entry1():
1234e1bc9a0SAchim Leubner
1244e1bc9a0SAchim Leubner Purpose:
1254e1bc9a0SAchim Leubner Parameters:
1264e1bc9a0SAchim Leubner Return:
1274e1bc9a0SAchim Leubner Note:
1284e1bc9a0SAchim Leubner ******************************************************************************/
1294e1bc9a0SAchim Leubner ssize_t
set_dek_table_entry1(struct device * dev,struct device_attribute * attr,const char * buf,size_t len)1304e1bc9a0SAchim Leubner set_dek_table_entry1(struct device *dev, struct device_attribute *attr, const char *buf, size_t len)
1314e1bc9a0SAchim Leubner {
1324e1bc9a0SAchim Leubner return set_dek_table_entry(dev, buf, len, DEK_TABLE_1);
1334e1bc9a0SAchim Leubner }
1344e1bc9a0SAchim Leubner
1354e1bc9a0SAchim Leubner
1364e1bc9a0SAchim Leubner /******************************************************************************
1374e1bc9a0SAchim Leubner show_dek_table_entry():
1384e1bc9a0SAchim Leubner
1394e1bc9a0SAchim Leubner Purpose:
1404e1bc9a0SAchim Leubner Parameters:
1414e1bc9a0SAchim Leubner Return:
1424e1bc9a0SAchim Leubner Note:
1434e1bc9a0SAchim Leubner ******************************************************************************/
1444e1bc9a0SAchim Leubner static inline int
show_dek_table_entry(struct device * dev,char * buf,unsigned int table)1454e1bc9a0SAchim Leubner show_dek_table_entry(struct device *dev, char *buf, unsigned int table)
1464e1bc9a0SAchim Leubner {
1474e1bc9a0SAchim Leubner int i = 0, j;
1484e1bc9a0SAchim Leubner unsigned char *p;
1494e1bc9a0SAchim Leubner struct Scsi_Host *sh = class_to_shost(dev);
1504e1bc9a0SAchim Leubner ag_card_t *pCard = (ag_card_t *) sh->hostdata;
1514e1bc9a0SAchim Leubner ag_card_info_t *pCardInfo = pCard->pCardInfo;
1524e1bc9a0SAchim Leubner ag_resource_info_t *pRscInfo = &pCardInfo->tiRscInfo;
1534e1bc9a0SAchim Leubner tiEncryptDekBlob_t *pDekTable = NULL;
1544e1bc9a0SAchim Leubner
1554e1bc9a0SAchim Leubner if(!pCard->encrypt)
1564e1bc9a0SAchim Leubner return -EINVAL;
1574e1bc9a0SAchim Leubner
1584e1bc9a0SAchim Leubner if(table == DEK_TABLE_0)
1594e1bc9a0SAchim Leubner pDekTable = pRscInfo->tiLoLevelResource.loLevelMem.mem[DEK_MEM_INDEX_1].virtPtr;
1604e1bc9a0SAchim Leubner else if(table == DEK_TABLE_1)
1614e1bc9a0SAchim Leubner pDekTable = pRscInfo->tiLoLevelResource.loLevelMem.mem[DEK_MEM_INDEX_2].virtPtr;
1624e1bc9a0SAchim Leubner if(pDekTable == NULL)
1634e1bc9a0SAchim Leubner return -EINVAL;
1644e1bc9a0SAchim Leubner
1654e1bc9a0SAchim Leubner if(pCard->dek_index[table] >= 0 || pCard->dek_index[table] < DEK_MAX_TABLE_ITEMS) {
1664e1bc9a0SAchim Leubner i += careful_write(buf, i, PAGE_SIZE, "%4d: ", pCard->dek_index[table]);
1674e1bc9a0SAchim Leubner p = (unsigned char *) &pDekTable[pCard->dek_index[table]];
1684e1bc9a0SAchim Leubner for(j = 0; j < sizeof(tiEncryptDekBlob_t); j++) {
1694e1bc9a0SAchim Leubner i += careful_write(buf, i, PAGE_SIZE, "%02x", p[j]);
1704e1bc9a0SAchim Leubner }
1714e1bc9a0SAchim Leubner i += careful_write(buf, i, PAGE_SIZE, "\n");
1724e1bc9a0SAchim Leubner } else {
1734e1bc9a0SAchim Leubner i += careful_write(buf, i, PAGE_SIZE, "Bad DEK index %d; range: 0 - %d\n", pCard->dek_index[table], DEK_MAX_TABLE_ITEMS);
1744e1bc9a0SAchim Leubner }
1754e1bc9a0SAchim Leubner
1764e1bc9a0SAchim Leubner /* BUG if we return more than a single page of data */
1774e1bc9a0SAchim Leubner //BUG_ON(i > PAGE_SIZE);
1784e1bc9a0SAchim Leubner if (i > PAGE_SIZE)
1794e1bc9a0SAchim Leubner i = PAGE_SIZE;
1804e1bc9a0SAchim Leubner
1814e1bc9a0SAchim Leubner return i;
1824e1bc9a0SAchim Leubner }
1834e1bc9a0SAchim Leubner
1844e1bc9a0SAchim Leubner /******************************************************************************
1854e1bc9a0SAchim Leubner show_dek_table_entry0():
1864e1bc9a0SAchim Leubner
1874e1bc9a0SAchim Leubner Purpose:
1884e1bc9a0SAchim Leubner Parameters:
1894e1bc9a0SAchim Leubner Return:
1904e1bc9a0SAchim Leubner Note:
1914e1bc9a0SAchim Leubner ******************************************************************************/
1924e1bc9a0SAchim Leubner ssize_t
show_dek_table_entry0(struct device * dev,struct device_attribute * attr,char * buf)1934e1bc9a0SAchim Leubner show_dek_table_entry0(struct device *dev, struct device_attribute *attr, char *buf)
1944e1bc9a0SAchim Leubner {
1954e1bc9a0SAchim Leubner return show_dek_table_entry(dev, buf, DEK_TABLE_0);
1964e1bc9a0SAchim Leubner }
1974e1bc9a0SAchim Leubner
1984e1bc9a0SAchim Leubner /******************************************************************************
1994e1bc9a0SAchim Leubner show_dek_table_entry1():
2004e1bc9a0SAchim Leubner
2014e1bc9a0SAchim Leubner Purpose:
2024e1bc9a0SAchim Leubner Parameters:
2034e1bc9a0SAchim Leubner Return:
2044e1bc9a0SAchim Leubner Note:
2054e1bc9a0SAchim Leubner ******************************************************************************/
2064e1bc9a0SAchim Leubner ssize_t
show_dek_table_entry1(struct device * dev,struct device_attribute * attr,char * buf)2074e1bc9a0SAchim Leubner show_dek_table_entry1(struct device *dev, struct device_attribute *attr, char *buf)
2084e1bc9a0SAchim Leubner {
2094e1bc9a0SAchim Leubner return show_dek_table_entry(dev, buf, DEK_TABLE_1);
2104e1bc9a0SAchim Leubner }
2114e1bc9a0SAchim Leubner
2124e1bc9a0SAchim Leubner /******************************************************************************
2134e1bc9a0SAchim Leubner show_kek_table():
2144e1bc9a0SAchim Leubner
2154e1bc9a0SAchim Leubner Purpose:
2164e1bc9a0SAchim Leubner Parameters:
2174e1bc9a0SAchim Leubner Return:
2184e1bc9a0SAchim Leubner Note:
2194e1bc9a0SAchim Leubner ******************************************************************************/
2204e1bc9a0SAchim Leubner ssize_t
show_kek_table(struct device * dev,struct device_attribute * attr,char * buf)2214e1bc9a0SAchim Leubner show_kek_table(struct device *dev, struct device_attribute *attr, char *buf)
2224e1bc9a0SAchim Leubner {
2234e1bc9a0SAchim Leubner int i = 0, j, kek_index;
2244e1bc9a0SAchim Leubner unsigned char *p;
2254e1bc9a0SAchim Leubner struct Scsi_Host *sh = class_to_shost(dev);
2264e1bc9a0SAchim Leubner ag_card_t *pCard = (ag_card_t *) sh->hostdata;
2274e1bc9a0SAchim Leubner
2284e1bc9a0SAchim Leubner if(!pCard->encrypt)
2294e1bc9a0SAchim Leubner return -EINVAL;
2304e1bc9a0SAchim Leubner
2314e1bc9a0SAchim Leubner for(kek_index = 0; kek_index < KEK_TABLE_MAX_ENTRY; kek_index++) {
2324e1bc9a0SAchim Leubner i += careful_write(buf, i, PAGE_SIZE, " %4d: %08x ", kek_index, pCard->kek_table[kek_index].wrapperIndex);
2334e1bc9a0SAchim Leubner p = (unsigned char *) &pCard->kek_table[kek_index].kekBlob;
2344e1bc9a0SAchim Leubner for(j = 0; j < sizeof(tiEncryptKekBlob_t); j++) {
2354e1bc9a0SAchim Leubner i += careful_write(buf, i, PAGE_SIZE, "%02x", p[j]);
2364e1bc9a0SAchim Leubner }
2374e1bc9a0SAchim Leubner i += careful_write(buf, i, PAGE_SIZE, "\n");
2384e1bc9a0SAchim Leubner }
2394e1bc9a0SAchim Leubner i += careful_write(buf, i, PAGE_SIZE, "\n");
2404e1bc9a0SAchim Leubner
2414e1bc9a0SAchim Leubner /* BUG if we return more than a single page of data */
2424e1bc9a0SAchim Leubner //BUG_ON(i > PAGE_SIZE);
2434e1bc9a0SAchim Leubner if (i > PAGE_SIZE)
2444e1bc9a0SAchim Leubner i = PAGE_SIZE;
2454e1bc9a0SAchim Leubner
2464e1bc9a0SAchim Leubner return i;
2474e1bc9a0SAchim Leubner }
2484e1bc9a0SAchim Leubner
2494e1bc9a0SAchim Leubner /******************************************************************************
2504e1bc9a0SAchim Leubner show_dek_kek_map():
2514e1bc9a0SAchim Leubner
2524e1bc9a0SAchim Leubner Purpose:
2534e1bc9a0SAchim Leubner Parameters:
2544e1bc9a0SAchim Leubner Return:
2554e1bc9a0SAchim Leubner Note:
2564e1bc9a0SAchim Leubner ******************************************************************************/
2574e1bc9a0SAchim Leubner static inline int
show_dek_kek_map(struct device * dev,char * buf,unsigned int table)2584e1bc9a0SAchim Leubner show_dek_kek_map(struct device *dev, char *buf, unsigned int table)
2594e1bc9a0SAchim Leubner {
2604e1bc9a0SAchim Leubner int i = 0, dek_index;
2614e1bc9a0SAchim Leubner struct Scsi_Host *sh = class_to_shost(dev);
2624e1bc9a0SAchim Leubner ag_card_t *pCard = (ag_card_t *) sh->hostdata;
2634e1bc9a0SAchim Leubner
2644e1bc9a0SAchim Leubner if(!pCard->encrypt)
2654e1bc9a0SAchim Leubner return -EINVAL;
2664e1bc9a0SAchim Leubner
2674e1bc9a0SAchim Leubner if(table != DEK_TABLE_0 && table != DEK_TABLE_1)
2684e1bc9a0SAchim Leubner return -EINVAL;
2694e1bc9a0SAchim Leubner
2704e1bc9a0SAchim Leubner i += careful_write(buf, i, PAGE_SIZE, "Table %d\n", table);
2714e1bc9a0SAchim Leubner i += careful_write(buf, i, PAGE_SIZE, "=======\n");
2724e1bc9a0SAchim Leubner for(dek_index = 0; dek_index < DEK_MAX_TABLE_ITEMS; dek_index++) {
2734e1bc9a0SAchim Leubner i += careful_write(buf, i, PAGE_SIZE, " %4d: %08x\n", dek_index, pCard->dek_kek_map[table][dek_index].kekIndex);
2744e1bc9a0SAchim Leubner }
2754e1bc9a0SAchim Leubner i += sprintf(buf + i, "\n");
2764e1bc9a0SAchim Leubner
2774e1bc9a0SAchim Leubner /* BUG if we return more than a single page of data */
2784e1bc9a0SAchim Leubner //BUG_ON(i > PAGE_SIZE);
2794e1bc9a0SAchim Leubner if (i > PAGE_SIZE)
2804e1bc9a0SAchim Leubner i = PAGE_SIZE;
2814e1bc9a0SAchim Leubner
2824e1bc9a0SAchim Leubner return i;
2834e1bc9a0SAchim Leubner }
2844e1bc9a0SAchim Leubner
2854e1bc9a0SAchim Leubner /******************************************************************************
2864e1bc9a0SAchim Leubner show_dek_kek_map0():
2874e1bc9a0SAchim Leubner
2884e1bc9a0SAchim Leubner Purpose:
2894e1bc9a0SAchim Leubner Parameters:
2904e1bc9a0SAchim Leubner Return:
2914e1bc9a0SAchim Leubner Note:
2924e1bc9a0SAchim Leubner ******************************************************************************/
2934e1bc9a0SAchim Leubner ssize_t
2944e1bc9a0SAchim Leubner
show_dek_kek_map0(struct device * dev,struct device_attribute * attr,char * buf)2954e1bc9a0SAchim Leubner show_dek_kek_map0(struct device *dev, struct device_attribute *attr, char *buf)
2964e1bc9a0SAchim Leubner {
2974e1bc9a0SAchim Leubner return show_dek_kek_map(dev, buf, 0);
2984e1bc9a0SAchim Leubner }
2994e1bc9a0SAchim Leubner
3004e1bc9a0SAchim Leubner /******************************************************************************
3014e1bc9a0SAchim Leubner show_dek_kek_map1():
3024e1bc9a0SAchim Leubner
3034e1bc9a0SAchim Leubner Purpose:
3044e1bc9a0SAchim Leubner Parameters:
3054e1bc9a0SAchim Leubner Return:
3064e1bc9a0SAchim Leubner Note:
3074e1bc9a0SAchim Leubner ******************************************************************************/
3084e1bc9a0SAchim Leubner ssize_t
show_dek_kek_map1(struct device * dev,struct device_attribute * attr,char * buf)3094e1bc9a0SAchim Leubner show_dek_kek_map1(struct device *dev, struct device_attribute *attr, char *buf)
3104e1bc9a0SAchim Leubner {
3114e1bc9a0SAchim Leubner return show_dek_kek_map(dev, buf, 1);
3124e1bc9a0SAchim Leubner }
3134e1bc9a0SAchim Leubner
3144e1bc9a0SAchim Leubner /******************************************************************************
3154e1bc9a0SAchim Leubner show_target_dek_map():
3164e1bc9a0SAchim Leubner
3174e1bc9a0SAchim Leubner Purpose:
3184e1bc9a0SAchim Leubner Parameters:
3194e1bc9a0SAchim Leubner Return:
3204e1bc9a0SAchim Leubner Note:
3214e1bc9a0SAchim Leubner ******************************************************************************/
3224e1bc9a0SAchim Leubner ssize_t
show_target_dek_map(struct device * dev,struct device_attribute * attr,char * buf)3234e1bc9a0SAchim Leubner show_target_dek_map(struct device *dev, struct device_attribute *attr, char *buf)
3244e1bc9a0SAchim Leubner {
3254e1bc9a0SAchim Leubner int i = 0;
3264e1bc9a0SAchim Leubner unsigned int chan, device, lun = 0;
3274e1bc9a0SAchim Leubner ag_encrypt_map_t *p;
3284e1bc9a0SAchim Leubner struct list_head *lh;
3294e1bc9a0SAchim Leubner struct Scsi_Host *sh = class_to_shost(dev);
3304e1bc9a0SAchim Leubner ag_card_t *pCard = (ag_card_t *) sh->hostdata;
3314e1bc9a0SAchim Leubner
3324e1bc9a0SAchim Leubner if(!pCard->encrypt)
3334e1bc9a0SAchim Leubner return -EINVAL;
3344e1bc9a0SAchim Leubner
3354e1bc9a0SAchim Leubner for(chan = 0; chan <= AGTIAPI_MAX_CHANNEL_NUM; chan++) {
3364e1bc9a0SAchim Leubner for(device = 0; device < pCard->devDiscover; device++) {
3374e1bc9a0SAchim Leubner #ifdef REPORT_ALL_LUNS
3384e1bc9a0SAchim Leubner for(lun = 0; lun < AGTIAPI_MAX_LUN; lun++) {
3394e1bc9a0SAchim Leubner #endif
3404e1bc9a0SAchim Leubner lh = MAP_TABLE_ENTRY(pCard, chan, device, lun);
3414e1bc9a0SAchim Leubner if(lh) {
3424e1bc9a0SAchim Leubner list_for_each_entry(p, lh, list) {
3434e1bc9a0SAchim Leubner if(p->dekIndex != DEK_INDEX_INVALID)
3444e1bc9a0SAchim Leubner i += careful_write(buf, i, PAGE_SIZE, " %u:%u:%u: %x %8x %8x %16lx %16lx %08x:%08x %1x\n", chan, device, lun, p->dekTable, p->dekIndex, p->kekIndex, p->lbaMin, p->lbaMax, p->keyTag[1], p->keyTag[0], p->keyTagCheck);
3454e1bc9a0SAchim Leubner }
3464e1bc9a0SAchim Leubner }
3474e1bc9a0SAchim Leubner #ifdef REPORT_ALL_LUNS
3484e1bc9a0SAchim Leubner }
3494e1bc9a0SAchim Leubner #endif
3504e1bc9a0SAchim Leubner }
3514e1bc9a0SAchim Leubner }
3524e1bc9a0SAchim Leubner
3534e1bc9a0SAchim Leubner if (i > PAGE_SIZE)
3544e1bc9a0SAchim Leubner i = PAGE_SIZE;
3554e1bc9a0SAchim Leubner
3564e1bc9a0SAchim Leubner return i;
3574e1bc9a0SAchim Leubner }
3584e1bc9a0SAchim Leubner
3594e1bc9a0SAchim Leubner
3604e1bc9a0SAchim Leubner /******************************************************************************
3614e1bc9a0SAchim Leubner agtiapi_AddDek():
3624e1bc9a0SAchim Leubner
3634e1bc9a0SAchim Leubner Purpose:
3644e1bc9a0SAchim Leubner Parameters:
3654e1bc9a0SAchim Leubner Return:
3664e1bc9a0SAchim Leubner Note:
3674e1bc9a0SAchim Leubner ******************************************************************************/
3684e1bc9a0SAchim Leubner static int
agtiapi_AddDek(ag_card_t * pCard,bit32 dek_table,bit32 dek_index,bit32 blob_format,bit32 entry_sz,tiEncryptDekBlob_t * dek_blob,U32_64 * addr)3694e1bc9a0SAchim Leubner agtiapi_AddDek(ag_card_t *pCard, bit32 dek_table, bit32 dek_index, bit32 blob_format, bit32 entry_sz, tiEncryptDekBlob_t *dek_blob, U32_64 *addr)
3704e1bc9a0SAchim Leubner {
3714e1bc9a0SAchim Leubner ag_resource_info_t *pRscInfo = &pCard->pCardInfo->tiRscInfo;
3724e1bc9a0SAchim Leubner tiEncryptDekBlob_t *pDekTable;
3734e1bc9a0SAchim Leubner char *p;
3744e1bc9a0SAchim Leubner
3754e1bc9a0SAchim Leubner if (dek_index >= DEK_MAX_TABLE_ITEMS) {
3764e1bc9a0SAchim Leubner printf("%s: Bad dek index 0x%x (MAX: 0x%x).\n", __FUNCTION__, dek_index, DEK_MAX_TABLE_ITEMS);
3774e1bc9a0SAchim Leubner return -E_DEK_INDEX;
3784e1bc9a0SAchim Leubner }
3794e1bc9a0SAchim Leubner
3804e1bc9a0SAchim Leubner switch(dek_table) {
3814e1bc9a0SAchim Leubner case DEK_TABLE_0:
3824e1bc9a0SAchim Leubner pDekTable = pRscInfo->tiLoLevelResource.loLevelMem.mem[DEK_MEM_INDEX_1].virtPtr;
3834e1bc9a0SAchim Leubner break;
3844e1bc9a0SAchim Leubner case DEK_TABLE_1:
3854e1bc9a0SAchim Leubner pDekTable = pRscInfo->tiLoLevelResource.loLevelMem.mem[DEK_MEM_INDEX_2].virtPtr;
3864e1bc9a0SAchim Leubner break;
3874e1bc9a0SAchim Leubner default:
3884e1bc9a0SAchim Leubner printf("%s: Unknown dek table %d\n", __FUNCTION__, dek_table);
3894e1bc9a0SAchim Leubner return -E_DEK_TABLE;
3904e1bc9a0SAchim Leubner }
3914e1bc9a0SAchim Leubner
3924e1bc9a0SAchim Leubner #ifdef __VMKLNX__
3934e1bc9a0SAchim Leubner *addr = (U32_64) __pa(&pDekTable[0]);
3944e1bc9a0SAchim Leubner #else
3954e1bc9a0SAchim Leubner *addr = (U32_64) virt_to_phys(&pDekTable[0]);
3964e1bc9a0SAchim Leubner #endif
3974e1bc9a0SAchim Leubner
3984e1bc9a0SAchim Leubner p = (char *) &pDekTable[0] + (dek_index * pCard->dek_size);
3994e1bc9a0SAchim Leubner
4004e1bc9a0SAchim Leubner printf("%s: Base: %p, Index: %08x, Virt: %p Size: %d\n", __FUNCTION__, pDekTable, dek_index, &pDekTable[dek_index], pCard->dek_size);
4014e1bc9a0SAchim Leubner memcpy(p, dek_blob, pCard->dek_size);
4024e1bc9a0SAchim Leubner wmb();
4034e1bc9a0SAchim Leubner
4044e1bc9a0SAchim Leubner /* Flush entry */
4054e1bc9a0SAchim Leubner ostiCacheFlush(&pCard->tiRoot, NULL, p, pCard->dek_size);
4064e1bc9a0SAchim Leubner
4074e1bc9a0SAchim Leubner return 0;
4084e1bc9a0SAchim Leubner }
4094e1bc9a0SAchim Leubner
4104e1bc9a0SAchim Leubner /******************************************************************************
4114e1bc9a0SAchim Leubner agtiapi_MapDekKek():
4124e1bc9a0SAchim Leubner
4134e1bc9a0SAchim Leubner Purpose:
4144e1bc9a0SAchim Leubner Parameters:
4154e1bc9a0SAchim Leubner Return:
4164e1bc9a0SAchim Leubner Note:
4174e1bc9a0SAchim Leubner ******************************************************************************/
4184e1bc9a0SAchim Leubner static int
agtiapi_MapDekKek(ag_card_t * pCard,bit32 dek_table,bit32 dek_index,bit32 kek_index)4194e1bc9a0SAchim Leubner agtiapi_MapDekKek(ag_card_t *pCard, bit32 dek_table, bit32 dek_index, bit32 kek_index)
4204e1bc9a0SAchim Leubner {
4214e1bc9a0SAchim Leubner if (dek_index >= DEK_MAX_TABLE_ITEMS) {
4224e1bc9a0SAchim Leubner printf("%s: Bad dek index 0x%x (MAX: 0x%x).\n", __FUNCTION__, dek_index, DEK_MAX_TABLE_ITEMS);
4234e1bc9a0SAchim Leubner return -E_DEK_INDEX;
4244e1bc9a0SAchim Leubner }
4254e1bc9a0SAchim Leubner
4264e1bc9a0SAchim Leubner if (dek_table >= DEK_MAX_TABLES) {
4274e1bc9a0SAchim Leubner printf("%s: Bad dek table.\n", __FUNCTION__);
4284e1bc9a0SAchim Leubner return -E_DEK_TABLE;
4294e1bc9a0SAchim Leubner }
4304e1bc9a0SAchim Leubner
4314e1bc9a0SAchim Leubner if (kek_index >= KEK_TABLE_MAX_ENTRY) {
4324e1bc9a0SAchim Leubner printf("%s: Bad kek index.\n", __FUNCTION__);
4334e1bc9a0SAchim Leubner return -E_KEK_INDEX;
4344e1bc9a0SAchim Leubner }
4354e1bc9a0SAchim Leubner
4364e1bc9a0SAchim Leubner pCard->dek_kek_map[dek_table][dek_index].kekIndex = kek_index;
4374e1bc9a0SAchim Leubner return 0;
4384e1bc9a0SAchim Leubner }
4394e1bc9a0SAchim Leubner
4404e1bc9a0SAchim Leubner /******************************************************************************
4414e1bc9a0SAchim Leubner agtiapi_AddKek():
4424e1bc9a0SAchim Leubner
4434e1bc9a0SAchim Leubner Purpose:
4444e1bc9a0SAchim Leubner Parameters:
4454e1bc9a0SAchim Leubner Return:
4464e1bc9a0SAchim Leubner Note:
4474e1bc9a0SAchim Leubner ******************************************************************************/
4484e1bc9a0SAchim Leubner static int
agtiapi_AddKek(ag_card_t * pCard,bit32 kek_index,bit32 wrapper_kek_index,tiEncryptKekBlob_t * kek_blob)4494e1bc9a0SAchim Leubner agtiapi_AddKek(ag_card_t *pCard, bit32 kek_index, bit32 wrapper_kek_index, tiEncryptKekBlob_t *kek_blob)
4504e1bc9a0SAchim Leubner {
4514e1bc9a0SAchim Leubner if (kek_index >= KEK_TABLE_MAX_ENTRY) {
4524e1bc9a0SAchim Leubner printf("%s: Bad kek index.\n", __FUNCTION__);
4534e1bc9a0SAchim Leubner return -E_KEK_INDEX;
4544e1bc9a0SAchim Leubner }
4554e1bc9a0SAchim Leubner if (wrapper_kek_index >= KEK_TABLE_MAX_ENTRY) {
4564e1bc9a0SAchim Leubner printf("%s: Bad kek wrapper index.\n", __FUNCTION__);
4574e1bc9a0SAchim Leubner return -E_KEK_INDEX;
4584e1bc9a0SAchim Leubner }
4594e1bc9a0SAchim Leubner pCard->kek_table[kek_index].wrapperIndex = wrapper_kek_index;
4604e1bc9a0SAchim Leubner memcpy(&pCard->kek_table[kek_index].kekBlob, kek_blob, sizeof(tiEncryptKekBlob_t));
4614e1bc9a0SAchim Leubner return 0;
4624e1bc9a0SAchim Leubner }
4634e1bc9a0SAchim Leubner
4644e1bc9a0SAchim Leubner /******************************************************************************
4654e1bc9a0SAchim Leubner agtiapi_MapDek():
4664e1bc9a0SAchim Leubner
4674e1bc9a0SAchim Leubner Purpose:
4684e1bc9a0SAchim Leubner Parameters:
4694e1bc9a0SAchim Leubner Return:
4704e1bc9a0SAchim Leubner Note:
4714e1bc9a0SAchim Leubner ******************************************************************************/
4724e1bc9a0SAchim Leubner static int
agtiapi_MapDek(ag_card_t * pCard,EncryptDeviceDekMap_t * dek_map)4734e1bc9a0SAchim Leubner agtiapi_MapDek(ag_card_t *pCard, EncryptDeviceDekMap_t *dek_map)
4744e1bc9a0SAchim Leubner {
4754e1bc9a0SAchim Leubner int found = 0;
4764e1bc9a0SAchim Leubner bit32 chan, device, lun;
4774e1bc9a0SAchim Leubner bit32 dek_table, dek_index, kek_index;
4784e1bc9a0SAchim Leubner unsigned long long lba_min, lba_max;
4794e1bc9a0SAchim Leubner ag_encrypt_map_t *p, *n;
4804e1bc9a0SAchim Leubner struct list_head *lh;
4814e1bc9a0SAchim Leubner
4824e1bc9a0SAchim Leubner chan = dek_map->channel;
4834e1bc9a0SAchim Leubner device = dek_map->device;
4844e1bc9a0SAchim Leubner lun = dek_map->lun;
4854e1bc9a0SAchim Leubner
4864e1bc9a0SAchim Leubner lba_min = dek_map->dekMapEntry[0].startLBA;
4874e1bc9a0SAchim Leubner lba_max = dek_map->dekMapEntry[0].endLBA;
4884e1bc9a0SAchim Leubner
4894e1bc9a0SAchim Leubner dek_table = dek_map->dekMapEntry[0].dek.dekTable;
4904e1bc9a0SAchim Leubner dek_index = dek_map->dekMapEntry[0].dek.dekIndex;
4914e1bc9a0SAchim Leubner
4924e1bc9a0SAchim Leubner /* Sanity check channel, device, lun */
4934e1bc9a0SAchim Leubner if (chan > AGTIAPI_MAX_CHANNEL_NUM) {
4944e1bc9a0SAchim Leubner printf("%s: Bad channel %d.\n", __FUNCTION__, chan);
4954e1bc9a0SAchim Leubner return -E_CHANNEL_INDEX;
4964e1bc9a0SAchim Leubner }
4974e1bc9a0SAchim Leubner if (device >= pCard->devDiscover) {
4984e1bc9a0SAchim Leubner printf("%s: Bad device %d.\n", __FUNCTION__, device);
4994e1bc9a0SAchim Leubner return -E_DEVICE_INDEX;
5004e1bc9a0SAchim Leubner }
5014e1bc9a0SAchim Leubner if (lun >= AGTIAPI_MAX_LUN) {
5024e1bc9a0SAchim Leubner printf("%s: Bad lun %d.\n", __FUNCTION__, lun);
5034e1bc9a0SAchim Leubner return -E_LUN_INDEX;
5044e1bc9a0SAchim Leubner }
5054e1bc9a0SAchim Leubner
5064e1bc9a0SAchim Leubner /* Sanity check dek index */
5074e1bc9a0SAchim Leubner if (dek_index >= DEK_MAX_TABLE_ITEMS) {
5084e1bc9a0SAchim Leubner printf("%s: Bad dek index 0x%x (MAX: 0x%x).\n", __FUNCTION__, dek_index, DEK_MAX_TABLE_ITEMS);
5094e1bc9a0SAchim Leubner return -E_DEK_INDEX;
5104e1bc9a0SAchim Leubner }
5114e1bc9a0SAchim Leubner
5124e1bc9a0SAchim Leubner /* Sanity check dek table */
5134e1bc9a0SAchim Leubner if (dek_table >= DEK_MAX_TABLES) {
5144e1bc9a0SAchim Leubner printf("%s: Bad dek table %d.\n", __FUNCTION__, dek_table);
5154e1bc9a0SAchim Leubner return -E_DEK_TABLE;
5164e1bc9a0SAchim Leubner }
5174e1bc9a0SAchim Leubner
5184e1bc9a0SAchim Leubner /* Check that lba min and lba max are sane */
5194e1bc9a0SAchim Leubner if (lba_min >= lba_max) {
5204e1bc9a0SAchim Leubner printf("%s: Bad lba min and lba max: %llx %llx.\n", __FUNCTION__, lba_min, lba_max);
5214e1bc9a0SAchim Leubner return -E_LBA_RANGE;
5224e1bc9a0SAchim Leubner }
5234e1bc9a0SAchim Leubner
5244e1bc9a0SAchim Leubner /* dek_table and dek_index are valid, look up kek */
5254e1bc9a0SAchim Leubner kek_index = pCard->dek_kek_map[dek_table][dek_index].kekIndex;
5264e1bc9a0SAchim Leubner
5274e1bc9a0SAchim Leubner lh = MAP_TABLE_ENTRY(pCard, chan, device, lun);
5284e1bc9a0SAchim Leubner
5294e1bc9a0SAchim Leubner if (dek_map->dekMapEntry[0].flags & ENCRYPT_DEK_MAP_ENTRY_CLEAR) {
5304e1bc9a0SAchim Leubner /* Delete the entry */
5314e1bc9a0SAchim Leubner found = 0;
5324e1bc9a0SAchim Leubner list_for_each_entry_safe(p, n, lh, list) {
5334e1bc9a0SAchim Leubner if (p->lbaMin == lba_min &&
5344e1bc9a0SAchim Leubner p->lbaMax == lba_max &&
5354e1bc9a0SAchim Leubner p->dekTable == dek_table &&
5364e1bc9a0SAchim Leubner p->dekIndex == dek_index &&
5374e1bc9a0SAchim Leubner p->kekIndex == kek_index) {
5384e1bc9a0SAchim Leubner /* Entry found, unlink and reclaim it */
5394e1bc9a0SAchim Leubner found = 1;
5404e1bc9a0SAchim Leubner list_del(&p->list);
5414e1bc9a0SAchim Leubner mempool_free(p, pCard->map_mempool);
5424e1bc9a0SAchim Leubner }
5434e1bc9a0SAchim Leubner }
5444e1bc9a0SAchim Leubner if (!found) {
5454e1bc9a0SAchim Leubner printf("%s: Entry %x %x %x %llx %llx not found.\n", __FUNCTION__, dek_table, dek_index, kek_index, lba_min, lba_max);
5464e1bc9a0SAchim Leubner return -E_NOT_FOUND;
5474e1bc9a0SAchim Leubner }
5484e1bc9a0SAchim Leubner } else if (dek_map->dekMapEntry[0].flags & ENCRYPT_DEK_MAP_ENTRY_VALID) {
5494e1bc9a0SAchim Leubner /* Add the entry */
5504e1bc9a0SAchim Leubner
5514e1bc9a0SAchim Leubner p = (ag_encrypt_map_t *)uma_zalloc(pCard->map_cache, M_WAITOK); //Encryption
5524e1bc9a0SAchim Leubner if (!p) {
5534e1bc9a0SAchim Leubner printf("%s: Unable to allocate from memory pool.\n", __FUNCTION__);
5544e1bc9a0SAchim Leubner return -E_MEMPOOL_ALLOC;
5554e1bc9a0SAchim Leubner }
5564e1bc9a0SAchim Leubner
5574e1bc9a0SAchim Leubner /* Populate it */
5584e1bc9a0SAchim Leubner p->lbaMin = lba_min;
5594e1bc9a0SAchim Leubner p->lbaMax = lba_max;
5604e1bc9a0SAchim Leubner p->dekTable = dek_table;
5614e1bc9a0SAchim Leubner p->dekIndex = dek_index;
5624e1bc9a0SAchim Leubner p->kekIndex = kek_index;
5634e1bc9a0SAchim Leubner p->keyTagCheck = dek_map->keytag_check;
5644e1bc9a0SAchim Leubner memcpy(&p->keyTag, &dek_map->keytag, sizeof(p->keyTag));
5654e1bc9a0SAchim Leubner
5664e1bc9a0SAchim Leubner /* Test to see if this new mapping overlaps an existing mapping */
5674e1bc9a0SAchim Leubner list_for_each_entry(n, lh, list) {
5684e1bc9a0SAchim Leubner /*
5694e1bc9a0SAchim Leubner * Check if the start lba falls in existing range ||
5704e1bc9a0SAchim Leubner * Check if the end lba falls in existing range ||
5714e1bc9a0SAchim Leubner * Check if the start lba of the existing range falls in the new range
5724e1bc9a0SAchim Leubner */
5734e1bc9a0SAchim Leubner if (((p->lbaMin >= n->lbaMin) && (p->lbaMin <= n->lbaMax)) ||
5744e1bc9a0SAchim Leubner ((p->lbaMax >= n->lbaMin) && (p->lbaMax <= n->lbaMax)) ||
5754e1bc9a0SAchim Leubner ((n->lbaMin >= p->lbaMin) && (n->lbaMin <= p->lbaMax))) {
5764e1bc9a0SAchim Leubner printf("%s: WARNING: New entry lba range overlap: %llx - %llx vs %llx - %llx.\n", __FUNCTION__, p->lbaMin, p->lbaMax, n->lbaMin, n->lbaMax);
5774e1bc9a0SAchim Leubner }
5784e1bc9a0SAchim Leubner }
5794e1bc9a0SAchim Leubner
5804e1bc9a0SAchim Leubner /* Link it in to list at the head so it takes precedence */
5814e1bc9a0SAchim Leubner list_add(&p->list, lh);
5824e1bc9a0SAchim Leubner
5834e1bc9a0SAchim Leubner /* TODO: Decide if/how to refcount each dek/kek index used by the mapping */
5844e1bc9a0SAchim Leubner
5854e1bc9a0SAchim Leubner } else {
5864e1bc9a0SAchim Leubner printf("%s: Bad flags %08x\n", __FUNCTION__, dek_map->dekMapEntry[0].flags);
5874e1bc9a0SAchim Leubner return -E_FLAGS;
5884e1bc9a0SAchim Leubner }
5894e1bc9a0SAchim Leubner
5904e1bc9a0SAchim Leubner return 0;
5914e1bc9a0SAchim Leubner }
5924e1bc9a0SAchim Leubner #endif
5934e1bc9a0SAchim Leubner #ifdef HIALEAH_ENCRYPTION
5944e1bc9a0SAchim Leubner /******************************************************************************
5954e1bc9a0SAchim Leubner agtiapi_SetupEncryption():
5964e1bc9a0SAchim Leubner
5974e1bc9a0SAchim Leubner Purpose:
5984e1bc9a0SAchim Leubner Parameters:
5994e1bc9a0SAchim Leubner Return:
6004e1bc9a0SAchim Leubner Note:
6014e1bc9a0SAchim Leubner ******************************************************************************/
6024e1bc9a0SAchim Leubner int
agtiapi_SetupEncryption(struct agtiapi_softc * pCard)6034e1bc9a0SAchim Leubner agtiapi_SetupEncryption(struct agtiapi_softc *pCard)
6044e1bc9a0SAchim Leubner {
6054e1bc9a0SAchim Leubner tiRoot_t *tiRoot = (tiRoot_t *) &pCard->tiRoot;
6064e1bc9a0SAchim Leubner bit32 status = tiSuccess;
6074e1bc9a0SAchim Leubner printf("agtiapi_SetupEncryption: HIALEAH_ENCRYPTION\n");
6084e1bc9a0SAchim Leubner if (pCard->encrypt == agTRUE)
6094e1bc9a0SAchim Leubner {
6104e1bc9a0SAchim Leubner status = tiCOMEncryptGetInfo(tiRoot);
6114e1bc9a0SAchim Leubner printf("agtiapi_SetupEncryption: HIALEAH_ENCRYPTION tiCOMEncryptGetInfo Status 0x%x\n",status);
6124e1bc9a0SAchim Leubner
6134e1bc9a0SAchim Leubner if(status == 1 )
6144e1bc9a0SAchim Leubner {
6154e1bc9a0SAchim Leubner status = tiCOMEncryptHilSet(tiRoot );
6164e1bc9a0SAchim Leubner if (status) {
6174e1bc9a0SAchim Leubner pCard->encrypt = agFALSE;
6184e1bc9a0SAchim Leubner printf("agtiapi_SetupEncryption: HIALEAH_ENCRYPTION not set\n");
6194e1bc9a0SAchim Leubner }
6204e1bc9a0SAchim Leubner }
6214e1bc9a0SAchim Leubner }
6224e1bc9a0SAchim Leubner return 0;
6234e1bc9a0SAchim Leubner }
6244e1bc9a0SAchim Leubner #ifdef ENCRYPT_ENHANCE
6254e1bc9a0SAchim Leubner /******************************************************************************
6264e1bc9a0SAchim Leubner agtiapi_SetupEncryptionPools():
6274e1bc9a0SAchim Leubner
6284e1bc9a0SAchim Leubner Purpose:
6294e1bc9a0SAchim Leubner Parameters:
6304e1bc9a0SAchim Leubner Return:
6314e1bc9a0SAchim Leubner Note:
6324e1bc9a0SAchim Leubner ******************************************************************************/
6334e1bc9a0SAchim Leubner int
agtiapi_SetupEncryptionPools(struct agtiapi_softc * pCard)6344e1bc9a0SAchim Leubner agtiapi_SetupEncryptionPools(struct agtiapi_softc *pCard)
6354e1bc9a0SAchim Leubner {
6364e1bc9a0SAchim Leubner /* Configure encryption memory pool */
6374e1bc9a0SAchim Leubner memset(pCard->map_cache_name, 0, sizeof(pCard->map_cache_name));
6384e1bc9a0SAchim Leubner snprintf(pCard->map_cache_name, sizeof(pCard->map_cache_name) - 1, "map_cache_%d", pCard->cardNo);
6394e1bc9a0SAchim Leubner
6404e1bc9a0SAchim Leubner //zone allocation
6414e1bc9a0SAchim Leubner pCard->map_cache = uma_zcreate(pCard->map_cache_name, sizeof(ag_encrypt_map_t),NULL, NULL, NULL, NULL, 0, 0);
6424e1bc9a0SAchim Leubner if(!pCard->map_cache) {
6434e1bc9a0SAchim Leubner /*
6444e1bc9a0SAchim Leubner * This error may be due to an existing cache in the kernel
6454e1bc9a0SAchim Leubner * from an earlier kmem_cache that wasn't properly freed
6464e1bc9a0SAchim Leubner */
6474e1bc9a0SAchim Leubner printf("Unable to create uma_zcreate cache for encryption map mempool.\n");
6484e1bc9a0SAchim Leubner return -EFAULT;
6494e1bc9a0SAchim Leubner }
6504e1bc9a0SAchim Leubner uma_zone_set_max(pCard->map_cache, ENCRYPTION_MAP_MEMPOOL_SIZE);
6514e1bc9a0SAchim Leubner
6524e1bc9a0SAchim Leubner
6534e1bc9a0SAchim Leubner /* Configure encryption IO error pool */
6544e1bc9a0SAchim Leubner INIT_LIST_HEAD(&pCard->ioerr_queue);
6554e1bc9a0SAchim Leubner /*#if (LINUX_VERSION_CODE < KERNEL_VERSION(2,6,34)) // ####
6564e1bc9a0SAchim Leubner pCard->ioerr_queue_lock = SPIN_LOCK_UNLOCKED;
6574e1bc9a0SAchim Leubner #else */
6584e1bc9a0SAchim Leubner pCard->ioerr_queue_lock = AG_SPIN_UNLOCK(pCard->ioerr_queue_lock);
6594e1bc9a0SAchim Leubner //#endif
6604e1bc9a0SAchim Leubner
6614e1bc9a0SAchim Leubner
6624e1bc9a0SAchim Leubner memset(pCard->ioerr_cache_name, 0, sizeof(pCard->ioerr_cache_name));
6634e1bc9a0SAchim Leubner snprintf(pCard->ioerr_cache_name, sizeof(pCard->ioerr_cache_name) - 1, "ioerr_cache_%d", pCard->cardNo);
6644e1bc9a0SAchim Leubner
6654e1bc9a0SAchim Leubner pCard->ioerr_cache = uma_zcreate(pCard->ioerr_cache_name, sizeof(ag_encrypt_ioerr_t), NULL, NULL, NULL, NULL, 0, 0);
6664e1bc9a0SAchim Leubner if(!pCard->ioerr_cache) {
6674e1bc9a0SAchim Leubner /*
6684e1bc9a0SAchim Leubner * This error may be due to an existing cache in the kernel
6694e1bc9a0SAchim Leubner * from an earlier kmem_cache that wasn't properly freed
6704e1bc9a0SAchim Leubner */
6714e1bc9a0SAchim Leubner printf("Unable to create kmem cache for encryption IO error mempool.\n");
6724e1bc9a0SAchim Leubner return -EFAULT;
6734e1bc9a0SAchim Leubner }
6744e1bc9a0SAchim Leubner uma_zone_set_max(pCard->ioerr_cache, ENCRYPTION_IO_ERR_MEMPOOL_SIZE);
6754e1bc9a0SAchim Leubner
6764e1bc9a0SAchim Leubner /* Set cipher mode to something invalid */
6774e1bc9a0SAchim Leubner pCard->cipher_mode = CIPHER_MODE_INVALID;
6784e1bc9a0SAchim Leubner
6794e1bc9a0SAchim Leubner return 0;
6804e1bc9a0SAchim Leubner }
6814e1bc9a0SAchim Leubner #endif
6824e1bc9a0SAchim Leubner /******************************************************************************
6834e1bc9a0SAchim Leubner agtiapi_CleanupEncryption():
6844e1bc9a0SAchim Leubner
6854e1bc9a0SAchim Leubner Purpose:
6864e1bc9a0SAchim Leubner Parameters:
6874e1bc9a0SAchim Leubner Return:
6884e1bc9a0SAchim Leubner Note:
6894e1bc9a0SAchim Leubner ******************************************************************************/
6904e1bc9a0SAchim Leubner void
agtiapi_CleanupEncryption(struct agtiapi_softc * pCard)6914e1bc9a0SAchim Leubner agtiapi_CleanupEncryption(struct agtiapi_softc *pCard)
6924e1bc9a0SAchim Leubner {
6934e1bc9a0SAchim Leubner #ifdef ENCRYPT_ENHANCE
6944e1bc9a0SAchim Leubner if(pCard->encrypt_map) {
6954e1bc9a0SAchim Leubner int chan, device, lun;
6964e1bc9a0SAchim Leubner struct list_head *lh;
6974e1bc9a0SAchim Leubner ag_encrypt_map_t *p, *n;
6984e1bc9a0SAchim Leubner
6994e1bc9a0SAchim Leubner for (chan = 0; chan < (AGTIAPI_MAX_CHANNEL_NUM + 1); chan++) {
7004e1bc9a0SAchim Leubner for (device = 0; device < pCard->devDiscover; device++) {
7014e1bc9a0SAchim Leubner for (lun = 0; lun < AGTIAPI_MAX_LUN; lun++) {
7024e1bc9a0SAchim Leubner lh = MAP_TABLE_ENTRY(pCard, chan, device, lun);
7034e1bc9a0SAchim Leubner list_for_each_entry_safe(p, n, lh, list) {
7044e1bc9a0SAchim Leubner // mempool_free(p, pCard->map_mempool);
7054e1bc9a0SAchim Leubner }
7064e1bc9a0SAchim Leubner }
7074e1bc9a0SAchim Leubner }
7084e1bc9a0SAchim Leubner }
7094e1bc9a0SAchim Leubner vfree(pCard->encrypt_map);
7104e1bc9a0SAchim Leubner pCard->encrypt_map = NULL;
7114e1bc9a0SAchim Leubner }
7124e1bc9a0SAchim Leubner #endif
7134e1bc9a0SAchim Leubner }
7144e1bc9a0SAchim Leubner
7154e1bc9a0SAchim Leubner #ifdef ENCRYPT_ENHANCE
7164e1bc9a0SAchim Leubner /******************************************************************************
7174e1bc9a0SAchim Leubner agtiapi_CleanupEncryptionPools():
7184e1bc9a0SAchim Leubner
7194e1bc9a0SAchim Leubner Purpose:
7204e1bc9a0SAchim Leubner Parameters:
7214e1bc9a0SAchim Leubner Return:
7224e1bc9a0SAchim Leubner Note:
7234e1bc9a0SAchim Leubner ******************************************************************************/
7244e1bc9a0SAchim Leubner void
agtiapi_CleanupEncryptionPools(struct agtiapi_softc * pCard)7254e1bc9a0SAchim Leubner agtiapi_CleanupEncryptionPools(struct agtiapi_softc *pCard)
7264e1bc9a0SAchim Leubner {
7274e1bc9a0SAchim Leubner ag_encrypt_ioerr_t *ioerr, *tmp;
7284e1bc9a0SAchim Leubner atomic_set(&ioerr_queue_count);
7294e1bc9a0SAchim Leubner
7304e1bc9a0SAchim Leubner /*
7314e1bc9a0SAchim Leubner * TODO: check "outstanding_encrypted_io_count" for non-zero
7324e1bc9a0SAchim Leubner * and free all mempool items prior to destroying pool
7334e1bc9a0SAchim Leubner */
7344e1bc9a0SAchim Leubner
7354e1bc9a0SAchim Leubner /* Clean up memory pools */
7364e1bc9a0SAchim Leubner if (pCard->map_mempool) {
7374e1bc9a0SAchim Leubner mempool_destroy(pCard->map_mempool);
7384e1bc9a0SAchim Leubner printf("Encryption Map mempool released.\n");
7394e1bc9a0SAchim Leubner pCard->map_mempool = NULL;
7404e1bc9a0SAchim Leubner }
7414e1bc9a0SAchim Leubner
7424e1bc9a0SAchim Leubner /* Clean up kmem cache */
7434e1bc9a0SAchim Leubner if (pCard->map_cache) {
7444e1bc9a0SAchim Leubner kmem_cache_destroy(pCard->map_cache);
7454e1bc9a0SAchim Leubner printf("Kernel memory cache %s released.\n", pCard->map_cache_name);
7464e1bc9a0SAchim Leubner pCard->map_cache = NULL;
7474e1bc9a0SAchim Leubner }
7484e1bc9a0SAchim Leubner
7494e1bc9a0SAchim Leubner /* Clean up memory pools */
7504e1bc9a0SAchim Leubner list_for_each_entry_safe(ioerr, tmp, &pCard->ioerr_queue, list) {
7514e1bc9a0SAchim Leubner list_del_init(&ioerr->list);
7524e1bc9a0SAchim Leubner mempool_free(ioerr, pCard->ioerr_mempool);
7534e1bc9a0SAchim Leubner atomic_dec(&ioerr_queue_count);
7544e1bc9a0SAchim Leubner }
7554e1bc9a0SAchim Leubner
7564e1bc9a0SAchim Leubner if (pCard->ioerr_mempool) {
7574e1bc9a0SAchim Leubner mempool_destroy(pCard->ioerr_mempool);
7584e1bc9a0SAchim Leubner printf("Encryption IO Error mempool released.\n");
7594e1bc9a0SAchim Leubner pCard->ioerr_mempool = NULL;
7604e1bc9a0SAchim Leubner }
7614e1bc9a0SAchim Leubner
7624e1bc9a0SAchim Leubner /* Clean up kmem cache */
7634e1bc9a0SAchim Leubner if (pCard->ioerr_cache) {
7644e1bc9a0SAchim Leubner kmem_cache_destroy(pCard->ioerr_cache);
7654e1bc9a0SAchim Leubner printf("Kernel memory cache %s released.\n", pCard->ioerr_cache_name);
7664e1bc9a0SAchim Leubner pCard->ioerr_cache = NULL;
7674e1bc9a0SAchim Leubner }
7684e1bc9a0SAchim Leubner }
7694e1bc9a0SAchim Leubner
7704e1bc9a0SAchim Leubner /******************************************************************************
7714e1bc9a0SAchim Leubner agtiapi_EncryptionIoctl():
7724e1bc9a0SAchim Leubner
7734e1bc9a0SAchim Leubner Purpose:
7744e1bc9a0SAchim Leubner Parameters:
7754e1bc9a0SAchim Leubner Return:
7764e1bc9a0SAchim Leubner Note:
7774e1bc9a0SAchim Leubner ******************************************************************************/
7784e1bc9a0SAchim Leubner int
agtiapi_EncryptionIoctl(struct agtiapi_softc * pCard,IoctlEncrypt_t * pIoctlPayload)7794e1bc9a0SAchim Leubner agtiapi_EncryptionIoctl(struct agtiapi_softc *pCard, IoctlEncrypt_t *pIoctlPayload)
7804e1bc9a0SAchim Leubner {
7814e1bc9a0SAchim Leubner int rv, rc = 0, skip_wait = 0;
7824e1bc9a0SAchim Leubner tiRoot_t *tiRoot = (tiRoot_t *) &pCard->tiRoot;
7834e1bc9a0SAchim Leubner IoctlTISAEncrypt_t *ioctl_data = &pIoctlPayload->body;
7844e1bc9a0SAchim Leubner pIoctlPayload->hdr.Status = IOCTL_ERR_STATUS_INVALID_CODE;
7854e1bc9a0SAchim Leubner pCard->ioctl_data = (void *) ioctl_data;
7864e1bc9a0SAchim Leubner init_completion(&pCard->ioctl_completion);
7874e1bc9a0SAchim Leubner
7884e1bc9a0SAchim Leubner /* Check that the system is quiesced */
7894e1bc9a0SAchim Leubner if (atomic_read(&outstanding_encrypted_io_count) != 0)
7904e1bc9a0SAchim Leubner printf("%s: WARNING: Attempting encryption management update with outstanding encrypted IOs!\n", __FUNCTION__);
7914e1bc9a0SAchim Leubner
7924e1bc9a0SAchim Leubner printf("%s: Minor %d\n", __FUNCTION__, pIoctlPayload->hdr.MinorFunction);
7934e1bc9a0SAchim Leubner switch(pIoctlPayload->hdr.MinorFunction) {
7944e1bc9a0SAchim Leubner case IOCTL_MN_ENCRYPTION_GET_INFO:
7954e1bc9a0SAchim Leubner {
7964e1bc9a0SAchim Leubner //IoctlEncryptGetInfo_t *get_info = (IoctlEncryptGetInfo_t *) &ioctl_data->request;
7974e1bc9a0SAchim Leubner rc = tiCOMEncryptGetInfo(tiRoot);
7984e1bc9a0SAchim Leubner }
7994e1bc9a0SAchim Leubner break;
8004e1bc9a0SAchim Leubner case IOCTL_MN_ENCRYPTION_SET_MODE:
8014e1bc9a0SAchim Leubner {
8024e1bc9a0SAchim Leubner u32 reg_val = 0, new_cipher_mode = 0;
8034e1bc9a0SAchim Leubner IoctlEncryptSetMode_t *set_mode = (IoctlEncryptSetMode_t *) &ioctl_data->request;
8044e1bc9a0SAchim Leubner
8054e1bc9a0SAchim Leubner printf("%s: input %08x\n", __FUNCTION__, set_mode->securityCipherMode);
8064e1bc9a0SAchim Leubner
8074e1bc9a0SAchim Leubner /* Set security mode */
8084e1bc9a0SAchim Leubner if(TI_ENCRYPT_SEC_MODE_FACT_INIT)
8094e1bc9a0SAchim Leubner if(set_mode->securityCipherMode & TI_ENCRYPT_SEC_MODE_FACT_INIT) {
8104e1bc9a0SAchim Leubner reg_val |= TI_ENCRYPT_SEC_MODE_FACT_INIT;
8114e1bc9a0SAchim Leubner pCard->dek_size = DEK_SIZE_PLAIN;
8124e1bc9a0SAchim Leubner }
8134e1bc9a0SAchim Leubner if(set_mode->securityCipherMode & TI_ENCRYPT_SEC_MODE_A) {
8144e1bc9a0SAchim Leubner reg_val |= TI_ENCRYPT_SEC_MODE_A;
8154e1bc9a0SAchim Leubner pCard->dek_size = DEK_SIZE_ENCRYPT;
8164e1bc9a0SAchim Leubner } else if(set_mode->securityCipherMode & TI_ENCRYPT_SEC_MODE_B) {
8174e1bc9a0SAchim Leubner reg_val |= TI_ENCRYPT_SEC_MODE_B;
8184e1bc9a0SAchim Leubner pCard->dek_size = DEK_SIZE_ENCRYPT;
8194e1bc9a0SAchim Leubner }
8204e1bc9a0SAchim Leubner
8214e1bc9a0SAchim Leubner /* Set cipher mode */
8224e1bc9a0SAchim Leubner if(set_mode->securityCipherMode & TI_ENCRYPT_ATTRIB_CIPHER_XTS) {
8234e1bc9a0SAchim Leubner reg_val |= TI_ENCRYPT_ATTRIB_CIPHER_XTS;
8244e1bc9a0SAchim Leubner new_cipher_mode = TI_ENCRYPT_MODE_XTS_AES;
8254e1bc9a0SAchim Leubner }
8264e1bc9a0SAchim Leubner
8274e1bc9a0SAchim Leubner printf("%s: Setting security cipher mode to: 0x%08x\n", __FUNCTION__, reg_val);
8284e1bc9a0SAchim Leubner pCard->cipher_mode = new_cipher_mode;
8294e1bc9a0SAchim Leubner
8304e1bc9a0SAchim Leubner rc = tiCOMEncryptSetMode(tiRoot, reg_val);
8314e1bc9a0SAchim Leubner }
8324e1bc9a0SAchim Leubner break;
8334e1bc9a0SAchim Leubner case IOCTL_MN_ENCRYPTION_KEK_ADD:
8344e1bc9a0SAchim Leubner {
8354e1bc9a0SAchim Leubner tiEncryptKekBlob_t kek_blob;
8364e1bc9a0SAchim Leubner IoctlEncryptKekAdd_t *kek_add = (IoctlEncryptKekAdd_t *) &ioctl_data->request;
8374e1bc9a0SAchim Leubner printf("%s: Add kek at index 0x%x wrapper 0x%x format 0x%x\n", __FUNCTION__, kek_add->kekIndex, kek_add->wrapperKekIndex, kek_add->blobFormat);
8384e1bc9a0SAchim Leubner
8394e1bc9a0SAchim Leubner /* Copy kek_blob from user pointer to local buffer */
840*3b1ecc9fSBjoern A. Zeeb if(access_ok(kek_add->EncryptKekBlob, sizeof(kek_blob))) {
8414e1bc9a0SAchim Leubner printf("%s: Starting copy from user %p to kernel %p\n", __FUNCTION__, kek_add->EncryptKekBlob, &kek_blob);
8424e1bc9a0SAchim Leubner if((rv = copy_from_user(&kek_blob, kek_add->EncryptKekBlob, sizeof(kek_blob))) != 0) {
8434e1bc9a0SAchim Leubner printf("%s: Copy error, %d left\n", __FUNCTION__, rv);
8444e1bc9a0SAchim Leubner return IOCTL_CALL_FAIL;
8454e1bc9a0SAchim Leubner }
8464e1bc9a0SAchim Leubner rc = tiCOMEncryptKekAdd(tiRoot, kek_add->kekIndex, kek_add->wrapperKekIndex, kek_add->blobFormat, &kek_blob);
8474e1bc9a0SAchim Leubner
8484e1bc9a0SAchim Leubner /* Add kek to local kek table (in case of chip reset) */
8494e1bc9a0SAchim Leubner if(rc == tiSuccess) {
8504e1bc9a0SAchim Leubner if(agtiapi_AddKek(pCard, kek_add->kekIndex, kek_add->wrapperKekIndex, &kek_blob) < 0) {
8514e1bc9a0SAchim Leubner return IOCTL_CALL_FAIL;
8524e1bc9a0SAchim Leubner }
8534e1bc9a0SAchim Leubner }
8544e1bc9a0SAchim Leubner } else {
8554e1bc9a0SAchim Leubner return IOCTL_CALL_FAIL;
8564e1bc9a0SAchim Leubner }
8574e1bc9a0SAchim Leubner }
8584e1bc9a0SAchim Leubner break;
8594e1bc9a0SAchim Leubner case IOCTL_MN_ENCRYPTION_DEK_ADD:
8604e1bc9a0SAchim Leubner {
8614e1bc9a0SAchim Leubner tiEncryptDekBlob_t dek_blob; /* Copied in */
8624e1bc9a0SAchim Leubner IoctlEncryptDekAdd_t *dek_add = (IoctlEncryptDekAdd_t *) &ioctl_data->request;
8634e1bc9a0SAchim Leubner bit32 kek_index = dek_add->kekIndex;
8644e1bc9a0SAchim Leubner bit32 dek_index = dek_add->dekIndex;
8654e1bc9a0SAchim Leubner bit32 dek_table = dek_add->dekTable;
8664e1bc9a0SAchim Leubner bit32 blob_format = dek_add->dekBlobFormat;
8674e1bc9a0SAchim Leubner bit32 entry_sz = dek_add->dekTableKeyEntrySize;
8684e1bc9a0SAchim Leubner U32_64 addr = 0;
8694e1bc9a0SAchim Leubner bit32 addr_table[2];
8704e1bc9a0SAchim Leubner memset(addr_table, 0, sizeof(addr_table));
8714e1bc9a0SAchim Leubner
8724e1bc9a0SAchim Leubner printf("%s: Add dek at index 0x%x, table %x, kek index %x, blob format %x, entry size %x\n", __FUNCTION__, dek_index, dek_table, kek_index, blob_format, entry_sz);
8734e1bc9a0SAchim Leubner
8744e1bc9a0SAchim Leubner /* Copy dek_blob from user pointer to local buffer */
875*3b1ecc9fSBjoern A. Zeeb if(access_ok(dek_add->dekBlob, sizeof(dek_blob))) {
8764e1bc9a0SAchim Leubner printf("%s: Starting copy from user %p to kernel %p\n", __FUNCTION__, dek_add->dekBlob, &dek_blob);
8774e1bc9a0SAchim Leubner if((rv = copy_from_user(&dek_blob, dek_add->dekBlob, sizeof(dek_blob))) != 0) {
8784e1bc9a0SAchim Leubner printf("%s: Copy error, %d left\n", __FUNCTION__, rv);
8794e1bc9a0SAchim Leubner return IOCTL_CALL_FAIL;
8804e1bc9a0SAchim Leubner }
8814e1bc9a0SAchim Leubner
8824e1bc9a0SAchim Leubner /* Add DEK to local table */
8834e1bc9a0SAchim Leubner if (agtiapi_AddDek(pCard, dek_table, dek_index, blob_format, entry_sz, &dek_blob, &addr) < 0) {
8844e1bc9a0SAchim Leubner return IOCTL_CALL_FAIL;
8854e1bc9a0SAchim Leubner }
8864e1bc9a0SAchim Leubner memcpy(addr_table, &addr, sizeof(addr));
8874e1bc9a0SAchim Leubner
8884e1bc9a0SAchim Leubner /* Add DEK-KEK association in local table */
8894e1bc9a0SAchim Leubner if (agtiapi_MapDekKek(pCard, dek_table, dek_index, kek_index) < 0) {
8904e1bc9a0SAchim Leubner return IOCTL_CALL_FAIL;
8914e1bc9a0SAchim Leubner }
8924e1bc9a0SAchim Leubner
8934e1bc9a0SAchim Leubner /* Push DEK to chip */
8944e1bc9a0SAchim Leubner rc = tiCOMEncryptDekAdd(tiRoot, kek_index, dek_table, addr_table[1], addr_table[0], dek_index, 1, blob_format, entry_sz);
8954e1bc9a0SAchim Leubner } else {
8964e1bc9a0SAchim Leubner return IOCTL_CALL_FAIL;
8974e1bc9a0SAchim Leubner }
8984e1bc9a0SAchim Leubner }
8994e1bc9a0SAchim Leubner break;
9004e1bc9a0SAchim Leubner case IOCTL_MN_ENCRYPTION_DEK_INVALID:
9014e1bc9a0SAchim Leubner {
9024e1bc9a0SAchim Leubner IoctlEncryptDekInvalidate_t *dek_to_invalidate = (IoctlEncryptDekInvalidate_t *) &ioctl_data->request;
9034e1bc9a0SAchim Leubner printf("%s: Invalidating dek at index 0x%x, table %x\n", __FUNCTION__, dek_to_invalidate->dek.dekIndex, dek_to_invalidate->dek.dekTable);
9044e1bc9a0SAchim Leubner
9054e1bc9a0SAchim Leubner rc = tiCOMEncryptDekInvalidate(tiRoot, dek_to_invalidate->dek.dekTable, dek_to_invalidate->dek.dekIndex);
9064e1bc9a0SAchim Leubner /* TODO: What to do in local tables? Mark it? */
9074e1bc9a0SAchim Leubner }
9084e1bc9a0SAchim Leubner break;
9094e1bc9a0SAchim Leubner case IOCTL_MN_ENCRYPTION_KEK_NVRAM:
9104e1bc9a0SAchim Leubner {
9114e1bc9a0SAchim Leubner rc = tiError;
9124e1bc9a0SAchim Leubner }
9134e1bc9a0SAchim Leubner break;
9144e1bc9a0SAchim Leubner case IOCTL_MN_ENCRYPTION_DEK_ASSIGN:
9154e1bc9a0SAchim Leubner {
9164e1bc9a0SAchim Leubner IoctlEncryptDekMapTable_t *p_dek_map = (IoctlEncryptDekMapTable_t *) &ioctl_data->request;
9174e1bc9a0SAchim Leubner
9184e1bc9a0SAchim Leubner /* Fill in host */
9194e1bc9a0SAchim Leubner p_dek_map->dekMap[0].host = (bit32) pCard->pHost->host_no;
9204e1bc9a0SAchim Leubner
9214e1bc9a0SAchim Leubner printf("%s: Host %u: Mapping %u:%u:%u (%llx to %llx) to dek at index 0x%x, table %x, keytag %08x:%08x\n", __FUNCTION__, p_dek_map->dekMap[0].host, p_dek_map->dekMap[0].channel, p_dek_map->dekMap[0].device, p_dek_map->dekMap[0].lun, p_dek_map->dekMap[0].dekMapEntry[0].startLBA, p_dek_map->dekMap[0].dekMapEntry[0].endLBA, p_dek_map->dekMap[0].dekMapEntry[0].dek.dekIndex, p_dek_map->dekMap[0].dekMapEntry[0].dek.dekTable, p_dek_map->dekMap[0].keytag[1], p_dek_map->dekMap[0].keytag[0]);
9224e1bc9a0SAchim Leubner
9234e1bc9a0SAchim Leubner /* Create a mapping in local tables */
9244e1bc9a0SAchim Leubner if (agtiapi_MapDek(pCard, &p_dek_map->dekMap[0]) < 0) {
9254e1bc9a0SAchim Leubner pIoctlPayload->hdr.Status = IOCTL_ERR_STATUS_INVALID_CODE;
9264e1bc9a0SAchim Leubner return IOCTL_CALL_FAIL;
9274e1bc9a0SAchim Leubner }
9284e1bc9a0SAchim Leubner
9294e1bc9a0SAchim Leubner rc = tiSuccess;
9304e1bc9a0SAchim Leubner skip_wait = 1;
9314e1bc9a0SAchim Leubner ioctl_data->encryptFunction = encryptSetDekMap;
9324e1bc9a0SAchim Leubner ioctl_data->status = tiSuccess;
9334e1bc9a0SAchim Leubner ioctl_data->subEvent = 0;
9344e1bc9a0SAchim Leubner }
9354e1bc9a0SAchim Leubner break;
9364e1bc9a0SAchim Leubner case IOCTL_MN_ENCRYPTION_ERROR_QUERY:
9374e1bc9a0SAchim Leubner {
9384e1bc9a0SAchim Leubner unsigned long flags, i, query_flag;
9394e1bc9a0SAchim Leubner ag_encrypt_ioerr_t *ioerr, *tmp;
9404e1bc9a0SAchim Leubner IoctlEncryptErrorQuery_t *perr = (IoctlEncryptErrorQuery_t *) &ioctl_data->request;
9414e1bc9a0SAchim Leubner
9424e1bc9a0SAchim Leubner printf("%s: query flag %x\n", __FUNCTION__, perr->query_flag);
9434e1bc9a0SAchim Leubner query_flag = perr->query_flag;
9444e1bc9a0SAchim Leubner
9454e1bc9a0SAchim Leubner /* initialize */
9464e1bc9a0SAchim Leubner memset(perr, 0, sizeof(IoctlEncryptErrorQuery_t));
9474e1bc9a0SAchim Leubner
9484e1bc9a0SAchim Leubner error_query_restart:
9494e1bc9a0SAchim Leubner /* Take spinlock */
9504e1bc9a0SAchim Leubner // spin_lock_irqsave(&pCard->ioerr_queue_lock, flags);
9514e1bc9a0SAchim Leubner AG_SPIN_LOCK_IRQ(&pCard->ioerr_queue_lock, flags);
9524e1bc9a0SAchim Leubner
9534e1bc9a0SAchim Leubner /* Walk list */
9544e1bc9a0SAchim Leubner i = 0;
9554e1bc9a0SAchim Leubner list_for_each_entry_safe(ioerr, tmp, &pCard->ioerr_queue, list) {
9564e1bc9a0SAchim Leubner if (i >= 32)
9574e1bc9a0SAchim Leubner break;
9584e1bc9a0SAchim Leubner
9594e1bc9a0SAchim Leubner perr->valid_mask |= (1 << i);
9604e1bc9a0SAchim Leubner memcpy(&perr->error[i], &ioerr->ioerr, sizeof(IoctlEncryptIOError_t));
9614e1bc9a0SAchim Leubner list_del_init(&ioerr->list);
9624e1bc9a0SAchim Leubner mempool_free(ioerr, pCard->ioerr_mempool);
9634e1bc9a0SAchim Leubner i++;
9644e1bc9a0SAchim Leubner atomic_dec(&ioerr_queue_count);
9654e1bc9a0SAchim Leubner }
9664e1bc9a0SAchim Leubner
9674e1bc9a0SAchim Leubner /* Release spinlock */
9684e1bc9a0SAchim Leubner // spin_unlock_irqrestore(&pCard->ioerr_queue_lock, flags);
9694e1bc9a0SAchim Leubner AG_SPIN_UNLOCK_IRQ(&pCard->ioerr_queue_lock, flags); //for test
9704e1bc9a0SAchim Leubner
9714e1bc9a0SAchim Leubner if (!perr->valid_mask) {
9724e1bc9a0SAchim Leubner /* No encryption IO error events, check flags to see if blocking wait OK */
9734e1bc9a0SAchim Leubner if (query_flag == ERROR_QUERY_FLAG_BLOCK) {
9744e1bc9a0SAchim Leubner if (wait_event_interruptible(ioerr_waitq, (atomic_read(&ioerr_queue_count)))) {
9754e1bc9a0SAchim Leubner /* Awoken by signal */
9764e1bc9a0SAchim Leubner return IOCTL_CALL_FAIL;
9774e1bc9a0SAchim Leubner } else {
9784e1bc9a0SAchim Leubner /* Awoken by IO error */
9794e1bc9a0SAchim Leubner goto error_query_restart;
9804e1bc9a0SAchim Leubner }
9814e1bc9a0SAchim Leubner }
9824e1bc9a0SAchim Leubner }
9834e1bc9a0SAchim Leubner rc = tiSuccess;
9844e1bc9a0SAchim Leubner skip_wait = 1;
9854e1bc9a0SAchim Leubner ioctl_data->encryptFunction = encryptErrorQuery;
9864e1bc9a0SAchim Leubner ioctl_data->status = tiSuccess;
9874e1bc9a0SAchim Leubner ioctl_data->subEvent = 0;
9884e1bc9a0SAchim Leubner }
9894e1bc9a0SAchim Leubner break;
9904e1bc9a0SAchim Leubner default:
9914e1bc9a0SAchim Leubner printf("%s: Unrecognized Minor Function %d\n", __FUNCTION__, pIoctlPayload->hdr.MinorFunction);
9924e1bc9a0SAchim Leubner pIoctlPayload->hdr.Status = IOCTL_ERR_STATUS_INVALID_CODE;
9934e1bc9a0SAchim Leubner return IOCTL_CALL_FAIL;
9944e1bc9a0SAchim Leubner break;
9954e1bc9a0SAchim Leubner }
9964e1bc9a0SAchim Leubner
9974e1bc9a0SAchim Leubner /* Demux rc */
9984e1bc9a0SAchim Leubner switch(rc) {
9994e1bc9a0SAchim Leubner case tiSuccess:
10004e1bc9a0SAchim Leubner if(!skip_wait)
10014e1bc9a0SAchim Leubner wait_for_completion(&pCard->ioctl_completion);
10024e1bc9a0SAchim Leubner /* Maybe: wait_for_completion_timeout() */
10034e1bc9a0SAchim Leubner pIoctlPayload->hdr.Status = ioctl_data->status;
10044e1bc9a0SAchim Leubner break;
10054e1bc9a0SAchim Leubner case tiNotSupported:
10064e1bc9a0SAchim Leubner pIoctlPayload->hdr.Status = IOCTL_ERR_STATUS_NOT_SUPPORTED;
10074e1bc9a0SAchim Leubner break;
10084e1bc9a0SAchim Leubner default:
10094e1bc9a0SAchim Leubner printf("%s: Status: %d\n", __FUNCTION__, rc);
10104e1bc9a0SAchim Leubner pIoctlPayload->hdr.Status = IOCTL_ERR_STATUS_INVALID_CODE;
10114e1bc9a0SAchim Leubner break;
10124e1bc9a0SAchim Leubner }
10134e1bc9a0SAchim Leubner
10144e1bc9a0SAchim Leubner printf("%s: Encryption ioctl %d successful.\n", __FUNCTION__, pIoctlPayload->hdr.MinorFunction);
10154e1bc9a0SAchim Leubner return IOCTL_CALL_SUCCESS;
10164e1bc9a0SAchim Leubner }
10174e1bc9a0SAchim Leubner #endif
10184e1bc9a0SAchim Leubner /******************************************************************************
10194e1bc9a0SAchim Leubner agtiapi_SetupEncryptedIO():
10204e1bc9a0SAchim Leubner
10214e1bc9a0SAchim Leubner Purpose:
10224e1bc9a0SAchim Leubner Parameters:
10234e1bc9a0SAchim Leubner Return:
10244e1bc9a0SAchim Leubner Note:
10254e1bc9a0SAchim Leubner ******************************************************************************/
10264e1bc9a0SAchim Leubner int
agtiapi_SetupEncryptedIO(struct agtiapi_softc * pCard,ccb_t * pccb,unsigned long long block)10274e1bc9a0SAchim Leubner agtiapi_SetupEncryptedIO(struct agtiapi_softc *pCard, ccb_t *pccb, unsigned long long block)
10284e1bc9a0SAchim Leubner {
10294e1bc9a0SAchim Leubner
10304e1bc9a0SAchim Leubner pCard->cipher_mode = TI_ENCRYPT_ATTRIB_CIPHER_XTS;
10314e1bc9a0SAchim Leubner /* Check that cipher mode is set properly */
10324e1bc9a0SAchim Leubner if (pCard->cipher_mode == CIPHER_MODE_INVALID) {
10334e1bc9a0SAchim Leubner printf("%s: Cipher mode not yet set.\n", __FUNCTION__);
10344e1bc9a0SAchim Leubner return -E_BAD_CIPHER_MODE;
10354e1bc9a0SAchim Leubner }
10364e1bc9a0SAchim Leubner
10374e1bc9a0SAchim Leubner memset(&(pccb->tiSuperScsiRequest.Encrypt), 0, sizeof(pccb->tiSuperScsiRequest.Encrypt));
10384e1bc9a0SAchim Leubner pccb->tiSuperScsiRequest.Encrypt.keyTagCheck = FALSE;
10394e1bc9a0SAchim Leubner pccb->tiSuperScsiRequest.Encrypt.encryptMode = pCard->cipher_mode;
10404e1bc9a0SAchim Leubner pccb->tiSuperScsiRequest.Encrypt.tweakVal_W0 = block;
10414e1bc9a0SAchim Leubner if(pccb->tiSuperScsiRequest.scsiCmnd.cdb[0] == READ_16 ||
10424e1bc9a0SAchim Leubner pccb->tiSuperScsiRequest.scsiCmnd.cdb[0] == WRITE_16)
10434e1bc9a0SAchim Leubner {
10444e1bc9a0SAchim Leubner pccb->tiSuperScsiRequest.Encrypt.tweakVal_W0 = ((pccb->tiSuperScsiRequest.scsiCmnd.cdb[6] << 24 ) |
10454e1bc9a0SAchim Leubner (pccb->tiSuperScsiRequest.scsiCmnd.cdb[7] << 16 ) |
10464e1bc9a0SAchim Leubner (pccb->tiSuperScsiRequest.scsiCmnd.cdb[8] << 8 ) |
10474e1bc9a0SAchim Leubner (pccb->tiSuperScsiRequest.scsiCmnd.cdb[9]));
10484e1bc9a0SAchim Leubner pccb->tiSuperScsiRequest.Encrypt.tweakVal_W1 = ((pccb->tiSuperScsiRequest.scsiCmnd.cdb[2] << 24 ) |
10494e1bc9a0SAchim Leubner (pccb->tiSuperScsiRequest.scsiCmnd.cdb[3] << 16 ) |
10504e1bc9a0SAchim Leubner (pccb->tiSuperScsiRequest.scsiCmnd.cdb[4] << 8 ) |
10514e1bc9a0SAchim Leubner (pccb->tiSuperScsiRequest.scsiCmnd.cdb[5]));
10524e1bc9a0SAchim Leubner }
10534e1bc9a0SAchim Leubner /* Mark IO as valid encrypted IO */
10544e1bc9a0SAchim Leubner pccb->flags |= ENCRYPTED_IO;
10554e1bc9a0SAchim Leubner pccb->tiSuperScsiRequest.flags = TI_SCSI_INITIATOR_ENCRYPT;
10564e1bc9a0SAchim Leubner
10574e1bc9a0SAchim Leubner /* Bump refcount (atomic) */
10584e1bc9a0SAchim Leubner atomic_inc(&outstanding_encrypted_io_count);
10594e1bc9a0SAchim Leubner return 0;
10604e1bc9a0SAchim Leubner }
10614e1bc9a0SAchim Leubner
10624e1bc9a0SAchim Leubner /******************************************************************************
10634e1bc9a0SAchim Leubner agtiapi_CleanupEncryptedIO():
10644e1bc9a0SAchim Leubner
10654e1bc9a0SAchim Leubner Purpose:
10664e1bc9a0SAchim Leubner Parameters:
10674e1bc9a0SAchim Leubner Return:
10684e1bc9a0SAchim Leubner Note:
10694e1bc9a0SAchim Leubner ******************************************************************************/
10704e1bc9a0SAchim Leubner void
agtiapi_CleanupEncryptedIO(struct agtiapi_softc * pCard,ccb_t * pccb)10714e1bc9a0SAchim Leubner agtiapi_CleanupEncryptedIO(struct agtiapi_softc *pCard, ccb_t *pccb)
10724e1bc9a0SAchim Leubner {
10734e1bc9a0SAchim Leubner if ((pccb->flags & ENCRYPTED_IO)) {
10744e1bc9a0SAchim Leubner /* Decrement refcount */
10754e1bc9a0SAchim Leubner atomic_dec(&outstanding_encrypted_io_count);
10764e1bc9a0SAchim Leubner }
10774e1bc9a0SAchim Leubner pccb->tiSuperScsiRequest.flags &= ~TI_SCSI_INITIATOR_ENCRYPT;
10784e1bc9a0SAchim Leubner pccb->flags &= ~ENCRYPTED_IO;
10794e1bc9a0SAchim Leubner }
10804e1bc9a0SAchim Leubner #ifdef ENCRYPT_ENHANCE
10814e1bc9a0SAchim Leubner /******************************************************************************
10824e1bc9a0SAchim Leubner agtiapi_HandleEncryptedIOFailure():
10834e1bc9a0SAchim Leubner
10844e1bc9a0SAchim Leubner Purpose:
10854e1bc9a0SAchim Leubner Parameters:
10864e1bc9a0SAchim Leubner Return:
10874e1bc9a0SAchim Leubner Note:
10884e1bc9a0SAchim Leubner ******************************************************************************/
10894e1bc9a0SAchim Leubner void
agtiapi_HandleEncryptedIOFailure(ag_device_t * pDev,ccb_t * pccb)10904e1bc9a0SAchim Leubner agtiapi_HandleEncryptedIOFailure(ag_device_t *pDev, ccb_t *pccb)
10914e1bc9a0SAchim Leubner {
10924e1bc9a0SAchim Leubner unsigned long flags, qdepth;
10934e1bc9a0SAchim Leubner struct scsi_cmnd *cmd;
10944e1bc9a0SAchim Leubner ag_encrypt_ioerr_t *perr;
10954e1bc9a0SAchim Leubner ag_card_t *pCard;
10964e1bc9a0SAchim Leubner
10974e1bc9a0SAchim Leubner cmd = pccb->cmd;
10984e1bc9a0SAchim Leubner if (!cmd) {
10994e1bc9a0SAchim Leubner printf("%s: Malformed pccb %p.\n", __FUNCTION__, pccb);
11004e1bc9a0SAchim Leubner return;
11014e1bc9a0SAchim Leubner }
11024e1bc9a0SAchim Leubner
11034e1bc9a0SAchim Leubner pCard = pDev->pCard;
11044e1bc9a0SAchim Leubner
11054e1bc9a0SAchim Leubner /* Sanity check */
11064e1bc9a0SAchim Leubner if (!(pccb->flags & ENCRYPTED_IO)) {
11074e1bc9a0SAchim Leubner printf("%s: Skipping IO %lx: Not Encrypted.\n", __FUNCTION__, cmd->serial_number);
11084e1bc9a0SAchim Leubner return;
11094e1bc9a0SAchim Leubner }
11104e1bc9a0SAchim Leubner
11114e1bc9a0SAchim Leubner /* Check queue depth against max */
11124e1bc9a0SAchim Leubner qdepth = atomic_read(&ioerr_queue_count);
11134e1bc9a0SAchim Leubner if (qdepth >= IOERR_QUEUE_DEPTH_MAX) {
11144e1bc9a0SAchim Leubner printf("%s: Not queueing IO error due to queue full: %lu entries.\n", __FUNCTION__, qdepth);
11154e1bc9a0SAchim Leubner return;
11164e1bc9a0SAchim Leubner }
11174e1bc9a0SAchim Leubner
11184e1bc9a0SAchim Leubner /* Get a container for the ag_encrypt_ioerr_t item from the mempool */
11194e1bc9a0SAchim Leubner // perr = mempool_alloc(pCard->ioerr_mempool, GFP_ATOMIC);
11204e1bc9a0SAchim Leubner p = (ag_encrypt_map_t *)uma_zalloc(pCard->map_cache, M_WAITOK); //Encryption
11214e1bc9a0SAchim Leubner if (!perr) {
11224e1bc9a0SAchim Leubner printf("%s: Mempool allocation failure.\n", __FUNCTION__);
11234e1bc9a0SAchim Leubner return;
11244e1bc9a0SAchim Leubner }
11254e1bc9a0SAchim Leubner
11264e1bc9a0SAchim Leubner /* Populate ag_encrypt_ioerr_t container */
11274e1bc9a0SAchim Leubner perr->ioerr.error_id = cmd->serial_number;
11284e1bc9a0SAchim Leubner perr->ioerr.timestamp = cmd->jiffies_at_alloc;
11294e1bc9a0SAchim Leubner perr->ioerr.host = (unsigned int) cmd->device->host->host_no;
11304e1bc9a0SAchim Leubner perr->ioerr.channel = cmd->device->channel;
11314e1bc9a0SAchim Leubner perr->ioerr.device = cmd->device->id;
11324e1bc9a0SAchim Leubner perr->ioerr.lun = cmd->device->lun;
11334e1bc9a0SAchim Leubner perr->ioerr.scsi_cmd = (unsigned int) cmd->cmnd[0];
11344e1bc9a0SAchim Leubner perr->ioerr.dek_index = pccb->tiSuperScsiRequest.Encrypt.dekInfo.dekIndex;
11354e1bc9a0SAchim Leubner perr->ioerr.dek_table = pccb->tiSuperScsiRequest.Encrypt.dekInfo.dekTable;
11364e1bc9a0SAchim Leubner perr->ioerr.kek_index = pccb->tiSuperScsiRequest.Encrypt.kekIndex;
11374e1bc9a0SAchim Leubner perr->ioerr.keytag_check = pccb->tiSuperScsiRequest.Encrypt.keyTagCheck;
11384e1bc9a0SAchim Leubner perr->ioerr.encrypt_mode = pccb->tiSuperScsiRequest.Encrypt.encryptMode;
11394e1bc9a0SAchim Leubner perr->ioerr.keytag[0] = pccb->tiSuperScsiRequest.Encrypt.keyTag_W0;
11404e1bc9a0SAchim Leubner perr->ioerr.keytag[1] = pccb->tiSuperScsiRequest.Encrypt.keyTag_W1;
11414e1bc9a0SAchim Leubner
11424e1bc9a0SAchim Leubner switch(pccb->scsiStatus) {
11434e1bc9a0SAchim Leubner case tiDetailDekKeyCacheMiss:
11444e1bc9a0SAchim Leubner case tiDetailDekIVMismatch:
11454e1bc9a0SAchim Leubner perr->ioerr.error_type = pccb->scsiStatus;
11464e1bc9a0SAchim Leubner break;
11474e1bc9a0SAchim Leubner default:
11484e1bc9a0SAchim Leubner printf("%s: Unrecognized encrypted IO completion error status: %d\n", __FUNCTION__, pccb->scsiStatus);
11494e1bc9a0SAchim Leubner perr->ioerr.error_type = 0xffffffff;
11504e1bc9a0SAchim Leubner break;
11514e1bc9a0SAchim Leubner }
11524e1bc9a0SAchim Leubner
11534e1bc9a0SAchim Leubner /* Link IO err into queue */
11544e1bc9a0SAchim Leubner AG_SPIN_LOCK_IRQ(&pCard->ioerr_queue_lock, flags);
11554e1bc9a0SAchim Leubner list_add_tail(&perr->list, &pCard->ioerr_queue);
11564e1bc9a0SAchim Leubner AG_SPIN_UNLOCK_IRQ(&pCard->ioerr_queue_lock, flags);
11574e1bc9a0SAchim Leubner
11584e1bc9a0SAchim Leubner /* Notify any wait queue waiters that an IO error has occurred */
11594e1bc9a0SAchim Leubner atomic_inc(&ioerr_queue_count);
11604e1bc9a0SAchim Leubner wake_up_interruptible(&ioerr_waitq);
11614e1bc9a0SAchim Leubner
11624e1bc9a0SAchim Leubner }
11634e1bc9a0SAchim Leubner #endif
11644e1bc9a0SAchim Leubner #endif
1165