xref: /linux/drivers/s390/crypto/zcrypt_error.h (revision d642ef71)
1 /* SPDX-License-Identifier: GPL-2.0+ */
2 /*
3  *  Copyright IBM Corp. 2001, 2006
4  *  Author(s): Robert Burroughs
5  *	       Eric Rossman (edrossma@us.ibm.com)
6  *
7  *  Hotplug & misc device support: Jochen Roehrig (roehrig@de.ibm.com)
8  *  Major cleanup & driver split: Martin Schwidefsky <schwidefsky@de.ibm.com>
9  */
10 
11 #ifndef _ZCRYPT_ERROR_H_
12 #define _ZCRYPT_ERROR_H_
13 
14 #include <linux/atomic.h>
15 #include "zcrypt_debug.h"
16 #include "zcrypt_api.h"
17 #include "zcrypt_msgtype6.h"
18 
19 /**
20  * Reply Messages
21  *
22  * Error reply messages are of two types:
23  *    82:  Error (see below)
24  *    88:  Error (see below)
25  * Both type 82 and type 88 have the same structure in the header.
26  *
27  * Request reply messages are of three known types:
28  *    80:  Reply from a Type 50 Request (see CEX2A-RELATED STRUCTS)
29  *    84:  Reply from a Type 4 Request (see PCICA-RELATED STRUCTS)
30  *    86:  Reply from a Type 6 Request (see PCICC/PCIXCC/CEX2C-RELATED STRUCTS)
31  *
32  */
33 struct error_hdr {
34 	unsigned char reserved1;	/* 0x00			*/
35 	unsigned char type;		/* 0x82 or 0x88		*/
36 	unsigned char reserved2[2];	/* 0x0000		*/
37 	unsigned char reply_code;	/* reply code		*/
38 	unsigned char reserved3[3];	/* 0x000000		*/
39 };
40 
41 #define TYPE82_RSP_CODE 0x82
42 #define TYPE88_RSP_CODE 0x88
43 
44 #define REP82_ERROR_MACHINE_FAILURE	    0x10
45 #define REP82_ERROR_PREEMPT_FAILURE	    0x12
46 #define REP82_ERROR_CHECKPT_FAILURE	    0x14
47 #define REP82_ERROR_MESSAGE_TYPE	    0x20
48 #define REP82_ERROR_INVALID_COMM_CD	    0x21 /* Type 84	*/
49 #define REP82_ERROR_INVALID_MSG_LEN	    0x23
50 #define REP82_ERROR_RESERVD_FIELD	    0x24 /* was 0x50	*/
51 #define REP82_ERROR_FORMAT_FIELD	    0x29
52 #define REP82_ERROR_INVALID_COMMAND	    0x30
53 #define REP82_ERROR_MALFORMED_MSG	    0x40
54 #define REP82_ERROR_INVALID_SPECIAL_CMD	    0x41
55 #define REP82_ERROR_RESERVED_FIELDO	    0x50 /* old value	*/
56 #define REP82_ERROR_WORD_ALIGNMENT	    0x60
57 #define REP82_ERROR_MESSAGE_LENGTH	    0x80
58 #define REP82_ERROR_OPERAND_INVALID	    0x82
59 #define REP82_ERROR_OPERAND_SIZE	    0x84
60 #define REP82_ERROR_EVEN_MOD_IN_OPND	    0x85
61 #define REP82_ERROR_RESERVED_FIELD	    0x88
62 #define REP82_ERROR_INVALID_DOMAIN_PENDING  0x8A
63 #define REP82_ERROR_FILTERED_BY_HYPERVISOR  0x8B
64 #define REP82_ERROR_TRANSPORT_FAIL	    0x90
65 #define REP82_ERROR_PACKET_TRUNCATED	    0xA0
66 #define REP82_ERROR_ZERO_BUFFER_LEN	    0xB0
67 
68 #define REP88_ERROR_MODULE_FAILURE	    0x10
69 #define REP88_ERROR_MESSAGE_TYPE	    0x20
70 #define REP88_ERROR_MESSAGE_MALFORMD	    0x22
71 #define REP88_ERROR_MESSAGE_LENGTH	    0x23
72 #define REP88_ERROR_RESERVED_FIELD	    0x24
73 #define REP88_ERROR_KEY_TYPE		    0x34
74 #define REP88_ERROR_INVALID_KEY	    0x82 /* CEX2A	*/
75 #define REP88_ERROR_OPERAND		    0x84 /* CEX2A	*/
76 #define REP88_ERROR_OPERAND_EVEN_MOD	    0x85 /* CEX2A	*/
77 
78 static inline int convert_error(struct zcrypt_queue *zq,
79 				struct ap_message *reply)
80 {
81 	struct error_hdr *ehdr = reply->msg;
82 	int card = AP_QID_CARD(zq->queue->qid);
83 	int queue = AP_QID_QUEUE(zq->queue->qid);
84 
85 	switch (ehdr->reply_code) {
86 	case REP82_ERROR_INVALID_MSG_LEN:	 /* 0x23 */
87 	case REP82_ERROR_RESERVD_FIELD:		 /* 0x24 */
88 	case REP82_ERROR_FORMAT_FIELD:		 /* 0x29 */
89 	case REP82_ERROR_MALFORMED_MSG:		 /* 0x40 */
90 	case REP82_ERROR_INVALID_SPECIAL_CMD:	 /* 0x41 */
91 	case REP82_ERROR_MESSAGE_LENGTH:	 /* 0x80 */
92 	case REP82_ERROR_OPERAND_INVALID:	 /* 0x82 */
93 	case REP82_ERROR_OPERAND_SIZE:		 /* 0x84 */
94 	case REP82_ERROR_EVEN_MOD_IN_OPND:	 /* 0x85 */
95 	case REP82_ERROR_INVALID_DOMAIN_PENDING: /* 0x8A */
96 	case REP82_ERROR_FILTERED_BY_HYPERVISOR: /* 0x8B */
97 	case REP82_ERROR_PACKET_TRUNCATED:	 /* 0xA0 */
98 	case REP88_ERROR_MESSAGE_MALFORMD:	 /* 0x22 */
99 	case REP88_ERROR_KEY_TYPE:		 /* 0x34 */
100 		/* RY indicates malformed request */
101 		if (ehdr->reply_code == REP82_ERROR_FILTERED_BY_HYPERVISOR &&
102 		    ehdr->type == TYPE86_RSP_CODE) {
103 			struct {
104 				struct type86_hdr hdr;
105 				struct type86_fmt2_ext fmt2;
106 			} __packed * head = reply->msg;
107 			unsigned int apfs = *((u32 *)head->fmt2.apfs);
108 
109 			ZCRYPT_DBF_WARN("%s dev=%02x.%04x RY=0x%02x apfs=0x%x => rc=EINVAL\n",
110 					__func__, card, queue,
111 					ehdr->reply_code, apfs);
112 		} else {
113 			ZCRYPT_DBF_WARN("%s dev=%02x.%04x RY=0x%02x => rc=EINVAL\n",
114 					__func__, card, queue,
115 					ehdr->reply_code);
116 		}
117 		return -EINVAL;
118 	case REP82_ERROR_MACHINE_FAILURE:	 /* 0x10 */
119 	case REP82_ERROR_MESSAGE_TYPE:		 /* 0x20 */
120 	case REP82_ERROR_TRANSPORT_FAIL:	 /* 0x90 */
121 		/*
122 		 * Msg to wrong type or card/infrastructure failure.
123 		 * Trigger rescan of the ap bus, trigger retry request.
124 		 */
125 		atomic_set(&zcrypt_rescan_req, 1);
126 		/* For type 86 response show the apfs value (failure reason) */
127 		if (ehdr->reply_code == REP82_ERROR_TRANSPORT_FAIL &&
128 		    ehdr->type == TYPE86_RSP_CODE) {
129 			struct {
130 				struct type86_hdr hdr;
131 				struct type86_fmt2_ext fmt2;
132 			} __packed * head = reply->msg;
133 			unsigned int apfs = *((u32 *)head->fmt2.apfs);
134 
135 			ZCRYPT_DBF_WARN(
136 				"%s dev=%02x.%04x RY=0x%02x apfs=0x%x => bus rescan, rc=EAGAIN\n",
137 				__func__, card, queue, ehdr->reply_code, apfs);
138 		} else {
139 			ZCRYPT_DBF_WARN("%s dev=%02x.%04x RY=0x%02x => bus rescan, rc=EAGAIN\n",
140 					__func__, card, queue,
141 					ehdr->reply_code);
142 		}
143 		return -EAGAIN;
144 	default:
145 		/* Assume request is valid and a retry will be worth it */
146 		ZCRYPT_DBF_WARN("%s dev=%02x.%04x RY=0x%02x => rc=EAGAIN\n",
147 				__func__, card, queue, ehdr->reply_code);
148 		return -EAGAIN;
149 	}
150 }
151 
152 #endif /* _ZCRYPT_ERROR_H_ */
153