Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2405099imu; Thu, 17 Jan 2019 13:37:42 -0800 (PST) X-Google-Smtp-Source: ALg8bN5KLmQTw7KNRY+nz3j+tpNLS4/8FZ3gjvE/kmCdVmdz6HNmpA3APgWhb9NTEW+2KqTGb/Ub X-Received: by 2002:a17:902:45:: with SMTP id 63mr16025473pla.272.1547761061986; Thu, 17 Jan 2019 13:37:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547761061; cv=none; d=google.com; s=arc-20160816; b=OG2dMs+srPUcMul7kK69JJeyVqU05jUnvN9B/HbJBbiO55DAHPSU5/yMMGTivuQKUv IsCLTeU3g/fUgpzum41o+nRZyQ4/8rtEEd7TtQnk8wK4iEj+fjMCiWOeaNgrVyJacINj gQkpDxpDo+20Ubv7CWoV3mDusCcrnTu9C2wzyHEZUBbYDf8hWvfd013L2GHEYXsgW2A7 Y9YRngbqnvqqFAMm8E1UFGfuZpPu/PkfMS9y8V8FYiFZlPsTGurGrUUsk52fx2UrcanQ Xw2VgXXnRmROEqHCoLUfIDZgoweFA55AIXTb6QAiKoZjX0gv5STBC/mae96hB5JevYBs tYcw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-filter:dkim-signature; bh=hoekDxEgp2sh9NBt3/ADRu57HmGBacwC1Yo6EWm4pRU=; b=lPIslKnrce8Fvw/gS81YQOQXTVNBB13XZyZRzUaNgISwJztecShKZYOztVWdzEiJs6 Hc4eoGrEYN6U0HB/pIi521z1byjgN3kjETIVrDmtd5H3f7wi0zlf7ap/6X/FVZD7ONp3 4DR2W8pgffH4K23r9CC63MwBQmOW+UgbCaHd39Y2J8lhPxlsCb6zvtWq5Ze7y/uhmSJh zZx2NC4N+ZfFnVqeKZniWeOduvZbFPZV9naXTTccD9/kpSOMtuPQqk50Xy5ag3Ta8g0D HnCV4AUcSSLuJpXz0UA19scId9Xg3fj76zQoH62a1j8Q0fwMcvpYLAqHqf5cJrxQS+Vs OPiQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@fjfi.cvut.cz header.s=20151024 header.b=DnUOl4CV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w185si2722803pfw.122.2019.01.17.13.37.26; Thu, 17 Jan 2019 13:37:41 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@fjfi.cvut.cz header.s=20151024 header.b=DnUOl4CV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728295AbfAQVeM (ORCPT + 99 others); Thu, 17 Jan 2019 16:34:12 -0500 Received: from mailgw1.fjfi.cvut.cz ([147.32.9.3]:35540 "EHLO mailgw1.fjfi.cvut.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727171AbfAQVda (ORCPT ); Thu, 17 Jan 2019 16:33:30 -0500 Received: from localhost (localhost [127.0.0.1]) by mailgw1.fjfi.cvut.cz (Postfix) with ESMTP id B0642A3997; Thu, 17 Jan 2019 22:33:27 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fjfi.cvut.cz; s=20151024; t=1547760807; i=@fjfi.cvut.cz; bh=hoekDxEgp2sh9NBt3/ADRu57HmGBacwC1Yo6EWm4pRU=; h=From:To:Cc:Subject:Date:In-Reply-To:References; b=DnUOl4CVPYWq3vqiSC/TMziBcuKW5/tvpWDyJI7rUMgO8AhmwDo1lbzIT2GgYwP1F Q/qtaQwURycGEflT64DLCY3/GRcu5/impN/oQ1rOzgAdrjkYuBqP6DExaL34DywFvj xcTFeVKQhwLXzmdZffM0ZlvdvkzCem/g22xLW/w0= X-CTU-FNSPE-Virus-Scanned: amavisd-new at fjfi.cvut.cz Received: from mailgw1.fjfi.cvut.cz ([127.0.0.1]) by localhost (mailgw1.fjfi.cvut.cz [127.0.0.1]) (amavisd-new, port 10022) with ESMTP id kkkyuD2J6MCQ; Thu, 17 Jan 2019 22:33:20 +0100 (CET) Received: from linux.fjfi.cvut.cz (linux.fjfi.cvut.cz [147.32.5.111]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mailgw1.fjfi.cvut.cz (Postfix) with ESMTPS id 78C23A3971; Thu, 17 Jan 2019 22:33:12 +0100 (CET) DKIM-Filter: OpenDKIM Filter v2.11.0 mailgw1.fjfi.cvut.cz 78C23A3971 Received: by linux.fjfi.cvut.cz (Postfix, from userid 1001) id 4F58860050; Thu, 17 Jan 2019 22:33:11 +0100 (CET) From: David Kozub To: Jens Axboe , Jonathan Derrick , linux-block@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Jonas Rabenstein Subject: [PATCH v2 10/16] block: sed-opal: add ioctl for done-mark of shadow mbr Date: Thu, 17 Jan 2019 22:31:50 +0100 Message-Id: <1547760716-7304-11-git-send-email-zub@linux.fjfi.cvut.cz> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1547760716-7304-1-git-send-email-zub@linux.fjfi.cvut.cz> References: <1547760716-7304-1-git-send-email-zub@linux.fjfi.cvut.cz> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jonas Rabenstein Enable users to mark the shadow mbr as done without completely deactivating the shadow mbr feature. This may be useful on reboots, when the power to the disk is not disconnected in between and the shadow mbr stores the required boot files. Of course, this saves also the (few) commands required to enable the feature if it is already enabled and one only wants to mark the shadow mbr as done. Signed-off-by: Jonas Rabenstein --- block/sed-opal.c | 33 +++++++++++++++++++++++++++++++-- include/linux/sed-opal.h | 1 + include/uapi/linux/sed-opal.h | 1 + 3 files changed, 33 insertions(+), 2 deletions(-) diff --git a/block/sed-opal.c b/block/sed-opal.c index db966bbc5a05..f85d9e53aab8 100644 --- a/block/sed-opal.c +++ b/block/sed-opal.c @@ -1996,13 +1996,39 @@ static int opal_erase_locking_range(struct opal_dev *dev, static int opal_enable_disable_shadow_mbr(struct opal_dev *dev, struct opal_mbr_data *opal_mbr) { + u8 token = opal_mbr->enable_disable == OPAL_MBR_ENABLE + ? OPAL_TRUE : OPAL_FALSE; const struct opal_step mbr_steps[] = { { opal_discovery0, }, { start_admin1LSP_opal_session, &opal_mbr->key }, - { set_mbr_done, &opal_mbr->enable_disable }, + { set_mbr_done, &token }, { end_opal_session, }, { start_admin1LSP_opal_session, &opal_mbr->key }, - { set_mbr_enable_disable, &opal_mbr->enable_disable }, + { set_mbr_enable_disable, &token }, + { end_opal_session, }, + { NULL, } + }; + int ret; + + if (opal_mbr->enable_disable != OPAL_MBR_ENABLE && + opal_mbr->enable_disable != OPAL_MBR_DISABLE) + return -EINVAL; + + mutex_lock(&dev->dev_lock); + setup_opal_dev(dev, mbr_steps); + ret = next(dev); + mutex_unlock(&dev->dev_lock); + return ret; +} + +static int opal_mbr_status(struct opal_dev *dev, struct opal_mbr_data *opal_mbr) +{ + u8 token = opal_mbr->enable_disable == OPAL_MBR_ENABLE + ? OPAL_TRUE : OPAL_FALSE; + const struct opal_step mbr_steps[] = { + { opal_discovery0, }, + { start_admin1LSP_opal_session, &opal_mbr->key }, + { set_mbr_done, &token }, { end_opal_session, }, { NULL, } }; @@ -2349,6 +2375,9 @@ int sed_ioctl(struct opal_dev *dev, unsigned int cmd, void __user *arg) case IOC_OPAL_ENABLE_DISABLE_MBR: ret = opal_enable_disable_shadow_mbr(dev, p); break; + case IOC_OPAL_MBR_STATUS: + ret = opal_mbr_status(dev, p); + break; case IOC_OPAL_ERASE_LR: ret = opal_erase_locking_range(dev, p); break; diff --git a/include/linux/sed-opal.h b/include/linux/sed-opal.h index 04b124fca51e..b38dc602cae3 100644 --- a/include/linux/sed-opal.h +++ b/include/linux/sed-opal.h @@ -47,6 +47,7 @@ static inline bool is_sed_ioctl(unsigned int cmd) case IOC_OPAL_ENABLE_DISABLE_MBR: case IOC_OPAL_ERASE_LR: case IOC_OPAL_SECURE_ERASE_LR: + case IOC_OPAL_MBR_STATUS: return true; } return false; diff --git a/include/uapi/linux/sed-opal.h b/include/uapi/linux/sed-opal.h index 627624d35030..0cb9890cdc04 100644 --- a/include/uapi/linux/sed-opal.h +++ b/include/uapi/linux/sed-opal.h @@ -116,5 +116,6 @@ struct opal_mbr_data { #define IOC_OPAL_ENABLE_DISABLE_MBR _IOW('p', 229, struct opal_mbr_data) #define IOC_OPAL_ERASE_LR _IOW('p', 230, struct opal_session_info) #define IOC_OPAL_SECURE_ERASE_LR _IOW('p', 231, struct opal_session_info) +#define IOC_OPAL_MBR_STATUS _IOW('p', 232, struct opal_mbr_data) #endif /* _UAPI_SED_OPAL_H */ -- 2.20.1