Received: by 2002:ac0:8c9a:0:0:0:0:0 with SMTP id r26csp908354ima; Fri, 1 Feb 2019 12:56:54 -0800 (PST) X-Google-Smtp-Source: ALg8bN6vKUSo84OfbwDF0p5zY45OlSdgcrKZ2TPJFGchEXmeg1emxYgD3ThJGqjotnbnzrckhTJ9 X-Received: by 2002:a62:36c1:: with SMTP id d184mr41196138pfa.242.1549054614723; Fri, 01 Feb 2019 12:56:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549054614; cv=none; d=google.com; s=arc-20160816; b=ZrjZfYlZliWx8D5GVlzBxVYL46BKtwsSZIlk0HW1Wp8jDbSHjeGBgexbonhq+rFmou 9oNkbRStNDKrd/NIv2Je4WGF8HYpHQGroq+6pimusdo9BTD4PwUmeCmpeuVihowcjiVv GuWrQO9ffQ1hASZa+kuLbbtEt3jEOuz9ktD4ZA9jpdtPTk+2AU98HOzpiHy/NH75mZ5k BHkd8QtKF4+M8L8bsbii9q9sgwlvta/+vOTVf7j37rEPTir3w/9OSGZXREwToqtvPZ/S u57pSQTyDBYzDX9pCpgJC8nTrAeQWXetRSrRGOpknzrk8d+ePwUirPYBznqMie0FiYI8 +gyw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-filter:dkim-signature; bh=mpS2jFxkjw3h1uFS0n9dMbrTC1cyGakeTQAXErAuyGQ=; b=AdoeMboZv/c8jclDojqwLLiMaCiTtNPEpkjBPT7w3aXd6e/uWckXXNQDEs8U4WI9v+ /r/xKsVQz1X+/ISOKDwVbXWgFtAeLSgagSRJvGxwICuupEIXcxYg0CvqDElg+Ve73R81 lTibEN0CfkxQm/VgumXR+t4Elr+wSZOvYIyAcsyiNbECg9bLMPkptQIAdfHvQI9F1tmc an7DoyAGC6SO4E2XFRWjkXq+aSbaaRz5VAY4WV5SMBQTSiKdjF0qU0G2uBfUDuJuvvhq 0Qq13S9k5OJOvCS61ZYGvB2O0UBshCU5vfIq0HbKYtOn3nQ53KuYv28Y4n1nGu+btwZq kxdw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@fjfi.cvut.cz header.s=20151024 header.b=J2slrDUG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 14si3356628pgo.511.2019.02.01.12.56.39; Fri, 01 Feb 2019 12:56:54 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@fjfi.cvut.cz header.s=20151024 header.b=J2slrDUG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730864AbfBAUvo (ORCPT + 99 others); Fri, 1 Feb 2019 15:51:44 -0500 Received: from mailgw1.fjfi.cvut.cz ([147.32.9.3]:33810 "EHLO mailgw1.fjfi.cvut.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730784AbfBAUvl (ORCPT ); Fri, 1 Feb 2019 15:51:41 -0500 Received: from localhost (localhost [127.0.0.1]) by mailgw1.fjfi.cvut.cz (Postfix) with ESMTP id 89CD2AD13F; Fri, 1 Feb 2019 21:51:39 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fjfi.cvut.cz; s=20151024; t=1549054299; i=@fjfi.cvut.cz; bh=mpS2jFxkjw3h1uFS0n9dMbrTC1cyGakeTQAXErAuyGQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References; b=J2slrDUG4XnmZl5zKuk1HoYltbYlJGtbr+tK8MEAjRmPHiO7DLy5YGDxMP+mY9sPm LidRwcd1QXdNeDU6NJ27HuCwxIHulMKEWIv1oAkpFR7xyzZTGLLL6nfYOhgOlawdZp dXljMorq/u/NVeQeK8m0b7Tdp968E0nJo6LgZucI= X-CTU-FNSPE-Virus-Scanned: amavisd-new at fjfi.cvut.cz Received: from mailgw1.fjfi.cvut.cz ([127.0.0.1]) by localhost (mailgw1.fjfi.cvut.cz [127.0.0.1]) (amavisd-new, port 10022) with ESMTP id UbJu48C-dS6K; Fri, 1 Feb 2019 21:51:34 +0100 (CET) Received: from linux.fjfi.cvut.cz (linux.fjfi.cvut.cz [147.32.5.111]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mailgw1.fjfi.cvut.cz (Postfix) with ESMTPS id CE68EAD125; Fri, 1 Feb 2019 21:50:52 +0100 (CET) DKIM-Filter: OpenDKIM Filter v2.11.0 mailgw1.fjfi.cvut.cz CE68EAD125 Received: by linux.fjfi.cvut.cz (Postfix, from userid 1001) id A66946004E; Fri, 1 Feb 2019 21:50:52 +0100 (CET) From: David Kozub To: Jens Axboe , Jonathan Derrick , Scott Bauer , linux-block@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Jonas Rabenstein Subject: [PATCH v4 10/16] block: sed-opal: add ioctl for done-mark of shadow mbr Date: Fri, 1 Feb 2019 21:50:17 +0100 Message-Id: <1549054223-12220-11-git-send-email-zub@linux.fjfi.cvut.cz> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1549054223-12220-1-git-send-email-zub@linux.fjfi.cvut.cz> References: <1549054223-12220-1-git-send-email-zub@linux.fjfi.cvut.cz> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jonas Rabenstein Enable users to mark the shadow mbr as done without completely deactivating the shadow mbr feature. This may be useful on reboots, when the power to the disk is not disconnected in between and the shadow mbr stores the required boot files. Of course, this saves also the (few) commands required to enable the feature if it is already enabled and one only wants to mark the shadow mbr as done. Signed-off-by: Jonas Rabenstein Reviewed-by: Scott Bauer --- block/sed-opal.c | 33 +++++++++++++++++++++++++++++++-- include/linux/sed-opal.h | 1 + include/uapi/linux/sed-opal.h | 1 + 3 files changed, 33 insertions(+), 2 deletions(-) diff --git a/block/sed-opal.c b/block/sed-opal.c index 4b0a63b9d7c9..e03838cfd31b 100644 --- a/block/sed-opal.c +++ b/block/sed-opal.c @@ -1996,13 +1996,39 @@ static int opal_erase_locking_range(struct opal_dev *dev, static int opal_enable_disable_shadow_mbr(struct opal_dev *dev, struct opal_mbr_data *opal_mbr) { + u8 token = opal_mbr->enable_disable == OPAL_MBR_ENABLE + ? OPAL_TRUE : OPAL_FALSE; const struct opal_step mbr_steps[] = { { opal_discovery0, }, { start_admin1LSP_opal_session, &opal_mbr->key }, - { set_mbr_done, &opal_mbr->enable_disable }, + { set_mbr_done, &token }, { end_opal_session, }, { start_admin1LSP_opal_session, &opal_mbr->key }, - { set_mbr_enable_disable, &opal_mbr->enable_disable }, + { set_mbr_enable_disable, &token }, + { end_opal_session, }, + { NULL, } + }; + int ret; + + if (opal_mbr->enable_disable != OPAL_MBR_ENABLE && + opal_mbr->enable_disable != OPAL_MBR_DISABLE) + return -EINVAL; + + mutex_lock(&dev->dev_lock); + setup_opal_dev(dev, mbr_steps); + ret = next(dev); + mutex_unlock(&dev->dev_lock); + return ret; +} + +static int opal_mbr_status(struct opal_dev *dev, struct opal_mbr_data *opal_mbr) +{ + u8 token = opal_mbr->enable_disable == OPAL_MBR_ENABLE + ? OPAL_TRUE : OPAL_FALSE; + const struct opal_step mbr_steps[] = { + { opal_discovery0, }, + { start_admin1LSP_opal_session, &opal_mbr->key }, + { set_mbr_done, &token }, { end_opal_session, }, { NULL, } }; @@ -2349,6 +2375,9 @@ int sed_ioctl(struct opal_dev *dev, unsigned int cmd, void __user *arg) case IOC_OPAL_ENABLE_DISABLE_MBR: ret = opal_enable_disable_shadow_mbr(dev, p); break; + case IOC_OPAL_MBR_STATUS: + ret = opal_mbr_status(dev, p); + break; case IOC_OPAL_ERASE_LR: ret = opal_erase_locking_range(dev, p); break; diff --git a/include/linux/sed-opal.h b/include/linux/sed-opal.h index 04b124fca51e..b38dc602cae3 100644 --- a/include/linux/sed-opal.h +++ b/include/linux/sed-opal.h @@ -47,6 +47,7 @@ static inline bool is_sed_ioctl(unsigned int cmd) case IOC_OPAL_ENABLE_DISABLE_MBR: case IOC_OPAL_ERASE_LR: case IOC_OPAL_SECURE_ERASE_LR: + case IOC_OPAL_MBR_STATUS: return true; } return false; diff --git a/include/uapi/linux/sed-opal.h b/include/uapi/linux/sed-opal.h index 627624d35030..0cb9890cdc04 100644 --- a/include/uapi/linux/sed-opal.h +++ b/include/uapi/linux/sed-opal.h @@ -116,5 +116,6 @@ struct opal_mbr_data { #define IOC_OPAL_ENABLE_DISABLE_MBR _IOW('p', 229, struct opal_mbr_data) #define IOC_OPAL_ERASE_LR _IOW('p', 230, struct opal_session_info) #define IOC_OPAL_SECURE_ERASE_LR _IOW('p', 231, struct opal_session_info) +#define IOC_OPAL_MBR_STATUS _IOW('p', 232, struct opal_mbr_data) #endif /* _UAPI_SED_OPAL_H */ -- 2.20.1