1/*******************************************************************************
2*Copyright (c) 2014 PMC-Sierra, Inc.  All rights reserved.
3*
4*Redistribution and use in source and binary forms, with or without modification, are permitted provided
5*that the following conditions are met:
6*1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
7*following disclaimer.
8*2. Redistributions in binary form must reproduce the above copyright notice,
9*this list of conditions and the following disclaimer in the documentation and/or other materials provided
10*with the distribution.
11*
12*THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED
13*WARRANTIES,INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
14*FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
15*FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
16*NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
17*BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
18*LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
19*SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE
20*
21* $FreeBSD$
22*
23*******************************************************************************/
24/*******************************************************************************
25**
26** Version Control Information:
27**
28**  $Revision: 113920 $
29**  $Author: mcleanda $
30**  $Date: 2012-05-08 11:30:44 -0700 (Tue, 08 May 2012) $
31**  $Id: lxencrypt.c 113920 2012-05-08 18:30:44Z mcleanda $
32**
33*******************************************************************************/
34
35#include <dev/pms/RefTisa/tisa/sassata/common/tdioctl.h>
36#include <dev/pms/RefTisa/tisa/api/titypes.h>
37
38#include <dev/pms/freebsd/driver/common/lxencrypt.h>
39#include <sys/param.h>
40#include <sys/queue.h>
41#include <vm/uma.h>
42
43
44static atomic_t ioerr_queue_count;
45#ifdef ENCRYPT_ENHANCE
46/******************************************************************************
47careful_write():
48
49Purpose:
50Parameters:
51Return:
52Note:
53******************************************************************************/
54static int
55careful_write(char *buf, int offset, int max, const char *fmt, ...)
56{
57    static char s[PAGE_SIZE]; /* Assumes serialization */
58    va_list args;
59    int i;
60
61    if(offset > max)
62        return 0;
63    s[PAGE_SIZE - 1] = '\0';
64
65    va_start(args, fmt);
66    i = vsnprintf(s, PAGE_SIZE - 1, fmt, args);
67    if((offset + i) > max)
68        return 0;
69    memcpy(buf + offset, s, i);
70    va_end(args);
71
72    return i;
73}
74
75/******************************************************************************
76set_dek_table_entry():
77
78Purpose:
79Parameters:
80Return:
81Note:
82******************************************************************************/
83static inline int
84set_dek_table_entry(struct device *dev, const char *buf, size_t len, dek_table_e table)
85{
86    int index;
87    struct Scsi_Host *shost = class_to_shost(dev);
88    struct agtiapi_softc *pCard = (struct agtiapi_softc *) shost->hostdata;
89
90    /* Check permissions */
91    if(!capable(CAP_SYS_ADMIN))
92        return -EACCES;
93
94    if(!pCard->encrypt)
95        return -EINVAL;
96
97    if(table != DEK_TABLE_0 && table != DEK_TABLE_1)
98        return -EINVAL;
99
100    sscanf(buf, "%d", &index);
101    if(index >= 0 && index < DEK_MAX_TABLE_ITEMS) {
102        pCard->dek_index[table] = index;
103        return strlen(buf);
104    }
105    return -EINVAL;
106}
107
108/******************************************************************************
109set_dek_table_entry0():
110
111Purpose:
112Parameters:
113Return:
114Note:
115******************************************************************************/
116ssize_t
117set_dek_table_entry0(struct device *dev, struct device_attribute *attr, const char *buf, size_t len)
118{
119    return set_dek_table_entry(dev, buf, len, DEK_TABLE_0);
120}
121
122/******************************************************************************
123set_dek_table_entry1():
124
125Purpose:
126Parameters:
127Return:
128Note:
129******************************************************************************/
130ssize_t
131set_dek_table_entry1(struct device *dev, struct device_attribute *attr, const char *buf, size_t len)
132{
133    return set_dek_table_entry(dev, buf, len, DEK_TABLE_1);
134}
135
136
137/******************************************************************************
138show_dek_table_entry():
139
140Purpose:
141Parameters:
142Return:
143Note:
144******************************************************************************/
145static inline int
146show_dek_table_entry(struct device *dev, char *buf, unsigned int table)
147{
148    int i = 0, j;
149    unsigned char *p;
150    struct Scsi_Host *sh = class_to_shost(dev);
151    ag_card_t *pCard = (ag_card_t *) sh->hostdata;
152    ag_card_info_t *pCardInfo = pCard->pCardInfo;
153    ag_resource_info_t *pRscInfo = &pCardInfo->tiRscInfo;
154    tiEncryptDekBlob_t *pDekTable = NULL;
155
156    if(!pCard->encrypt)
157        return -EINVAL;
158
159    if(table == DEK_TABLE_0)
160        pDekTable = pRscInfo->tiLoLevelResource.loLevelMem.mem[DEK_MEM_INDEX_1].virtPtr;
161    else if(table == DEK_TABLE_1)
162        pDekTable = pRscInfo->tiLoLevelResource.loLevelMem.mem[DEK_MEM_INDEX_2].virtPtr;
163    if(pDekTable == NULL)
164        return -EINVAL;
165
166    if(pCard->dek_index[table] >= 0 || pCard->dek_index[table] < DEK_MAX_TABLE_ITEMS) {
167        i += careful_write(buf, i, PAGE_SIZE, "%4d: ", pCard->dek_index[table]);
168        p = (unsigned char *) &pDekTable[pCard->dek_index[table]];
169        for(j = 0; j < sizeof(tiEncryptDekBlob_t); j++) {
170            i += careful_write(buf, i, PAGE_SIZE, "%02x", p[j]);
171        }
172        i += careful_write(buf, i, PAGE_SIZE, "\n");
173    } else {
174        i += careful_write(buf, i, PAGE_SIZE, "Bad DEK index %d; range: 0 - %d\n", pCard->dek_index[table], DEK_MAX_TABLE_ITEMS);
175    }
176
177    /* BUG if we return more than a single page of data */
178    //BUG_ON(i > PAGE_SIZE);
179    if (i > PAGE_SIZE)
180        i = PAGE_SIZE;
181
182    return i;
183}
184
185/******************************************************************************
186show_dek_table_entry0():
187
188Purpose:
189Parameters:
190Return:
191Note:
192******************************************************************************/
193ssize_t
194show_dek_table_entry0(struct device *dev, struct device_attribute *attr, char *buf)
195{
196    return show_dek_table_entry(dev, buf, DEK_TABLE_0);
197}
198
199/******************************************************************************
200show_dek_table_entry1():
201
202Purpose:
203Parameters:
204Return:
205Note:
206******************************************************************************/
207ssize_t
208show_dek_table_entry1(struct device *dev, struct device_attribute *attr, char *buf)
209{
210    return show_dek_table_entry(dev, buf, DEK_TABLE_1);
211}
212
213/******************************************************************************
214show_kek_table():
215
216Purpose:
217Parameters:
218Return:
219Note:
220******************************************************************************/
221ssize_t
222show_kek_table(struct device *dev, struct device_attribute *attr, char *buf)
223{
224    int i = 0, j, kek_index;
225    unsigned char *p;
226    struct Scsi_Host *sh = class_to_shost(dev);
227    ag_card_t *pCard = (ag_card_t *) sh->hostdata;
228
229    if(!pCard->encrypt)
230        return -EINVAL;
231
232    for(kek_index = 0; kek_index < KEK_TABLE_MAX_ENTRY; kek_index++) {
233        i += careful_write(buf, i, PAGE_SIZE, " %4d: %08x ", kek_index, pCard->kek_table[kek_index].wrapperIndex);
234        p = (unsigned char *) &pCard->kek_table[kek_index].kekBlob;
235        for(j = 0; j < sizeof(tiEncryptKekBlob_t); j++) {
236            i += careful_write(buf, i, PAGE_SIZE, "%02x", p[j]);
237        }
238        i += careful_write(buf, i, PAGE_SIZE, "\n");
239    }
240    i += careful_write(buf, i, PAGE_SIZE, "\n");
241
242    /* BUG if we return more than a single page of data */
243    //BUG_ON(i > PAGE_SIZE);
244    if (i > PAGE_SIZE)
245        i = PAGE_SIZE;
246
247    return i;
248}
249
250/******************************************************************************
251show_dek_kek_map():
252
253Purpose:
254Parameters:
255Return:
256Note:
257******************************************************************************/
258static inline int
259show_dek_kek_map(struct device *dev, char *buf, unsigned int table)
260{
261    int i = 0, dek_index;
262    struct Scsi_Host *sh = class_to_shost(dev);
263    ag_card_t *pCard = (ag_card_t *) sh->hostdata;
264
265    if(!pCard->encrypt)
266        return -EINVAL;
267
268    if(table != DEK_TABLE_0 && table != DEK_TABLE_1)
269        return -EINVAL;
270
271    i += careful_write(buf, i, PAGE_SIZE, "Table %d\n", table);
272    i += careful_write(buf, i, PAGE_SIZE, "=======\n");
273    for(dek_index = 0; dek_index < DEK_MAX_TABLE_ITEMS; dek_index++) {
274        i += careful_write(buf, i, PAGE_SIZE, " %4d: %08x\n", dek_index, pCard->dek_kek_map[table][dek_index].kekIndex);
275    }
276    i += sprintf(buf + i, "\n");
277
278    /* BUG if we return more than a single page of data */
279    //BUG_ON(i > PAGE_SIZE);
280    if (i > PAGE_SIZE)
281        i = PAGE_SIZE;
282
283    return i;
284}
285
286/******************************************************************************
287show_dek_kek_map0():
288
289Purpose:
290Parameters:
291Return:
292Note:
293******************************************************************************/
294ssize_t
295
296show_dek_kek_map0(struct device *dev, struct device_attribute *attr, char *buf)
297{
298    return show_dek_kek_map(dev, buf, 0);
299}
300
301/******************************************************************************
302show_dek_kek_map1():
303
304Purpose:
305Parameters:
306Return:
307Note:
308******************************************************************************/
309ssize_t
310show_dek_kek_map1(struct device *dev, struct device_attribute *attr, char *buf)
311{
312    return show_dek_kek_map(dev, buf, 1);
313}
314
315/******************************************************************************
316show_target_dek_map():
317
318Purpose:
319Parameters:
320Return:
321Note:
322******************************************************************************/
323ssize_t
324show_target_dek_map(struct device *dev, struct device_attribute *attr, char *buf)
325{
326    int i = 0;
327    unsigned int chan, device, lun = 0;
328    ag_encrypt_map_t *p;
329    struct list_head *lh;
330    struct Scsi_Host *sh = class_to_shost(dev);
331    ag_card_t *pCard = (ag_card_t *) sh->hostdata;
332
333    if(!pCard->encrypt)
334        return -EINVAL;
335
336    for(chan = 0; chan <= AGTIAPI_MAX_CHANNEL_NUM; chan++) {
337        for(device = 0; device < pCard->devDiscover; device++) {
338#ifdef REPORT_ALL_LUNS
339            for(lun = 0; lun < AGTIAPI_MAX_LUN; lun++) {
340#endif
341                lh = MAP_TABLE_ENTRY(pCard, chan, device, lun);
342                if(lh) {
343                    list_for_each_entry(p, lh, list) {
344                        if(p->dekIndex != DEK_INDEX_INVALID)
345                            i += careful_write(buf, i, PAGE_SIZE, " %u:%u:%u: %x %8x %8x %16lx %16lx %08x:%08x %1x\n", chan, device, lun, p->dekTable, p->dekIndex, p->kekIndex, p->lbaMin, p->lbaMax, p->keyTag[1], p->keyTag[0], p->keyTagCheck);
346                    }
347                }
348#ifdef REPORT_ALL_LUNS
349            }
350#endif
351        }
352    }
353
354    if (i > PAGE_SIZE)
355        i = PAGE_SIZE;
356
357    return i;
358}
359
360
361/******************************************************************************
362agtiapi_AddDek():
363
364Purpose:
365Parameters:
366Return:
367Note:
368******************************************************************************/
369static int
370agtiapi_AddDek(ag_card_t *pCard, bit32 dek_table, bit32 dek_index, bit32 blob_format, bit32 entry_sz, tiEncryptDekBlob_t *dek_blob, U32_64 *addr)
371{
372    ag_resource_info_t *pRscInfo = &pCard->pCardInfo->tiRscInfo;
373    tiEncryptDekBlob_t *pDekTable;
374    char *p;
375
376    if (dek_index >= DEK_MAX_TABLE_ITEMS) {
377        printf("%s: Bad dek index 0x%x (MAX: 0x%x).\n", __FUNCTION__, dek_index, DEK_MAX_TABLE_ITEMS);
378        return -E_DEK_INDEX;
379    }
380
381    switch(dek_table) {
382        case DEK_TABLE_0:
383            pDekTable = pRscInfo->tiLoLevelResource.loLevelMem.mem[DEK_MEM_INDEX_1].virtPtr;
384            break;
385        case DEK_TABLE_1:
386            pDekTable = pRscInfo->tiLoLevelResource.loLevelMem.mem[DEK_MEM_INDEX_2].virtPtr;
387            break;
388        default:
389            printf("%s: Unknown dek table %d\n", __FUNCTION__, dek_table);
390            return -E_DEK_TABLE;
391    }
392
393    #ifdef __VMKLNX__
394        *addr = (U32_64) __pa(&pDekTable[0]);
395    #else
396        *addr = (U32_64) virt_to_phys(&pDekTable[0]);
397    #endif
398
399    p = (char *) &pDekTable[0] + (dek_index * pCard->dek_size);
400
401    printf("%s: Base: %p, Index: %08x, Virt: %p Size: %d\n", __FUNCTION__, pDekTable, dek_index, &pDekTable[dek_index], pCard->dek_size);
402    memcpy(p, dek_blob, pCard->dek_size);
403    wmb();
404
405    /* Flush entry */
406    ostiCacheFlush(&pCard->tiRoot, NULL, p, pCard->dek_size);
407
408    return 0;
409}
410
411/******************************************************************************
412agtiapi_MapDekKek():
413
414Purpose:
415Parameters:
416Return:
417Note:
418******************************************************************************/
419static int
420agtiapi_MapDekKek(ag_card_t *pCard, bit32 dek_table, bit32 dek_index, bit32 kek_index)
421{
422    if (dek_index >= DEK_MAX_TABLE_ITEMS) {
423        printf("%s: Bad dek index 0x%x (MAX: 0x%x).\n", __FUNCTION__, dek_index, DEK_MAX_TABLE_ITEMS);
424        return -E_DEK_INDEX;
425    }
426
427    if (dek_table >= DEK_MAX_TABLES) {
428        printf("%s: Bad dek table.\n", __FUNCTION__);
429        return -E_DEK_TABLE;
430    }
431
432    if (kek_index >= KEK_TABLE_MAX_ENTRY) {
433        printf("%s: Bad kek index.\n", __FUNCTION__);
434        return -E_KEK_INDEX;
435    }
436
437    pCard->dek_kek_map[dek_table][dek_index].kekIndex = kek_index;
438    return 0;
439}
440
441/******************************************************************************
442agtiapi_AddKek():
443
444Purpose:
445Parameters:
446Return:
447Note:
448******************************************************************************/
449static int
450agtiapi_AddKek(ag_card_t *pCard, bit32 kek_index, bit32 wrapper_kek_index, tiEncryptKekBlob_t *kek_blob)
451{
452    if (kek_index >= KEK_TABLE_MAX_ENTRY) {
453        printf("%s: Bad kek index.\n", __FUNCTION__);
454        return -E_KEK_INDEX;
455    }
456    if (wrapper_kek_index >= KEK_TABLE_MAX_ENTRY) {
457        printf("%s: Bad kek wrapper index.\n", __FUNCTION__);
458        return -E_KEK_INDEX;
459    }
460    pCard->kek_table[kek_index].wrapperIndex = wrapper_kek_index;
461    memcpy(&pCard->kek_table[kek_index].kekBlob, kek_blob, sizeof(tiEncryptKekBlob_t));
462    return 0;
463}
464
465/******************************************************************************
466agtiapi_MapDek():
467
468Purpose:
469Parameters:
470Return:
471Note:
472******************************************************************************/
473static int
474agtiapi_MapDek(ag_card_t *pCard, EncryptDeviceDekMap_t *dek_map)
475{
476    int found = 0;
477    bit32 chan, device, lun;
478    bit32 dek_table, dek_index, kek_index;
479    unsigned long long lba_min, lba_max;
480    ag_encrypt_map_t *p, *n;
481    struct list_head *lh;
482
483    chan = dek_map->channel;
484    device = dek_map->device;
485    lun = dek_map->lun;
486
487    lba_min = dek_map->dekMapEntry[0].startLBA;
488    lba_max = dek_map->dekMapEntry[0].endLBA;
489
490    dek_table = dek_map->dekMapEntry[0].dek.dekTable;
491    dek_index = dek_map->dekMapEntry[0].dek.dekIndex;
492
493    /* Sanity check channel, device, lun */
494    if (chan > AGTIAPI_MAX_CHANNEL_NUM) {
495        printf("%s: Bad channel %d.\n", __FUNCTION__, chan);
496        return -E_CHANNEL_INDEX;
497    }
498    if (device >= pCard->devDiscover) {
499        printf("%s: Bad device %d.\n", __FUNCTION__, device);
500        return -E_DEVICE_INDEX;
501    }
502    if (lun >= AGTIAPI_MAX_LUN) {
503        printf("%s: Bad lun %d.\n", __FUNCTION__, lun);
504        return -E_LUN_INDEX;
505    }
506
507    /* Sanity check dek index */
508    if (dek_index >= DEK_MAX_TABLE_ITEMS) {
509        printf("%s: Bad dek index 0x%x (MAX: 0x%x).\n", __FUNCTION__, dek_index, DEK_MAX_TABLE_ITEMS);
510        return -E_DEK_INDEX;
511    }
512
513    /* Sanity check dek table */
514    if (dek_table >= DEK_MAX_TABLES) {
515        printf("%s: Bad dek table %d.\n", __FUNCTION__, dek_table);
516        return -E_DEK_TABLE;
517    }
518
519    /* Check that lba min and lba max are sane */
520    if (lba_min >= lba_max) {
521        printf("%s: Bad lba min and lba max: %llx %llx.\n", __FUNCTION__, lba_min, lba_max);
522        return -E_LBA_RANGE;
523    }
524
525    /* dek_table and dek_index are valid, look up kek */
526    kek_index = pCard->dek_kek_map[dek_table][dek_index].kekIndex;
527
528    lh = MAP_TABLE_ENTRY(pCard, chan, device, lun);
529
530    if (dek_map->dekMapEntry[0].flags & ENCRYPT_DEK_MAP_ENTRY_CLEAR) {
531        /* Delete the entry */
532        found = 0;
533        list_for_each_entry_safe(p, n, lh, list) {
534            if (p->lbaMin   == lba_min   &&
535                p->lbaMax   == lba_max   &&
536                p->dekTable == dek_table &&
537                p->dekIndex == dek_index &&
538                p->kekIndex == kek_index) {
539                /* Entry found, unlink and reclaim it */
540                found = 1;
541                list_del(&p->list);
542                mempool_free(p, pCard->map_mempool);
543            }
544        }
545        if (!found) {
546            printf("%s: Entry %x %x %x %llx %llx not found.\n", __FUNCTION__, dek_table, dek_index, kek_index, lba_min, lba_max);
547            return -E_NOT_FOUND;
548        }
549    } else if (dek_map->dekMapEntry[0].flags & ENCRYPT_DEK_MAP_ENTRY_VALID) {
550        /* Add the entry */
551
552          p = (ag_encrypt_map_t *)uma_zalloc(pCard->map_cache, M_WAITOK); //Encryption
553        if (!p) {
554            printf("%s: Unable to allocate from memory pool.\n", __FUNCTION__);
555            return -E_MEMPOOL_ALLOC;
556        }
557
558        /* Populate it */
559        p->lbaMin = lba_min;
560        p->lbaMax = lba_max;
561        p->dekTable = dek_table;
562        p->dekIndex = dek_index;
563        p->kekIndex = kek_index;
564        p->keyTagCheck = dek_map->keytag_check;
565        memcpy(&p->keyTag, &dek_map->keytag, sizeof(p->keyTag));
566
567        /* Test to see if this new mapping overlaps an existing mapping */
568        list_for_each_entry(n, lh, list) {
569            /*
570             * Check if the start lba falls in existing range ||
571             * Check if the end lba falls in existing range   ||
572             * Check if the start lba of the existing range falls in the new range
573             */
574            if (((p->lbaMin >= n->lbaMin) && (p->lbaMin <= n->lbaMax)) ||
575                ((p->lbaMax >= n->lbaMin) && (p->lbaMax <= n->lbaMax)) ||
576                ((n->lbaMin >= p->lbaMin) && (n->lbaMin <= p->lbaMax))) {
577                printf("%s: WARNING: New entry lba range overlap: %llx - %llx vs %llx - %llx.\n", __FUNCTION__, p->lbaMin, p->lbaMax, n->lbaMin, n->lbaMax);
578            }
579        }
580
581        /* Link it in to list at the head so it takes precedence */
582        list_add(&p->list, lh);
583
584        /* TODO: Decide if/how to refcount each dek/kek index used by the mapping */
585
586    } else {
587        printf("%s: Bad flags %08x\n", __FUNCTION__, dek_map->dekMapEntry[0].flags);
588        return -E_FLAGS;
589    }
590
591    return 0;
592}
593#endif
594#ifdef HIALEAH_ENCRYPTION
595/******************************************************************************
596agtiapi_SetupEncryption():
597
598Purpose:
599Parameters:
600Return:
601Note:
602******************************************************************************/
603int
604agtiapi_SetupEncryption(struct agtiapi_softc *pCard)
605{
606  tiRoot_t *tiRoot = (tiRoot_t *) &pCard->tiRoot;
607  bit32 status = tiSuccess;
608  printf("agtiapi_SetupEncryption: HIALEAH_ENCRYPTION\n");
609  if (pCard->encrypt == agTRUE)
610  {
611    status = tiCOMEncryptGetInfo(tiRoot);
612    printf("agtiapi_SetupEncryption: HIALEAH_ENCRYPTION tiCOMEncryptGetInfo Status 0x%x\n",status);
613
614    if(status == 1 )
615    {
616        status = tiCOMEncryptHilSet(tiRoot );
617        if (status) {
618            pCard->encrypt = agFALSE;
619            printf("agtiapi_SetupEncryption: HIALEAH_ENCRYPTION not set\n");
620        }
621    }
622  }
623    return 0;
624}
625#ifdef ENCRYPT_ENHANCE
626/******************************************************************************
627agtiapi_SetupEncryptionPools():
628
629Purpose:
630Parameters:
631Return:
632Note:
633******************************************************************************/
634int
635agtiapi_SetupEncryptionPools(struct agtiapi_softc *pCard)
636{
637    /* Configure encryption memory pool */
638    memset(pCard->map_cache_name, 0, sizeof(pCard->map_cache_name));
639    snprintf(pCard->map_cache_name, sizeof(pCard->map_cache_name) - 1, "map_cache_%d", pCard->cardNo);
640
641//zone allocation
642     pCard->map_cache = uma_zcreate(pCard->map_cache_name, sizeof(ag_encrypt_map_t),NULL, NULL, NULL, NULL, 0, 0);
643    if(!pCard->map_cache) {
644        /*
645         * This error may be due to an existing cache in the kernel
646         * from an earlier kmem_cache that wasn't properly freed
647         */
648        printf("Unable to create uma_zcreate cache for encryption map mempool.\n");
649        return -EFAULT;
650    }
651    uma_zone_set_max(pCard->map_cache, ENCRYPTION_MAP_MEMPOOL_SIZE);
652
653
654    /* Configure encryption IO error pool */
655    INIT_LIST_HEAD(&pCard->ioerr_queue);
656/*#if (LINUX_VERSION_CODE < KERNEL_VERSION(2,6,34)) // ####
657    pCard->ioerr_queue_lock = SPIN_LOCK_UNLOCKED;
658#else */
659    pCard->ioerr_queue_lock = AG_SPIN_UNLOCK(pCard->ioerr_queue_lock);
660//#endif
661
662
663    memset(pCard->ioerr_cache_name, 0, sizeof(pCard->ioerr_cache_name));
664    snprintf(pCard->ioerr_cache_name, sizeof(pCard->ioerr_cache_name) - 1, "ioerr_cache_%d", pCard->cardNo);
665
666    pCard->ioerr_cache = uma_zcreate(pCard->ioerr_cache_name, sizeof(ag_encrypt_ioerr_t), NULL, NULL, NULL, NULL, 0, 0);
667    if(!pCard->ioerr_cache) {
668        /*
669         * This error may be due to an existing cache in the kernel
670         * from an earlier kmem_cache that wasn't properly freed
671         */
672        printf("Unable to create kmem cache for encryption IO error mempool.\n");
673        return -EFAULT;
674    }
675    uma_zone_set_max(pCard->ioerr_cache,  ENCRYPTION_IO_ERR_MEMPOOL_SIZE);
676
677    /* Set cipher mode to something invalid */
678    pCard->cipher_mode = CIPHER_MODE_INVALID;
679
680    return 0;
681}
682#endif
683/******************************************************************************
684agtiapi_CleanupEncryption():
685
686Purpose:
687Parameters:
688Return:
689Note:
690******************************************************************************/
691void
692agtiapi_CleanupEncryption(struct agtiapi_softc *pCard)
693{
694#ifdef ENCRYPT_ENHANCE
695   if(pCard->encrypt_map) {
696        int chan, device, lun;
697        struct list_head *lh;
698        ag_encrypt_map_t *p, *n;
699
700        for (chan = 0; chan < (AGTIAPI_MAX_CHANNEL_NUM + 1); chan++) {
701            for (device = 0; device < pCard->devDiscover; device++) {
702                for (lun = 0; lun < AGTIAPI_MAX_LUN; lun++) {
703                    lh = MAP_TABLE_ENTRY(pCard, chan, device, lun);
704                    list_for_each_entry_safe(p, n, lh, list) {
705        //                mempool_free(p, pCard->map_mempool);
706                    }
707                }
708            }
709        }
710        vfree(pCard->encrypt_map);
711        pCard->encrypt_map = NULL;
712    }
713#endif
714}
715
716#ifdef ENCRYPT_ENHANCE
717/******************************************************************************
718agtiapi_CleanupEncryptionPools():
719
720Purpose:
721Parameters:
722Return:
723Note:
724******************************************************************************/
725void
726agtiapi_CleanupEncryptionPools(struct agtiapi_softc *pCard)
727{
728    ag_encrypt_ioerr_t *ioerr, *tmp;
729    atomic_set(&ioerr_queue_count);
730
731    /*
732     * TODO: check "outstanding_encrypted_io_count" for non-zero
733     *       and free all mempool items prior to destroying pool
734     */
735
736    /* Clean up memory pools */
737    if (pCard->map_mempool) {
738        mempool_destroy(pCard->map_mempool);
739        printf("Encryption Map mempool released.\n");
740        pCard->map_mempool = NULL;
741    }
742
743    /* Clean up kmem cache */
744    if (pCard->map_cache) {
745        kmem_cache_destroy(pCard->map_cache);
746        printf("Kernel memory cache %s released.\n", pCard->map_cache_name);
747        pCard->map_cache = NULL;
748    }
749
750    /* Clean up memory pools */
751    list_for_each_entry_safe(ioerr, tmp, &pCard->ioerr_queue, list) {
752        list_del_init(&ioerr->list);
753        mempool_free(ioerr, pCard->ioerr_mempool);
754        atomic_dec(&ioerr_queue_count);
755    }
756
757    if (pCard->ioerr_mempool) {
758        mempool_destroy(pCard->ioerr_mempool);
759        printf("Encryption IO Error mempool released.\n");
760        pCard->ioerr_mempool = NULL;
761    }
762
763    /* Clean up kmem cache */
764    if (pCard->ioerr_cache) {
765        kmem_cache_destroy(pCard->ioerr_cache);
766        printf("Kernel memory cache %s released.\n", pCard->ioerr_cache_name);
767        pCard->ioerr_cache = NULL;
768    }
769}
770
771/******************************************************************************
772agtiapi_EncryptionIoctl():
773
774Purpose:
775Parameters:
776Return:
777Note:
778******************************************************************************/
779int
780agtiapi_EncryptionIoctl(struct agtiapi_softc *pCard, IoctlEncrypt_t *pIoctlPayload)
781{
782    int rv, rc = 0, skip_wait = 0;
783    tiRoot_t *tiRoot = (tiRoot_t *) &pCard->tiRoot;
784    IoctlTISAEncrypt_t *ioctl_data = &pIoctlPayload->body;
785    pIoctlPayload->hdr.Status = IOCTL_ERR_STATUS_INVALID_CODE;
786    pCard->ioctl_data = (void *) ioctl_data;
787    init_completion(&pCard->ioctl_completion);
788
789    /* Check that the system is quiesced */
790    if (atomic_read(&outstanding_encrypted_io_count) != 0)
791        printf("%s: WARNING: Attempting encryption management update with outstanding encrypted IOs!\n", __FUNCTION__);
792
793printf("%s: Minor %d\n", __FUNCTION__, pIoctlPayload->hdr.MinorFunction);
794    switch(pIoctlPayload->hdr.MinorFunction) {
795        case IOCTL_MN_ENCRYPTION_GET_INFO:
796            {
797                //IoctlEncryptGetInfo_t *get_info = (IoctlEncryptGetInfo_t *) &ioctl_data->request;
798                rc = tiCOMEncryptGetInfo(tiRoot);
799            }
800            break;
801        case IOCTL_MN_ENCRYPTION_SET_MODE:
802            {
803                u32 reg_val = 0, new_cipher_mode = 0;
804                IoctlEncryptSetMode_t *set_mode = (IoctlEncryptSetMode_t *) &ioctl_data->request;
805
806                printf("%s: input %08x\n", __FUNCTION__, set_mode->securityCipherMode);
807
808                /* Set security mode */
809                if(TI_ENCRYPT_SEC_MODE_FACT_INIT)
810                    if(set_mode->securityCipherMode & TI_ENCRYPT_SEC_MODE_FACT_INIT) {
811                        reg_val |= TI_ENCRYPT_SEC_MODE_FACT_INIT;
812                        pCard->dek_size = DEK_SIZE_PLAIN;
813                    }
814                if(set_mode->securityCipherMode & TI_ENCRYPT_SEC_MODE_A) {
815                    reg_val |= TI_ENCRYPT_SEC_MODE_A;
816                    pCard->dek_size = DEK_SIZE_ENCRYPT;
817                } else if(set_mode->securityCipherMode & TI_ENCRYPT_SEC_MODE_B) {
818                    reg_val |= TI_ENCRYPT_SEC_MODE_B;
819                    pCard->dek_size = DEK_SIZE_ENCRYPT;
820                }
821
822                /* Set cipher mode */
823                if(set_mode->securityCipherMode & TI_ENCRYPT_ATTRIB_CIPHER_XTS) {
824                    reg_val |= TI_ENCRYPT_ATTRIB_CIPHER_XTS;
825                    new_cipher_mode = TI_ENCRYPT_MODE_XTS_AES;
826                }
827
828                printf("%s: Setting security cipher mode to: 0x%08x\n", __FUNCTION__, reg_val);
829                pCard->cipher_mode = new_cipher_mode;
830
831                rc = tiCOMEncryptSetMode(tiRoot, reg_val);
832            }
833            break;
834        case IOCTL_MN_ENCRYPTION_KEK_ADD:
835            {
836                tiEncryptKekBlob_t kek_blob;
837                IoctlEncryptKekAdd_t *kek_add = (IoctlEncryptKekAdd_t *) &ioctl_data->request;
838                printf("%s: Add kek at index 0x%x wrapper 0x%x format 0x%x\n", __FUNCTION__, kek_add->kekIndex, kek_add->wrapperKekIndex, kek_add->blobFormat);
839
840                /* Copy kek_blob from user pointer to local buffer */
841                if(access_ok(VERIFY_READ, kek_add->EncryptKekBlob, sizeof(kek_blob))) {
842                    printf("%s: Starting copy from user %p to kernel %p\n", __FUNCTION__, kek_add->EncryptKekBlob, &kek_blob);
843                    if((rv = copy_from_user(&kek_blob, kek_add->EncryptKekBlob, sizeof(kek_blob))) != 0) {
844                        printf("%s: Copy error, %d left\n", __FUNCTION__, rv);
845                        return IOCTL_CALL_FAIL;
846                    }
847                    rc = tiCOMEncryptKekAdd(tiRoot, kek_add->kekIndex, kek_add->wrapperKekIndex, kek_add->blobFormat, &kek_blob);
848
849                    /* Add kek to local kek table (in case of chip reset) */
850                    if(rc == tiSuccess) {
851                        if(agtiapi_AddKek(pCard, kek_add->kekIndex, kek_add->wrapperKekIndex, &kek_blob) < 0) {
852                            return IOCTL_CALL_FAIL;
853                        }
854                    }
855                } else {
856                    return IOCTL_CALL_FAIL;
857                }
858            }
859            break;
860        case IOCTL_MN_ENCRYPTION_DEK_ADD:
861            {
862                tiEncryptDekBlob_t dek_blob; /* Copied in */
863                IoctlEncryptDekAdd_t *dek_add = (IoctlEncryptDekAdd_t *) &ioctl_data->request;
864                bit32 kek_index = dek_add->kekIndex;
865                bit32 dek_index = dek_add->dekIndex;
866                bit32 dek_table = dek_add->dekTable;
867                bit32 blob_format = dek_add->dekBlobFormat;
868                bit32 entry_sz = dek_add->dekTableKeyEntrySize;
869                U32_64 addr = 0;
870                bit32 addr_table[2];
871                memset(addr_table, 0, sizeof(addr_table));
872
873                printf("%s: Add dek at index 0x%x, table %x, kek index %x, blob format %x, entry size %x\n", __FUNCTION__, dek_index, dek_table, kek_index, blob_format, entry_sz);
874
875                /* Copy dek_blob from user pointer to local buffer */
876                if(access_ok(VERIFY_READ, dek_add->dekBlob, sizeof(dek_blob))) {
877                    printf("%s: Starting copy from user %p to kernel %p\n", __FUNCTION__, dek_add->dekBlob, &dek_blob);
878                    if((rv = copy_from_user(&dek_blob, dek_add->dekBlob, sizeof(dek_blob))) != 0) {
879                        printf("%s: Copy error, %d left\n", __FUNCTION__, rv);
880                        return IOCTL_CALL_FAIL;
881                    }
882
883                    /* Add DEK to local table */
884                    if (agtiapi_AddDek(pCard, dek_table, dek_index, blob_format, entry_sz, &dek_blob, &addr) < 0) {
885                        return IOCTL_CALL_FAIL;
886                    }
887                    memcpy(addr_table, &addr, sizeof(addr));
888
889                    /* Add DEK-KEK association in local table */
890                    if (agtiapi_MapDekKek(pCard, dek_table, dek_index, kek_index) < 0) {
891                        return IOCTL_CALL_FAIL;
892                    }
893
894                    /* Push DEK to chip */
895                    rc = tiCOMEncryptDekAdd(tiRoot, kek_index, dek_table, addr_table[1], addr_table[0], dek_index, 1, blob_format, entry_sz);
896                } else {
897                    return IOCTL_CALL_FAIL;
898                }
899            }
900            break;
901        case IOCTL_MN_ENCRYPTION_DEK_INVALID:
902            {
903                IoctlEncryptDekInvalidate_t *dek_to_invalidate = (IoctlEncryptDekInvalidate_t *) &ioctl_data->request;
904                printf("%s: Invalidating dek at index 0x%x, table %x\n", __FUNCTION__, dek_to_invalidate->dek.dekIndex, dek_to_invalidate->dek.dekTable);
905
906                rc = tiCOMEncryptDekInvalidate(tiRoot, dek_to_invalidate->dek.dekTable, dek_to_invalidate->dek.dekIndex);
907                /* TODO: What to do in local tables? Mark it? */
908            }
909            break;
910        case IOCTL_MN_ENCRYPTION_KEK_NVRAM:
911            {
912                rc = tiError;
913            }
914            break;
915        case IOCTL_MN_ENCRYPTION_DEK_ASSIGN:
916            {
917                IoctlEncryptDekMapTable_t *p_dek_map = (IoctlEncryptDekMapTable_t *) &ioctl_data->request;
918
919                /* Fill in host */
920                p_dek_map->dekMap[0].host = (bit32) pCard->pHost->host_no;
921
922                printf("%s: Host %u: Mapping %u:%u:%u (%llx to %llx) to dek at index 0x%x, table %x, keytag %08x:%08x\n", __FUNCTION__, p_dek_map->dekMap[0].host, p_dek_map->dekMap[0].channel, p_dek_map->dekMap[0].device, p_dek_map->dekMap[0].lun, p_dek_map->dekMap[0].dekMapEntry[0].startLBA, p_dek_map->dekMap[0].dekMapEntry[0].endLBA, p_dek_map->dekMap[0].dekMapEntry[0].dek.dekIndex, p_dek_map->dekMap[0].dekMapEntry[0].dek.dekTable, p_dek_map->dekMap[0].keytag[1], p_dek_map->dekMap[0].keytag[0]);
923
924                /* Create a mapping in local tables */
925                if (agtiapi_MapDek(pCard, &p_dek_map->dekMap[0]) < 0) {
926                    pIoctlPayload->hdr.Status = IOCTL_ERR_STATUS_INVALID_CODE;
927                    return IOCTL_CALL_FAIL;
928                }
929
930                rc = tiSuccess;
931                skip_wait = 1;
932                ioctl_data->encryptFunction = encryptSetDekMap;
933                ioctl_data->status = tiSuccess;
934                ioctl_data->subEvent = 0;
935            }
936            break;
937        case IOCTL_MN_ENCRYPTION_ERROR_QUERY:
938            {
939                unsigned long flags, i, query_flag;
940                ag_encrypt_ioerr_t *ioerr, *tmp;
941                IoctlEncryptErrorQuery_t *perr = (IoctlEncryptErrorQuery_t *) &ioctl_data->request;
942
943                printf("%s: query flag %x\n", __FUNCTION__, perr->query_flag);
944                query_flag = perr->query_flag;
945
946                /* initialize */
947                memset(perr, 0, sizeof(IoctlEncryptErrorQuery_t));
948
949error_query_restart:
950                /* Take spinlock */
951              //  spin_lock_irqsave(&pCard->ioerr_queue_lock, flags);
952                AG_SPIN_LOCK_IRQ(&pCard->ioerr_queue_lock, flags);
953
954                /* Walk list */
955                i = 0;
956                list_for_each_entry_safe(ioerr, tmp, &pCard->ioerr_queue, list) {
957                    if (i >= 32)
958                        break;
959
960                    perr->valid_mask |= (1 << i);
961                    memcpy(&perr->error[i], &ioerr->ioerr, sizeof(IoctlEncryptIOError_t));
962                    list_del_init(&ioerr->list);
963                    mempool_free(ioerr, pCard->ioerr_mempool);
964                    i++;
965                    atomic_dec(&ioerr_queue_count);
966                }
967
968                /* Release spinlock */
969             //   spin_unlock_irqrestore(&pCard->ioerr_queue_lock, flags);
970                AG_SPIN_UNLOCK_IRQ(&pCard->ioerr_queue_lock, flags); //for test
971
972                if (!perr->valid_mask) {
973                    /* No encryption IO error events, check flags to see if blocking wait OK */
974                    if (query_flag == ERROR_QUERY_FLAG_BLOCK) {
975                        if (wait_event_interruptible(ioerr_waitq, (atomic_read(&ioerr_queue_count)))) {
976                            /* Awoken by signal */
977                            return IOCTL_CALL_FAIL;
978                        } else {
979                            /* Awoken by IO error */
980                            goto error_query_restart;
981                        }
982                    }
983                }
984                rc = tiSuccess;
985                skip_wait = 1;
986                ioctl_data->encryptFunction = encryptErrorQuery;
987                ioctl_data->status = tiSuccess;
988                ioctl_data->subEvent = 0;
989            }
990            break;
991        default:
992            printf("%s: Unrecognized Minor Function %d\n", __FUNCTION__, pIoctlPayload->hdr.MinorFunction);
993            pIoctlPayload->hdr.Status = IOCTL_ERR_STATUS_INVALID_CODE;
994            return IOCTL_CALL_FAIL;
995            break;
996    }
997
998    /* Demux rc */
999    switch(rc) {
1000        case tiSuccess:
1001            if(!skip_wait)
1002                wait_for_completion(&pCard->ioctl_completion);
1003                /* Maybe: wait_for_completion_timeout() */
1004            pIoctlPayload->hdr.Status = ioctl_data->status;
1005            break;
1006        case tiNotSupported:
1007            pIoctlPayload->hdr.Status = IOCTL_ERR_STATUS_NOT_SUPPORTED;
1008            break;
1009        default:
1010            printf("%s: Status: %d\n", __FUNCTION__, rc);
1011            pIoctlPayload->hdr.Status = IOCTL_ERR_STATUS_INVALID_CODE;
1012            break;
1013    }
1014
1015    printf("%s: Encryption ioctl %d successful.\n", __FUNCTION__, pIoctlPayload->hdr.MinorFunction);
1016    return IOCTL_CALL_SUCCESS;
1017}
1018#endif
1019/******************************************************************************
1020agtiapi_SetupEncryptedIO():
1021
1022Purpose:
1023Parameters:
1024Return:
1025Note:
1026******************************************************************************/
1027int
1028agtiapi_SetupEncryptedIO(struct agtiapi_softc *pCard, ccb_t *pccb, unsigned long long block)
1029{
1030
1031    pCard->cipher_mode = TI_ENCRYPT_ATTRIB_CIPHER_XTS;
1032    /* Check that cipher mode is set properly */
1033    if (pCard->cipher_mode == CIPHER_MODE_INVALID) {
1034        printf("%s: Cipher mode not yet set.\n", __FUNCTION__);
1035        return -E_BAD_CIPHER_MODE;
1036    }
1037
1038    memset(&(pccb->tiSuperScsiRequest.Encrypt), 0, sizeof(pccb->tiSuperScsiRequest.Encrypt));
1039    pccb->tiSuperScsiRequest.Encrypt.keyTagCheck = FALSE;
1040    pccb->tiSuperScsiRequest.Encrypt.encryptMode = pCard->cipher_mode;
1041    pccb->tiSuperScsiRequest.Encrypt.tweakVal_W0 = block;
1042    if(pccb->tiSuperScsiRequest.scsiCmnd.cdb[0] == READ_16 ||
1043	pccb->tiSuperScsiRequest.scsiCmnd.cdb[0] == WRITE_16)
1044    {
1045        pccb->tiSuperScsiRequest.Encrypt.tweakVal_W0 = ((pccb->tiSuperScsiRequest.scsiCmnd.cdb[6] << 24 ) |
1046							   (pccb->tiSuperScsiRequest.scsiCmnd.cdb[7] << 16 ) |
1047							   (pccb->tiSuperScsiRequest.scsiCmnd.cdb[8] <<	8 ) |
1048							   (pccb->tiSuperScsiRequest.scsiCmnd.cdb[9]));
1049    pccb->tiSuperScsiRequest.Encrypt.tweakVal_W1 = ((pccb->tiSuperScsiRequest.scsiCmnd.cdb[2] << 24 ) |
1050							   (pccb->tiSuperScsiRequest.scsiCmnd.cdb[3] << 16 ) |
1051							   (pccb->tiSuperScsiRequest.scsiCmnd.cdb[4] <<	8 ) |
1052							   (pccb->tiSuperScsiRequest.scsiCmnd.cdb[5]));
1053    }
1054    /* Mark IO as valid encrypted IO */
1055    pccb->flags |= ENCRYPTED_IO;
1056    pccb->tiSuperScsiRequest.flags = TI_SCSI_INITIATOR_ENCRYPT;
1057
1058    /* Bump refcount (atomic) */
1059    atomic_inc(&outstanding_encrypted_io_count);
1060    return 0;
1061}
1062
1063/******************************************************************************
1064agtiapi_CleanupEncryptedIO():
1065
1066Purpose:
1067Parameters:
1068Return:
1069Note:
1070******************************************************************************/
1071void
1072agtiapi_CleanupEncryptedIO(struct agtiapi_softc *pCard, ccb_t *pccb)
1073{
1074    if ((pccb->flags & ENCRYPTED_IO)) {
1075        /* Decrement refcount */
1076        atomic_dec(&outstanding_encrypted_io_count);
1077    }
1078    pccb->tiSuperScsiRequest.flags &= ~TI_SCSI_INITIATOR_ENCRYPT;
1079    pccb->flags &= ~ENCRYPTED_IO;
1080}
1081#ifdef ENCRYPT_ENHANCE
1082/******************************************************************************
1083agtiapi_HandleEncryptedIOFailure():
1084
1085Purpose:
1086Parameters:
1087Return:
1088Note:
1089******************************************************************************/
1090void
1091agtiapi_HandleEncryptedIOFailure(ag_device_t *pDev, ccb_t *pccb)
1092{
1093    unsigned long flags, qdepth;
1094    struct scsi_cmnd *cmd;
1095    ag_encrypt_ioerr_t *perr;
1096    ag_card_t *pCard;
1097
1098    cmd = pccb->cmd;
1099    if (!cmd) {
1100        printf("%s: Malformed pccb %p.\n", __FUNCTION__, pccb);
1101        return;
1102    }
1103
1104    pCard = pDev->pCard;
1105
1106    /* Sanity check */
1107    if (!(pccb->flags & ENCRYPTED_IO)) {
1108        printf("%s: Skipping IO %lx: Not Encrypted.\n", __FUNCTION__, cmd->serial_number);
1109        return;
1110    }
1111
1112    /* Check queue depth against max */
1113    qdepth = atomic_read(&ioerr_queue_count);
1114    if (qdepth >= IOERR_QUEUE_DEPTH_MAX) {
1115        printf("%s: Not queueing IO error due to queue full: %lu entries.\n", __FUNCTION__, qdepth);
1116        return;
1117    }
1118
1119    /* Get a container for the ag_encrypt_ioerr_t item from the mempool */
1120//    perr = mempool_alloc(pCard->ioerr_mempool, GFP_ATOMIC);
1121          p = (ag_encrypt_map_t *)uma_zalloc(pCard->map_cache, M_WAITOK); //Encryption
1122    if (!perr) {
1123        printf("%s: Mempool allocation failure.\n", __FUNCTION__);
1124        return;
1125    }
1126
1127    /* Populate ag_encrypt_ioerr_t container */
1128    perr->ioerr.error_id = cmd->serial_number;
1129    perr->ioerr.timestamp = cmd->jiffies_at_alloc;
1130    perr->ioerr.host = (unsigned int) cmd->device->host->host_no;
1131    perr->ioerr.channel = cmd->device->channel;
1132    perr->ioerr.device = cmd->device->id;
1133    perr->ioerr.lun = cmd->device->lun;
1134    perr->ioerr.scsi_cmd = (unsigned int) cmd->cmnd[0];
1135    perr->ioerr.dek_index = pccb->tiSuperScsiRequest.Encrypt.dekInfo.dekIndex;
1136    perr->ioerr.dek_table = pccb->tiSuperScsiRequest.Encrypt.dekInfo.dekTable;
1137    perr->ioerr.kek_index = pccb->tiSuperScsiRequest.Encrypt.kekIndex;
1138    perr->ioerr.keytag_check = pccb->tiSuperScsiRequest.Encrypt.keyTagCheck;
1139    perr->ioerr.encrypt_mode = pccb->tiSuperScsiRequest.Encrypt.encryptMode;
1140    perr->ioerr.keytag[0] = pccb->tiSuperScsiRequest.Encrypt.keyTag_W0;
1141    perr->ioerr.keytag[1] = pccb->tiSuperScsiRequest.Encrypt.keyTag_W1;
1142
1143    switch(pccb->scsiStatus) {
1144        case tiDetailDekKeyCacheMiss:
1145        case tiDetailDekIVMismatch:
1146            perr->ioerr.error_type = pccb->scsiStatus;
1147            break;
1148        default:
1149            printf("%s: Unrecognized encrypted IO completion error status: %d\n", __FUNCTION__, pccb->scsiStatus);
1150            perr->ioerr.error_type = 0xffffffff;
1151            break;
1152    }
1153
1154    /* Link IO err into queue */
1155    AG_SPIN_LOCK_IRQ(&pCard->ioerr_queue_lock, flags);
1156    list_add_tail(&perr->list, &pCard->ioerr_queue);
1157    AG_SPIN_UNLOCK_IRQ(&pCard->ioerr_queue_lock, flags);
1158
1159    /* Notify any wait queue waiters that an IO error has occurred */
1160    atomic_inc(&ioerr_queue_count);
1161    wake_up_interruptible(&ioerr_waitq);
1162
1163}
1164#endif
1165#endif
1166