mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-22 00:46:43 +07:00
51f421c85c
This feature gives the user RW access to any opal table with admin1 authority. The flags described in the new structure determines if the user wants to read/write the data. Flags are checked for valid values in order to allow future features to be added to the ioctl. The user can provide the desired table's UID. Also, the ioctl provides a size and offset field and internally will loop data accesses to return the full data block. Read overrun is prevented by the initiator's sec_send_recv() backend. The ioctl provides a private field with the intention to accommodate any future expansions to the ioctl. Reviewed-by: Scott Bauer <sbauer@plzdonthack.me> Reviewed-by: Jon Derrick <jonathan.derrick@intel.com> Signed-off-by: Revanth Rajashekar <revanth.rajashekar@intel.com> Signed-off-by: Jens Axboe <axboe@kernel.dk>
72 lines
1.7 KiB
C
72 lines
1.7 KiB
C
/* SPDX-License-Identifier: GPL-2.0 */
|
|
/*
|
|
* Copyright © 2016 Intel Corporation
|
|
*
|
|
* Authors:
|
|
* Rafael Antognolli <rafael.antognolli@intel.com>
|
|
* Scott Bauer <scott.bauer@intel.com>
|
|
*/
|
|
|
|
#ifndef LINUX_OPAL_H
|
|
#define LINUX_OPAL_H
|
|
|
|
#include <uapi/linux/sed-opal.h>
|
|
#include <linux/kernel.h>
|
|
|
|
struct opal_dev;
|
|
|
|
typedef int (sec_send_recv)(void *data, u16 spsp, u8 secp, void *buffer,
|
|
size_t len, bool send);
|
|
|
|
#ifdef CONFIG_BLK_SED_OPAL
|
|
void free_opal_dev(struct opal_dev *dev);
|
|
bool opal_unlock_from_suspend(struct opal_dev *dev);
|
|
struct opal_dev *init_opal_dev(void *data, sec_send_recv *send_recv);
|
|
int sed_ioctl(struct opal_dev *dev, unsigned int cmd, void __user *ioctl_ptr);
|
|
|
|
static inline bool is_sed_ioctl(unsigned int cmd)
|
|
{
|
|
switch (cmd) {
|
|
case IOC_OPAL_SAVE:
|
|
case IOC_OPAL_LOCK_UNLOCK:
|
|
case IOC_OPAL_TAKE_OWNERSHIP:
|
|
case IOC_OPAL_ACTIVATE_LSP:
|
|
case IOC_OPAL_SET_PW:
|
|
case IOC_OPAL_ACTIVATE_USR:
|
|
case IOC_OPAL_REVERT_TPR:
|
|
case IOC_OPAL_LR_SETUP:
|
|
case IOC_OPAL_ADD_USR_TO_LR:
|
|
case IOC_OPAL_ENABLE_DISABLE_MBR:
|
|
case IOC_OPAL_ERASE_LR:
|
|
case IOC_OPAL_SECURE_ERASE_LR:
|
|
case IOC_OPAL_PSID_REVERT_TPR:
|
|
case IOC_OPAL_MBR_DONE:
|
|
case IOC_OPAL_WRITE_SHADOW_MBR:
|
|
case IOC_OPAL_GENERIC_TABLE_RW:
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
#else
|
|
static inline void free_opal_dev(struct opal_dev *dev)
|
|
{
|
|
}
|
|
|
|
static inline bool is_sed_ioctl(unsigned int cmd)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
static inline int sed_ioctl(struct opal_dev *dev, unsigned int cmd,
|
|
void __user *ioctl_ptr)
|
|
{
|
|
return 0;
|
|
}
|
|
static inline bool opal_unlock_from_suspend(struct opal_dev *dev)
|
|
{
|
|
return false;
|
|
}
|
|
#define init_opal_dev(data, send_recv) NULL
|
|
#endif /* CONFIG_BLK_SED_OPAL */
|
|
#endif /* LINUX_OPAL_H */
|