numam-spdk/examples/nvme/nvme_manage/nvme_manage.c
Changpeng Liu 9ec9c8b33d examples/nvme: add missed spdk_env_fini() when exiting
Althrough `rte_eal_cleanup` will be called in the destructor
function when exiting the application, it's OK not to call
`spdk_env_fini`, we still add this function call in case
there are cleanup function need to call in future.

Change-Id: I0a3eca44c5ed1d62059796ea8f1977fb19356939
Signed-off-by: Changpeng Liu <changpeng.liu@intel.com>
Reviewed-on: https://review.spdk.io/gerrit/c/spdk/spdk/+/10904
Tested-by: SPDK CI Jenkins <sys_sgci@intel.com>
Reviewed-by: Aleksey Marchuk <alexeymar@mellanox.com>
Reviewed-by: Jim Harris <james.r.harris@intel.com>
Community-CI: Broadcom CI <spdk-ci.pdl@broadcom.com>
2022-01-11 14:19:05 +00:00

1712 lines
46 KiB
C

/*-
* BSD LICENSE
*
* Copyright (c) Intel Corporation.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* * Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* * Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* the documentation and/or other materials provided with the
* distribution.
* * Neither the name of Intel Corporation nor the names of its
* contributors may be used to endorse or promote products derived
* from this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "spdk/stdinc.h"
#include "spdk/nvme.h"
#include "spdk/env.h"
#include "spdk/string.h"
#include "spdk/util.h"
#include "spdk/opal.h"
#define MAX_DEVS 64
struct dev {
struct spdk_pci_addr pci_addr;
struct spdk_nvme_ctrlr *ctrlr;
const struct spdk_nvme_ctrlr_data *cdata;
struct spdk_nvme_ns_data *common_ns_data;
int outstanding_admin_cmds;
struct spdk_opal_dev *opal_dev;
};
static struct dev devs[MAX_DEVS];
static int num_devs = 0;
static int g_shm_id = -1;
#define foreach_dev(iter) \
for (iter = devs; iter - devs < num_devs; iter++)
enum controller_display_model {
CONTROLLER_DISPLAY_ALL = 0x0,
CONTROLLER_DISPLAY_SIMPLISTIC = 0x1,
};
static int
cmp_devs(const void *ap, const void *bp)
{
const struct dev *a = ap, *b = bp;
return spdk_pci_addr_compare(&a->pci_addr, &b->pci_addr);
}
static bool
probe_cb(void *cb_ctx, const struct spdk_nvme_transport_id *trid,
struct spdk_nvme_ctrlr_opts *opts)
{
return true;
}
static void
identify_common_ns_cb(void *cb_arg, const struct spdk_nvme_cpl *cpl)
{
struct dev *dev = cb_arg;
if (cpl->status.sc != SPDK_NVME_SC_SUCCESS) {
/* Identify Namespace for NSID = FFFFFFFFh is optional, so failure is not fatal. */
spdk_dma_free(dev->common_ns_data);
dev->common_ns_data = NULL;
}
dev->outstanding_admin_cmds--;
}
static void
attach_cb(void *cb_ctx, const struct spdk_nvme_transport_id *trid,
struct spdk_nvme_ctrlr *ctrlr, const struct spdk_nvme_ctrlr_opts *opts)
{
struct dev *dev;
struct spdk_nvme_cmd cmd;
/* add to dev list */
dev = &devs[num_devs++];
spdk_pci_addr_parse(&dev->pci_addr, trid->traddr);
dev->ctrlr = ctrlr;
/* Retrieve controller data */
dev->cdata = spdk_nvme_ctrlr_get_data(dev->ctrlr);
dev->common_ns_data = spdk_dma_zmalloc(sizeof(struct spdk_nvme_ns_data), 4096, NULL);
if (dev->common_ns_data == NULL) {
fprintf(stderr, "common_ns_data allocation failure\n");
return;
}
/* Identify Namespace with NSID set to FFFFFFFFh to get common namespace capabilities. */
memset(&cmd, 0, sizeof(cmd));
cmd.opc = SPDK_NVME_OPC_IDENTIFY;
cmd.cdw10_bits.identify.cns = 0; /* CNS = 0 (Identify Namespace) */
cmd.nsid = SPDK_NVME_GLOBAL_NS_TAG;
dev->outstanding_admin_cmds++;
if (spdk_nvme_ctrlr_cmd_admin_raw(ctrlr, &cmd, dev->common_ns_data,
sizeof(struct spdk_nvme_ns_data), identify_common_ns_cb, dev) != 0) {
dev->outstanding_admin_cmds--;
spdk_dma_free(dev->common_ns_data);
dev->common_ns_data = NULL;
}
while (dev->outstanding_admin_cmds) {
spdk_nvme_ctrlr_process_admin_completions(ctrlr);
}
}
static void usage(void)
{
printf("NVMe Management Options");
printf("\n");
printf("\t[1: list controllers]\n");
printf("\t[2: create namespace]\n");
printf("\t[3: delete namespace]\n");
printf("\t[4: attach namespace to controller]\n");
printf("\t[5: detach namespace from controller]\n");
printf("\t[6: format namespace or controller]\n");
printf("\t[7: firmware update]\n");
printf("\t[8: opal]\n");
printf("\t[9: quit]\n");
}
static void
display_namespace_dpc(const struct spdk_nvme_ns_data *nsdata)
{
if (nsdata->dpc.pit1 || nsdata->dpc.pit2 || nsdata->dpc.pit3) {
if (nsdata->dpc.pit1) {
printf("PIT1 ");
}
if (nsdata->dpc.pit2) {
printf("PIT2 ");
}
if (nsdata->dpc.pit3) {
printf("PIT3 ");
}
} else {
printf("Not Supported\n");
return;
}
if (nsdata->dpc.md_start && nsdata->dpc.md_end) {
printf("Location: Head or Tail\n");
} else if (nsdata->dpc.md_start) {
printf("Location: Head\n");
} else if (nsdata->dpc.md_end) {
printf("Location: Tail\n");
} else {
printf("Not Supported\n");
}
}
static void
display_namespace(struct spdk_nvme_ns *ns)
{
const struct spdk_nvme_ns_data *nsdata;
uint32_t i;
nsdata = spdk_nvme_ns_get_data(ns);
printf("Namespace ID:%d\n", spdk_nvme_ns_get_id(ns));
printf("Size (in LBAs): %lld (%lldM)\n",
(long long)nsdata->nsze,
(long long)nsdata->nsze / 1024 / 1024);
printf("Capacity (in LBAs): %lld (%lldM)\n",
(long long)nsdata->ncap,
(long long)nsdata->ncap / 1024 / 1024);
printf("Utilization (in LBAs): %lld (%lldM)\n",
(long long)nsdata->nuse,
(long long)nsdata->nuse / 1024 / 1024);
printf("Format Progress Indicator: %s\n",
nsdata->fpi.fpi_supported ? "Supported" : "Not Supported");
if (nsdata->fpi.fpi_supported && nsdata->fpi.percentage_remaining) {
printf("Formatted Percentage: %d%%\n", 100 - nsdata->fpi.percentage_remaining);
}
printf("Number of LBA Formats: %d\n", nsdata->nlbaf + 1);
printf("Current LBA Format: LBA Format #%02d\n",
nsdata->flbas.format);
for (i = 0; i <= nsdata->nlbaf; i++)
printf("LBA Format #%02d: Data Size: %5d Metadata Size: %5d\n",
i, 1 << nsdata->lbaf[i].lbads, nsdata->lbaf[i].ms);
printf("Data Protection Capabilities:");
display_namespace_dpc(nsdata);
if (SPDK_NVME_FMT_NVM_PROTECTION_DISABLE == nsdata->dps.pit) {
printf("Data Protection Setting: N/A\n");
} else {
printf("Data Protection Setting: PIT%d Location: %s\n",
nsdata->dps.pit, nsdata->dps.md_start ? "Head" : "Tail");
}
printf("Multipath IO and Sharing: %s\n",
nsdata->nmic.can_share ? "Supported" : "Not Supported");
printf("\n");
}
static void
display_controller(struct dev *dev, int model)
{
struct spdk_nvme_ns *ns;
const struct spdk_nvme_ctrlr_data *cdata;
uint8_t str[128];
uint32_t nsid;
cdata = spdk_nvme_ctrlr_get_data(dev->ctrlr);
if (model == CONTROLLER_DISPLAY_SIMPLISTIC) {
printf("%04x:%02x:%02x.%02x ",
dev->pci_addr.domain, dev->pci_addr.bus, dev->pci_addr.dev, dev->pci_addr.func);
printf("%-40.40s %-20.20s ",
cdata->mn, cdata->sn);
printf("%5d ", cdata->cntlid);
printf("\n");
return;
}
printf("=====================================================\n");
printf("NVMe Controller: %04x:%02x:%02x.%02x\n",
dev->pci_addr.domain, dev->pci_addr.bus, dev->pci_addr.dev, dev->pci_addr.func);
printf("============================\n");
printf("Controller Capabilities/Features\n");
printf("Controller ID: %d\n", cdata->cntlid);
snprintf(str, sizeof(cdata->sn) + 1, "%s", cdata->sn);
printf("Serial Number: %s\n", str);
printf("\n");
printf("Admin Command Set Attributes\n");
printf("============================\n");
printf("Namespace Manage And Attach: %s\n",
cdata->oacs.ns_manage ? "Supported" : "Not Supported");
printf("Namespace Format: %s\n",
cdata->oacs.format ? "Supported" : "Not Supported");
printf("\n");
printf("NVM Command Set Attributes\n");
printf("============================\n");
if (cdata->fna.format_all_ns) {
printf("Namespace format operation applies to all namespaces\n");
} else {
printf("Namespace format operation applies to per namespace\n");
}
printf("\n");
printf("Namespace Attributes\n");
printf("============================\n");
for (nsid = spdk_nvme_ctrlr_get_first_active_ns(dev->ctrlr);
nsid != 0; nsid = spdk_nvme_ctrlr_get_next_active_ns(dev->ctrlr, nsid)) {
ns = spdk_nvme_ctrlr_get_ns(dev->ctrlr, nsid);
assert(ns != NULL);
display_namespace(ns);
}
}
static void
display_controller_list(void)
{
struct dev *iter;
foreach_dev(iter) {
display_controller(iter, CONTROLLER_DISPLAY_ALL);
}
}
static char *
get_line(char *buf, int buf_size, FILE *f, bool secret)
{
char *ch;
size_t len;
struct termios default_attr = {}, new_attr = {};
int ret;
if (secret) {
ret = tcgetattr(STDIN_FILENO, &default_attr);
if (ret) {
return NULL;
}
new_attr = default_attr;
new_attr.c_lflag &= ~ECHO; /* disable echo */
ret = tcsetattr(STDIN_FILENO, TCSAFLUSH, &new_attr);
if (ret) {
return NULL;
}
}
ch = fgets(buf, buf_size, f);
if (ch == NULL) {
return NULL;
}
if (secret) {
ret = tcsetattr(STDIN_FILENO, TCSAFLUSH, &default_attr); /* restore default confing */
if (ret) {
return NULL;
}
}
len = strlen(buf);
if (len > 0 && buf[len - 1] == '\n') {
buf[len - 1] = '\0';
}
return buf;
}
static struct dev *
get_controller(void)
{
struct spdk_pci_addr pci_addr;
char address[64];
char *p;
int ch;
struct dev *iter;
memset(address, 0, sizeof(address));
foreach_dev(iter) {
display_controller(iter, CONTROLLER_DISPLAY_SIMPLISTIC);
}
printf("Please Input PCI Address(domain:bus:dev.func):\n");
while ((ch = getchar()) != '\n' && ch != EOF);
p = get_line(address, 64, stdin, false);
if (p == NULL) {
return NULL;
}
while (isspace(*p)) {
p++;
}
if (spdk_pci_addr_parse(&pci_addr, p) < 0) {
return NULL;
}
foreach_dev(iter) {
if (spdk_pci_addr_compare(&pci_addr, &iter->pci_addr) == 0) {
return iter;
}
}
return NULL;
}
static int
get_lba_format(const struct spdk_nvme_ns_data *ns_data)
{
int lbaf, i;
printf("\nSupported LBA formats:\n");
for (i = 0; i <= ns_data->nlbaf; i++) {
printf("%2d: %d data bytes", i, 1 << ns_data->lbaf[i].lbads);
if (ns_data->lbaf[i].ms) {
printf(" + %d metadata bytes", ns_data->lbaf[i].ms);
}
printf("\n");
}
printf("Please input LBA format index (0 - %d):\n", ns_data->nlbaf);
if (scanf("%d", &lbaf) != 1 || lbaf > ns_data->nlbaf) {
return -1;
}
return lbaf;
}
static void
identify_allocated_ns_cb(void *cb_arg, const struct spdk_nvme_cpl *cpl)
{
struct dev *dev = cb_arg;
dev->outstanding_admin_cmds--;
}
static uint32_t
get_allocated_nsid(struct dev *dev)
{
uint32_t nsid;
size_t i;
struct spdk_nvme_ns_list *ns_list;
struct spdk_nvme_cmd cmd = {0};
ns_list = spdk_dma_zmalloc(sizeof(*ns_list), 4096, NULL);
if (ns_list == NULL) {
printf("Allocation error\n");
return 0;
}
cmd.opc = SPDK_NVME_OPC_IDENTIFY;
cmd.cdw10_bits.identify.cns = SPDK_NVME_IDENTIFY_ALLOCATED_NS_LIST;
cmd.nsid = 0;
dev->outstanding_admin_cmds++;
if (spdk_nvme_ctrlr_cmd_admin_raw(dev->ctrlr, &cmd, ns_list, sizeof(*ns_list),
identify_allocated_ns_cb, dev)) {
printf("Identify command failed\n");
spdk_dma_free(ns_list);
return 0;
}
while (dev->outstanding_admin_cmds) {
spdk_nvme_ctrlr_process_admin_completions(dev->ctrlr);
}
printf("Allocated Namespace IDs:\n");
for (i = 0; i < SPDK_COUNTOF(ns_list->ns_list); i++) {
if (ns_list->ns_list[i] == 0) {
break;
}
printf("%u\n", ns_list->ns_list[i]);
}
spdk_dma_free(ns_list);
printf("Please Input Namespace ID:\n");
if (!scanf("%u", &nsid)) {
printf("Invalid Namespace ID\n");
nsid = 0;
}
return nsid;
}
static void
ns_attach(struct dev *device, int attachment_op, int ctrlr_id, int ns_id)
{
int ret = 0;
struct spdk_nvme_ctrlr_list *ctrlr_list;
ctrlr_list = spdk_dma_zmalloc(sizeof(struct spdk_nvme_ctrlr_list),
4096, NULL);
if (ctrlr_list == NULL) {
printf("Allocation error (controller list)\n");
exit(1);
}
ctrlr_list->ctrlr_count = 1;
ctrlr_list->ctrlr_list[0] = ctrlr_id;
if (attachment_op == SPDK_NVME_NS_CTRLR_ATTACH) {
ret = spdk_nvme_ctrlr_attach_ns(device->ctrlr, ns_id, ctrlr_list);
} else if (attachment_op == SPDK_NVME_NS_CTRLR_DETACH) {
ret = spdk_nvme_ctrlr_detach_ns(device->ctrlr, ns_id, ctrlr_list);
}
if (ret) {
fprintf(stdout, "ns attach: Failed\n");
}
spdk_dma_free(ctrlr_list);
}
static void
ns_manage_add(struct dev *device, uint64_t ns_size, uint64_t ns_capacity, int ns_lbasize,
uint8_t ns_dps_type, uint8_t ns_dps_location, uint8_t ns_nmic)
{
uint32_t nsid;
struct spdk_nvme_ns_data *ndata;
ndata = spdk_dma_zmalloc(sizeof(struct spdk_nvme_ns_data), 4096, NULL);
if (ndata == NULL) {
printf("Allocation error (namespace data)\n");
exit(1);
}
ndata->nsze = ns_size;
ndata->ncap = ns_capacity;
ndata->flbas.format = ns_lbasize;
if (SPDK_NVME_FMT_NVM_PROTECTION_DISABLE != ns_dps_type) {
ndata->dps.pit = ns_dps_type;
ndata->dps.md_start = ns_dps_location;
}
ndata->nmic.can_share = ns_nmic;
nsid = spdk_nvme_ctrlr_create_ns(device->ctrlr, ndata);
if (nsid == 0) {
fprintf(stdout, "ns manage: Failed\n");
} else {
printf("Created namespace ID %u\n", nsid);
}
spdk_dma_free(ndata);
}
static void
ns_manage_delete(struct dev *device, int ns_id)
{
int ret = 0;
ret = spdk_nvme_ctrlr_delete_ns(device->ctrlr, ns_id);
if (ret) {
fprintf(stdout, "ns manage: Failed\n");
return;
}
}
static void
nvme_manage_format(struct dev *device, int ns_id, int ses, int pi, int pil, int ms, int lbaf)
{
int ret = 0;
struct spdk_nvme_format format = {};
format.lbaf = lbaf;
format.ms = ms;
format.pi = pi;
format.pil = pil;
format.ses = ses;
ret = spdk_nvme_ctrlr_format(device->ctrlr, ns_id, &format);
if (ret) {
fprintf(stdout, "nvme format: Failed\n");
return;
}
}
static void
attach_and_detach_ns(int attachment_op)
{
uint32_t nsid;
struct dev *ctrlr;
ctrlr = get_controller();
if (ctrlr == NULL) {
printf("Invalid controller PCI Address.\n");
return;
}
if (!ctrlr->cdata->oacs.ns_manage) {
printf("Controller does not support ns management\n");
return;
}
nsid = get_allocated_nsid(ctrlr);
if (nsid == 0) {
printf("Invalid Namespace ID\n");
return;
}
ns_attach(ctrlr, attachment_op, ctrlr->cdata->cntlid, nsid);
}
static void
add_ns(void)
{
uint64_t ns_size = 0;
uint64_t ns_capacity = 0;
int ns_lbasize;
int ns_dps_type = 0;
int ns_dps_location = 0;
int ns_nmic = 0;
struct dev *ctrlr = NULL;
ctrlr = get_controller();
if (ctrlr == NULL) {
printf("Invalid controller PCI Address.\n");
return;
}
if (!ctrlr->cdata->oacs.ns_manage) {
printf("Controller does not support ns management\n");
return;
}
if (!ctrlr->common_ns_data) {
printf("Controller did not return common namespace capabilities\n");
return;
}
ns_lbasize = get_lba_format(ctrlr->common_ns_data);
if (ns_lbasize < 0) {
printf("Invalid LBA format number\n");
return;
}
printf("Please Input Namespace Size (in LBAs):\n");
if (!scanf("%" SCNu64, &ns_size)) {
printf("Invalid Namespace Size\n");
while (getchar() != '\n');
return;
}
printf("Please Input Namespace Capacity (in LBAs):\n");
if (!scanf("%" SCNu64, &ns_capacity)) {
printf("Invalid Namespace Capacity\n");
while (getchar() != '\n');
return;
}
printf("Please Input Data Protection Type (0 - 3):\n");
if (!scanf("%d", &ns_dps_type)) {
printf("Invalid Data Protection Type\n");
while (getchar() != '\n');
return;
}
if (SPDK_NVME_FMT_NVM_PROTECTION_DISABLE != ns_dps_type) {
printf("Please Input Data Protection Location (1: Head; 0: Tail):\n");
if (!scanf("%d", &ns_dps_location)) {
printf("Invalid Data Protection Location\n");
while (getchar() != '\n');
return;
}
}
printf("Please Input Multi-path IO and Sharing Capabilities (1: Share; 0: Private):\n");
if (!scanf("%d", &ns_nmic)) {
printf("Invalid Multi-path IO and Sharing Capabilities\n");
while (getchar() != '\n');
return;
}
ns_manage_add(ctrlr, ns_size, ns_capacity, ns_lbasize,
ns_dps_type, ns_dps_location, ns_nmic);
}
static void
delete_ns(void)
{
int ns_id;
struct dev *ctrlr;
ctrlr = get_controller();
if (ctrlr == NULL) {
printf("Invalid controller PCI Address.\n");
return;
}
if (!ctrlr->cdata->oacs.ns_manage) {
printf("Controller does not support ns management\n");
return;
}
printf("Please Input Namespace ID:\n");
if (!scanf("%d", &ns_id)) {
printf("Invalid Namespace ID\n");
while (getchar() != '\n');
return;
}
ns_manage_delete(ctrlr, ns_id);
}
static void
format_nvm(void)
{
int ns_id;
int ses;
int pil;
int pi;
int ms;
int lbaf;
char option;
struct dev *ctrlr;
const struct spdk_nvme_ctrlr_data *cdata;
struct spdk_nvme_ns *ns;
const struct spdk_nvme_ns_data *nsdata;
ctrlr = get_controller();
if (ctrlr == NULL) {
printf("Invalid controller PCI BDF.\n");
return;
}
cdata = ctrlr->cdata;
if (!cdata->oacs.format) {
printf("Controller does not support Format NVM command\n");
return;
}
if (cdata->fna.format_all_ns) {
ns_id = SPDK_NVME_GLOBAL_NS_TAG;
ns = spdk_nvme_ctrlr_get_ns(ctrlr->ctrlr, 1);
} else {
printf("Please Input Namespace ID (1 - %d):\n", cdata->nn);
if (!scanf("%d", &ns_id)) {
printf("Invalid Namespace ID\n");
while (getchar() != '\n');
return;
}
ns = spdk_nvme_ctrlr_get_ns(ctrlr->ctrlr, ns_id);
}
if (ns == NULL) {
printf("Namespace ID %d not found\n", ns_id);
while (getchar() != '\n');
return;
}
nsdata = spdk_nvme_ns_get_data(ns);
printf("Please Input Secure Erase Setting:\n");
printf(" 0: No secure erase operation requested\n");
printf(" 1: User data erase\n");
if (cdata->fna.crypto_erase_supported) {
printf(" 2: Cryptographic erase\n");
}
if (!scanf("%d", &ses)) {
printf("Invalid Secure Erase Setting\n");
while (getchar() != '\n');
return;
}
lbaf = get_lba_format(nsdata);
if (lbaf < 0) {
printf("Invalid LBA format number\n");
return;
}
if (nsdata->lbaf[lbaf].ms) {
printf("Please Input Protection Information:\n");
printf(" 0: Protection information is not enabled\n");
printf(" 1: Protection information is enabled, Type 1\n");
printf(" 2: Protection information is enabled, Type 2\n");
printf(" 3: Protection information is enabled, Type 3\n");
if (!scanf("%d", &pi)) {
printf("Invalid protection information\n");
while (getchar() != '\n');
return;
}
if (pi) {
printf("Please Input Protection Information Location:\n");
printf(" 0: Protection information transferred as the last eight bytes of metadata\n");
printf(" 1: Protection information transferred as the first eight bytes of metadata\n");
if (!scanf("%d", &pil)) {
printf("Invalid protection information location\n");
while (getchar() != '\n');
return;
}
} else {
pil = 0;
}
printf("Please Input Metadata Setting:\n");
printf(" 0: Metadata is transferred as part of a separate buffer\n");
printf(" 1: Metadata is transferred as part of an extended data LBA\n");
if (!scanf("%d", &ms)) {
printf("Invalid metadata setting\n");
while (getchar() != '\n');
return;
}
} else {
ms = 0;
pi = 0;
pil = 0;
}
printf("Warning: use this utility at your own risk.\n"
"This command will format your namespace and all data will be lost.\n"
"This command may take several minutes to complete,\n"
"so do not interrupt the utility until it completes.\n"
"Press 'Y' to continue with the format operation.\n");
while (getchar() != '\n');
if (!scanf("%c", &option)) {
printf("Invalid option\n");
while (getchar() != '\n');
return;
}
if (option == 'y' || option == 'Y') {
nvme_manage_format(ctrlr, ns_id, ses, pi, pil, ms, lbaf);
} else {
printf("NVMe format abort\n");
}
}
static void
update_firmware_image(void)
{
int rc;
int fd = -1;
int slot;
unsigned int size;
struct stat fw_stat;
char path[256];
void *fw_image;
struct dev *ctrlr;
const struct spdk_nvme_ctrlr_data *cdata;
enum spdk_nvme_fw_commit_action commit_action;
struct spdk_nvme_status status;
ctrlr = get_controller();
if (ctrlr == NULL) {
printf("Invalid controller PCI BDF.\n");
return;
}
cdata = ctrlr->cdata;
if (!cdata->oacs.firmware) {
printf("Controller does not support firmware download and commit command\n");
return;
}
printf("Please Input The Path Of Firmware Image\n");
if (get_line(path, sizeof(path), stdin, false) == NULL) {
printf("Invalid path setting\n");
while (getchar() != '\n');
return;
}
fd = open(path, O_RDONLY);
if (fd < 0) {
perror("Open file failed");
return;
}
rc = fstat(fd, &fw_stat);
if (rc < 0) {
printf("Fstat failed\n");
close(fd);
return;
}
if (fw_stat.st_size % 4) {
printf("Firmware image size is not multiple of 4\n");
close(fd);
return;
}
size = fw_stat.st_size;
fw_image = spdk_dma_zmalloc(size, 4096, NULL);
if (fw_image == NULL) {
printf("Allocation error\n");
close(fd);
return;
}
if (read(fd, fw_image, size) != ((ssize_t)(size))) {
printf("Read firmware image failed\n");
close(fd);
spdk_dma_free(fw_image);
return;
}
close(fd);
printf("Please Input Slot(0 - 7):\n");
if (!scanf("%d", &slot)) {
printf("Invalid Slot\n");
spdk_dma_free(fw_image);
while (getchar() != '\n');
return;
}
commit_action = SPDK_NVME_FW_COMMIT_REPLACE_AND_ENABLE_IMG;
rc = spdk_nvme_ctrlr_update_firmware(ctrlr->ctrlr, fw_image, size, slot, commit_action, &status);
if (rc == -ENXIO && status.sct == SPDK_NVME_SCT_COMMAND_SPECIFIC &&
status.sc == SPDK_NVME_SC_FIRMWARE_REQ_CONVENTIONAL_RESET) {
printf("conventional reset is needed to enable firmware !\n");
} else if (rc) {
printf("spdk_nvme_ctrlr_update_firmware failed\n");
} else {
printf("spdk_nvme_ctrlr_update_firmware success\n");
}
spdk_dma_free(fw_image);
}
static void
opal_dump_info(struct spdk_opal_d0_features_info *feat)
{
if (feat->tper.hdr.code) {
printf("\nOpal TPer feature:\n");
printf("ACKNACK = %s", (feat->tper.acknack ? "Y, " : "N, "));
printf("ASYNC = %s", (feat->tper.async ? "Y, " : "N, "));
printf("BufferManagement = %s\n", (feat->tper.buffer_management ? "Y, " : "N, "));
printf("ComIDManagement = %s", (feat->tper.comid_management ? "Y, " : "N, "));
printf("Streaming = %s", (feat->tper.streaming ? "Y, " : "N, "));
printf("Sync = %s\n", (feat->tper.sync ? "Y" : "N"));
printf("\n");
}
if (feat->locking.hdr.code) {
printf("Opal Locking feature:\n");
printf("Locked = %s", (feat->locking.locked ? "Y, " : "N, "));
printf("Locking Enabled = %s", (feat->locking.locking_enabled ? "Y, " : "N, "));
printf("Locking supported = %s\n", (feat->locking.locking_supported ? "Y" : "N"));
printf("MBR done = %s", (feat->locking.mbr_done ? "Y, " : "N, "));
printf("MBR enabled = %s", (feat->locking.mbr_enabled ? "Y, " : "N, "));
printf("Media encrypt = %s\n", (feat->locking.media_encryption ? "Y" : "N"));
printf("\n");
}
if (feat->geo.hdr.code) {
printf("Opal Geometry feature:\n");
printf("Align = %s", (feat->geo.alignment_granularity ? "Y, " : "N, "));
printf("Logical block size = %d, ", from_be32(&feat->geo.logical_block_size));
printf("Lowest aligned LBA = %" PRIu64 "\n", from_be64(&feat->geo.lowest_aligned_lba));
printf("\n");
}
if (feat->single_user.hdr.code) {
printf("Opal Single User Mode feature:\n");
printf("Any in SUM = %s", (feat->single_user.any ? "Y, " : "N, "));
printf("All in SUM = %s", (feat->single_user.all ? "Y, " : "N, "));
printf("Policy: %s Authority,\n", (feat->single_user.policy ? "Admin" : "Users"));
printf("Number of locking objects = %d\n ", from_be32(&feat->single_user.num_locking_objects));
printf("\n");
}
if (feat->datastore.hdr.code) {
printf("Opal DataStore feature:\n");
printf("Table alignment = %d, ", from_be32(&feat->datastore.alignment));
printf("Max number of tables = %d, ", from_be16(&feat->datastore.max_tables));
printf("Max size of tables = %d\n", from_be32(&feat->datastore.max_table_size));
printf("\n");
}
if (feat->v100.hdr.code) {
printf("Opal V100 feature:\n");
printf("Base comID = %d, ", from_be16(&feat->v100.base_comid));
printf("Number of comIDs = %d, ", from_be16(&feat->v100.number_comids));
printf("Range crossing = %s\n", (feat->v100.range_crossing ? "N" : "Y"));
printf("\n");
}
if (feat->v200.hdr.code) {
printf("Opal V200 feature:\n");
printf("Base comID = %d, ", from_be16(&feat->v200.base_comid));
printf("Number of comIDs = %d, ", from_be16(&feat->v200.num_comids));
printf("Initial PIN = %d,\n", feat->v200.initial_pin);
printf("Reverted PIN = %d, ", feat->v200.reverted_pin);
printf("Number of admins = %d, ", from_be16(&feat->v200.num_locking_admin_auth));
printf("Number of users = %d\n", from_be16(&feat->v200.num_locking_user_auth));
printf("\n");
}
}
static void
opal_usage(void)
{
printf("Opal General Usage:\n");
printf("\n");
printf("\t[1: scan device]\n");
printf("\t[2: init - take ownership and activate locking]\n");
printf("\t[3: revert tper]\n");
printf("\t[4: setup locking range]\n");
printf("\t[5: list locking ranges]\n");
printf("\t[6: enable user]\n");
printf("\t[7: set new password]\n");
printf("\t[8: add user to locking range]\n");
printf("\t[9: lock/unlock range]\n");
printf("\t[10: erase locking range]\n");
printf("\t[0: quit]\n");
}
static void
opal_scan(struct dev *iter)
{
while (getchar() != '\n');
if (spdk_nvme_ctrlr_get_flags(iter->ctrlr) & SPDK_NVME_CTRLR_SECURITY_SEND_RECV_SUPPORTED) {
iter->opal_dev = spdk_opal_dev_construct(iter->ctrlr);
if (iter->opal_dev == NULL) {
return;
}
printf("\n\nOpal Supported:\n");
display_controller(iter, CONTROLLER_DISPLAY_SIMPLISTIC);
opal_dump_info(spdk_opal_get_d0_features_info(iter->opal_dev));
spdk_opal_dev_destruct(iter->opal_dev);
} else {
printf("%04x:%02x:%02x.%02x: NVMe Security Support/Receive Not supported.\n",
iter->pci_addr.domain, iter->pci_addr.bus, iter->pci_addr.dev, iter->pci_addr.func);
printf("%04x:%02x:%02x.%02x: Opal Not Supported\n\n\n",
iter->pci_addr.domain, iter->pci_addr.bus, iter->pci_addr.dev, iter->pci_addr.func);
}
}
static void
opal_init(struct dev *iter)
{
char new_passwd[SPDK_OPAL_MAX_PASSWORD_SIZE] = {0};
char *passwd_p;
int ret;
int ch;
if (spdk_nvme_ctrlr_get_flags(iter->ctrlr) & SPDK_NVME_CTRLR_SECURITY_SEND_RECV_SUPPORTED) {
iter->opal_dev = spdk_opal_dev_construct(iter->ctrlr);
if (iter->opal_dev == NULL) {
return;
}
printf("Please input the new password for ownership:");
while ((ch = getchar()) != '\n' && ch != EOF);
passwd_p = get_line(new_passwd, SPDK_OPAL_MAX_PASSWORD_SIZE, stdin, true);
printf("\n...\n");
if (passwd_p) {
ret = spdk_opal_cmd_take_ownership(iter->opal_dev, passwd_p);
if (ret) {
printf("Take ownership failure: %d\n", ret);
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
ret = spdk_opal_cmd_activate_locking_sp(iter->opal_dev, passwd_p);
if (ret) {
printf("Locking SP activate failure: %d\n", ret);
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
printf("...\nOpal Init Success\n");
} else {
printf("Input password invalid. Opal Init failure\n");
}
spdk_opal_dev_destruct(iter->opal_dev);
} else {
printf("%04x:%02x:%02x.%02x: NVMe Security Support/Receive Not supported.\nOpal Not Supported\n\n\n",
iter->pci_addr.domain, iter->pci_addr.bus, iter->pci_addr.dev, iter->pci_addr.func);
}
}
static void
opal_locking_usage(void)
{
printf("Choose Opal locking state:\n");
printf("\n");
printf("\t[1: read write lock]\n");
printf("\t[2: read only]\n");
printf("\t[3: read write unlock]\n");
}
static void
opal_setup_lockingrange(struct dev *iter)
{
char passwd[SPDK_OPAL_MAX_PASSWORD_SIZE] = {0};
char *passwd_p;
int ret;
int ch;
uint64_t range_start;
uint64_t range_length;
int locking_range_id;
struct spdk_opal_locking_range_info *info;
if (spdk_nvme_ctrlr_get_flags(iter->ctrlr) & SPDK_NVME_CTRLR_SECURITY_SEND_RECV_SUPPORTED) {
iter->opal_dev = spdk_opal_dev_construct(iter->ctrlr);
if (iter->opal_dev == NULL) {
return;
}
printf("Please input the password for setting up locking range:");
while ((ch = getchar()) != '\n' && ch != EOF);
passwd_p = get_line(passwd, SPDK_OPAL_MAX_PASSWORD_SIZE, stdin, true);
printf("\n");
if (passwd_p) {
printf("Specify locking range id:\n");
if (!scanf("%d", &locking_range_id)) {
printf("Invalid locking range id\n");
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
printf("range length:\n");
if (!scanf("%" SCNu64, &range_length)) {
printf("Invalid range length\n");
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
printf("range start:\n");
if (!scanf("%" SCNu64, &range_start)) {
printf("Invalid range start address\n");
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
while (getchar() != '\n');
ret = spdk_opal_cmd_setup_locking_range(iter->opal_dev,
OPAL_ADMIN1, locking_range_id, range_start, range_length, passwd_p);
if (ret) {
printf("Setup locking range failure: %d\n", ret);
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
ret = spdk_opal_cmd_get_locking_range_info(iter->opal_dev,
passwd_p, OPAL_ADMIN1, locking_range_id);
if (ret) {
printf("Get locking range info failure: %d\n", ret);
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
info = spdk_opal_get_locking_range_info(iter->opal_dev, locking_range_id);
printf("\nlocking range ID: %d\n", info->locking_range_id);
printf("range start: %" PRIu64 "\n", info->range_start);
printf("range length: %" PRIu64 "\n", info->range_length);
printf("read lock enabled: %d\n", info->read_lock_enabled);
printf("write lock enabled: %d\n", info->write_lock_enabled);
printf("read locked: %d\n", info->read_locked);
printf("write locked: %d\n", info->write_locked);
printf("...\n...\nOpal setup locking range success\n");
} else {
printf("Input password invalid. Opal setup locking range failure\n");
}
spdk_opal_dev_destruct(iter->opal_dev);
} else {
printf("%04x:%02x:%02x.%02x: NVMe Security Support/Receive Not supported.\nOpal Not Supported\n\n\n",
iter->pci_addr.domain, iter->pci_addr.bus, iter->pci_addr.dev, iter->pci_addr.func);
}
}
static void
opal_list_locking_ranges(struct dev *iter)
{
char passwd[SPDK_OPAL_MAX_PASSWORD_SIZE] = {0};
char *passwd_p;
int ret;
int ch;
int max_ranges;
int i;
struct spdk_opal_locking_range_info *info;
if (spdk_nvme_ctrlr_get_flags(iter->ctrlr) & SPDK_NVME_CTRLR_SECURITY_SEND_RECV_SUPPORTED) {
iter->opal_dev = spdk_opal_dev_construct(iter->ctrlr);
if (iter->opal_dev == NULL) {
return;
}
printf("Please input password:");
while ((ch = getchar()) != '\n' && ch != EOF);
passwd_p = get_line(passwd, SPDK_OPAL_MAX_PASSWORD_SIZE, stdin, true);
printf("\n");
if (passwd_p) {
ret = spdk_opal_cmd_get_max_ranges(iter->opal_dev, passwd_p);
if (ret <= 0) {
printf("get max ranges failure: %d\n", ret);
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
max_ranges = ret;
for (i = 0; i < max_ranges; i++) {
ret = spdk_opal_cmd_get_locking_range_info(iter->opal_dev,
passwd_p, OPAL_ADMIN1, i);
if (ret) {
printf("Get locking range info failure: %d\n", ret);
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
info = spdk_opal_get_locking_range_info(iter->opal_dev, i);
if (info == NULL) {
continue;
}
printf("===============================================\n");
printf("locking range ID: %d\t", info->locking_range_id);
if (i == 0) { printf("(Global Range)"); }
printf("\n===============================================\n");
printf("range start: %" PRIu64 "\t", info->range_start);
printf("range length: %" PRIu64 "\n", info->range_length);
printf("read lock enabled: %d\t", info->read_lock_enabled);
printf("write lock enabled: %d\t", info->write_lock_enabled);
printf("read locked: %d\t", info->read_locked);
printf("write locked: %d\n", info->write_locked);
printf("\n");
}
} else {
printf("Input password invalid. List locking ranges failure\n");
}
spdk_opal_dev_destruct(iter->opal_dev);
} else {
printf("%04x:%02x:%02x.%02x: NVMe Security Support/Receive Not supported.\nOpal Not Supported\n\n\n",
iter->pci_addr.domain, iter->pci_addr.bus, iter->pci_addr.dev, iter->pci_addr.func);
}
}
static void
opal_new_user_enable(struct dev *iter)
{
int user_id;
char passwd[SPDK_OPAL_MAX_PASSWORD_SIZE] = {0};
char *passwd_p;
char user_pw[SPDK_OPAL_MAX_PASSWORD_SIZE] = {0};
char *user_pw_p;
int ret;
int ch;
if (spdk_nvme_ctrlr_get_flags(iter->ctrlr) & SPDK_NVME_CTRLR_SECURITY_SEND_RECV_SUPPORTED) {
iter->opal_dev = spdk_opal_dev_construct(iter->ctrlr);
if (iter->opal_dev == NULL) {
return;
}
printf("Please input admin password:");
while ((ch = getchar()) != '\n' && ch != EOF);
passwd_p = get_line(passwd, SPDK_OPAL_MAX_PASSWORD_SIZE, stdin, true);
printf("\n");
if (passwd_p) {
printf("which user to enable: ");
if (!scanf("%d", &user_id)) {
printf("Invalid user id\n");
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
ret = spdk_opal_cmd_enable_user(iter->opal_dev, user_id, passwd_p);
if (ret) {
printf("Enable user failure error code: %d\n", ret);
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
printf("Please set a new password for this user:");
while ((ch = getchar()) != '\n' && ch != EOF);
user_pw_p = get_line(user_pw, SPDK_OPAL_MAX_PASSWORD_SIZE, stdin, true);
if (user_pw_p == NULL) {
printf("Input password invalid. Enable user failure\n");
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
ret = spdk_opal_cmd_set_new_passwd(iter->opal_dev, user_id, user_pw_p, passwd_p, true);
if (ret) {
printf("Set new password failure error code: %d\n", ret);
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
printf("\n...\n...\nEnable User Success\n");
} else {
printf("Input password invalid. Enable user failure\n");
}
spdk_opal_dev_destruct(iter->opal_dev);
} else {
printf("%04x:%02x:%02x.%02x: NVMe Security Support/Receive Not supported.\nOpal Not Supported\n\n\n",
iter->pci_addr.domain, iter->pci_addr.bus, iter->pci_addr.dev, iter->pci_addr.func);
}
}
static void
opal_change_password(struct dev *iter)
{
int user_id;
char old_passwd[SPDK_OPAL_MAX_PASSWORD_SIZE] = {0};
char *old_passwd_p;
char new_passwd[SPDK_OPAL_MAX_PASSWORD_SIZE] = {0};
char *new_passwd_p;
int ret;
int ch;
if (spdk_nvme_ctrlr_get_flags(iter->ctrlr) & SPDK_NVME_CTRLR_SECURITY_SEND_RECV_SUPPORTED) {
iter->opal_dev = spdk_opal_dev_construct(iter->ctrlr);
if (iter->opal_dev == NULL) {
return;
}
printf("user id: ");
if (!scanf("%d", &user_id)) {
printf("Invalid user id\n");
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
printf("Password:");
while ((ch = getchar()) != '\n' && ch != EOF);
old_passwd_p = get_line(old_passwd, SPDK_OPAL_MAX_PASSWORD_SIZE, stdin, true);
printf("\n");
if (old_passwd_p) {
printf("Please input new password:\n");
new_passwd_p = get_line(new_passwd, SPDK_OPAL_MAX_PASSWORD_SIZE, stdin, true);
printf("\n");
if (new_passwd_p == NULL) {
printf("Input password invalid. Change password failure\n");
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
ret = spdk_opal_cmd_set_new_passwd(iter->opal_dev, user_id, new_passwd_p, old_passwd_p, false);
if (ret) {
printf("Set new password failure error code: %d\n", ret);
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
printf("...\n...\nChange password Success\n");
} else {
printf("Input password invalid. Change password failure\n");
}
spdk_opal_dev_destruct(iter->opal_dev);
} else {
printf("%04x:%02x:%02x.%02x: NVMe Security Support/Receive Not supported.\nOpal Not Supported\n\n\n",
iter->pci_addr.domain, iter->pci_addr.bus, iter->pci_addr.dev, iter->pci_addr.func);
}
}
static void
opal_add_user_to_locking_range(struct dev *iter)
{
int locking_range_id, user_id;
char passwd[SPDK_OPAL_MAX_PASSWORD_SIZE] = {0};
char *passwd_p;
int ret;
int ch;
if (spdk_nvme_ctrlr_get_flags(iter->ctrlr) & SPDK_NVME_CTRLR_SECURITY_SEND_RECV_SUPPORTED) {
iter->opal_dev = spdk_opal_dev_construct(iter->ctrlr);
if (iter->opal_dev == NULL) {
return;
}
printf("Please input admin password:");
while ((ch = getchar()) != '\n' && ch != EOF);
passwd_p = get_line(passwd, SPDK_OPAL_MAX_PASSWORD_SIZE, stdin, true);
printf("\n");
if (passwd_p) {
printf("Specify locking range id:\n");
if (!scanf("%d", &locking_range_id)) {
printf("Invalid locking range id\n");
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
printf("which user to enable:\n");
if (!scanf("%d", &user_id)) {
printf("Invalid user id\n");
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
while (getchar() != '\n');
ret = spdk_opal_cmd_add_user_to_locking_range(iter->opal_dev, user_id, locking_range_id,
OPAL_READONLY, passwd_p);
ret += spdk_opal_cmd_add_user_to_locking_range(iter->opal_dev, user_id, locking_range_id,
OPAL_READWRITE, passwd_p);
if (ret) {
printf("Add user to locking range error: %d\n", ret);
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
printf("...\n...\nAdd user to locking range Success\n");
} else {
printf("Input password invalid. Add user to locking range failure\n");
}
spdk_opal_dev_destruct(iter->opal_dev);
} else {
printf("%04x:%02x:%02x.%02x: NVMe Security Support/Receive Not supported.\nOpal Not Supported\n\n\n",
iter->pci_addr.domain, iter->pci_addr.bus, iter->pci_addr.dev, iter->pci_addr.func);
}
}
static void
opal_user_lock_unlock_range(struct dev *iter)
{
char passwd[SPDK_OPAL_MAX_PASSWORD_SIZE] = {0};
char *passwd_p;
int ch;
int ret;
int user_id;
int locking_range_id;
int state;
enum spdk_opal_lock_state state_flag;
if (spdk_nvme_ctrlr_get_flags(iter->ctrlr) & SPDK_NVME_CTRLR_SECURITY_SEND_RECV_SUPPORTED) {
iter->opal_dev = spdk_opal_dev_construct(iter->ctrlr);
if (iter->opal_dev == NULL) {
return;
}
printf("User id: ");
if (!scanf("%d", &user_id)) {
printf("Invalid user id\n");
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
printf("Please input password:");
while ((ch = getchar()) != '\n' && ch != EOF);
passwd_p = get_line(passwd, SPDK_OPAL_MAX_PASSWORD_SIZE, stdin, true);
printf("\n");
if (passwd_p) {
printf("Specify locking range id:\n");
if (!scanf("%d", &locking_range_id)) {
printf("Invalid locking range id\n");
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
opal_locking_usage();
if (!scanf("%d", &state)) {
printf("Invalid option\n");
}
switch (state) {
case 1:
state_flag = OPAL_RWLOCK;
break;
case 2:
state_flag = OPAL_READONLY;
break;
case 3:
state_flag = OPAL_READWRITE;
break;
default:
printf("Invalid options\n");
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
while (getchar() != '\n');
ret = spdk_opal_cmd_lock_unlock(iter->opal_dev, user_id, state_flag,
locking_range_id, passwd_p);
if (ret) {
printf("lock/unlock range failure: %d\n", ret);
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
printf("...\n...\nLock/unlock range Success\n");
} else {
printf("Input password invalid. lock/unlock range failure\n");
}
spdk_opal_dev_destruct(iter->opal_dev);
} else {
printf("%04x:%02x:%02x.%02x: NVMe Security Support/Receive Not supported.\nOpal Not Supported\n\n\n",
iter->pci_addr.domain, iter->pci_addr.bus, iter->pci_addr.dev, iter->pci_addr.func);
}
}
static void
opal_revert_tper(struct dev *iter)
{
char passwd[SPDK_OPAL_MAX_PASSWORD_SIZE] = {0};
char *passwd_p;
int ret;
int ch;
if (spdk_nvme_ctrlr_get_flags(iter->ctrlr) & SPDK_NVME_CTRLR_SECURITY_SEND_RECV_SUPPORTED) {
iter->opal_dev = spdk_opal_dev_construct(iter->ctrlr);
if (iter->opal_dev == NULL) {
return;
}
printf("Please be noted this operation will erase ALL DATA on this drive\n");
printf("Please don't terminate this execution. Otherwise undefined error may occur\n");
printf("Please input password for revert TPer:");
while ((ch = getchar()) != '\n' && ch != EOF);
passwd_p = get_line(passwd, SPDK_OPAL_MAX_PASSWORD_SIZE, stdin, true);
printf("\n...\n");
if (passwd_p) {
ret = spdk_opal_cmd_revert_tper(iter->opal_dev, passwd_p);
if (ret) {
printf("Revert TPer failure: %d\n", ret);
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
printf("...\nRevert TPer Success\n");
} else {
printf("Input password invalid. Revert TPer failure\n");
}
spdk_opal_dev_destruct(iter->opal_dev);
} else {
printf("%04x:%02x:%02x.%02x: NVMe Security Support/Receive Not supported.\nOpal Not Supported\n\n\n",
iter->pci_addr.domain, iter->pci_addr.bus, iter->pci_addr.dev, iter->pci_addr.func);
}
}
static void
opal_erase_locking_range(struct dev *iter)
{
char passwd[SPDK_OPAL_MAX_PASSWORD_SIZE] = {0};
char *passwd_p;
int ret;
int ch;
int locking_range_id;
if (spdk_nvme_ctrlr_get_flags(iter->ctrlr) & SPDK_NVME_CTRLR_SECURITY_SEND_RECV_SUPPORTED) {
iter->opal_dev = spdk_opal_dev_construct(iter->ctrlr);
if (iter->opal_dev == NULL) {
return;
}
printf("Please be noted this operation will erase ALL DATA on this range\n");
printf("Please input password for erase locking range:");
while ((ch = getchar()) != '\n' && ch != EOF);
passwd_p = get_line(passwd, SPDK_OPAL_MAX_PASSWORD_SIZE, stdin, true);
if (passwd_p) {
printf("\nSpecify locking range id:\n");
if (!scanf("%d", &locking_range_id)) {
printf("Invalid locking range id\n");
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
printf("\n...\n");
ret = spdk_opal_cmd_secure_erase_locking_range(iter->opal_dev, OPAL_ADMIN1, locking_range_id,
passwd_p);
if (ret) {
printf("Erase locking range failure: %d\n", ret);
spdk_opal_dev_destruct(iter->opal_dev);
return;
}
printf("...\nErase locking range Success\n");
} else {
printf("Input password invalid. Erase locking range failure\n");
}
spdk_opal_dev_destruct(iter->opal_dev);
} else {
printf("%04x:%02x:%02x.%02x: NVMe Security Support/Receive Not supported.\nOpal Not Supported\n\n\n",
iter->pci_addr.domain, iter->pci_addr.bus, iter->pci_addr.dev, iter->pci_addr.func);
}
}
static void
test_opal(void)
{
int exit_flag = false;
struct dev *ctrlr;
ctrlr = get_controller();
if (ctrlr == NULL) {
printf("Invalid controller PCI Address.\n");
return;
}
opal_usage();
while (!exit_flag) {
int cmd;
if (!scanf("%d", &cmd)) {
printf("Invalid Command: command must be number 0-9\n");
while (getchar() != '\n');
opal_usage();
continue;
}
switch (cmd) {
case 0:
exit_flag = true;
continue;
case 1:
opal_scan(ctrlr);
break;
case 2:
opal_init(ctrlr); /* Take ownership, Activate Locking SP */
break;
case 3:
opal_revert_tper(ctrlr);
break;
case 4:
opal_setup_lockingrange(ctrlr);
break;
case 5:
opal_list_locking_ranges(ctrlr);
break;
case 6:
opal_new_user_enable(ctrlr);
break;
case 7:
opal_change_password(ctrlr);
break;
case 8:
opal_add_user_to_locking_range(ctrlr);
break;
case 9:
opal_user_lock_unlock_range(ctrlr);
break;
case 10:
opal_erase_locking_range(ctrlr);
break;
default:
printf("Invalid option\n");
}
printf("\npress Enter to display Opal cmd menu ...\n");
while (getchar() != '\n');
opal_usage();
}
}
static void
args_usage(const char *program_name)
{
printf("%s [options]", program_name);
printf("\n");
printf("options:\n");
printf(" -i shared memory group ID\n");
}
static int
parse_args(int argc, char **argv)
{
int op;
while ((op = getopt(argc, argv, "i:")) != -1) {
switch (op) {
case 'i':
g_shm_id = spdk_strtol(optarg, 10);
if (g_shm_id < 0) {
fprintf(stderr, "Invalid shared memory ID\n");
return g_shm_id;
}
break;
default:
args_usage(argv[0]);
return 1;
}
}
return 0;
}
int main(int argc, char **argv)
{
int rc;
struct spdk_env_opts opts;
struct dev *dev;
struct spdk_nvme_detach_ctx *detach_ctx = NULL;
rc = parse_args(argc, argv);
if (rc != 0) {
return rc;
}
spdk_env_opts_init(&opts);
opts.name = "nvme_manage";
opts.core_mask = "0x1";
opts.shm_id = g_shm_id;
if (spdk_env_init(&opts) < 0) {
fprintf(stderr, "Unable to initialize SPDK env\n");
return 1;
}
if (spdk_nvme_probe(NULL, NULL, probe_cb, attach_cb, NULL) != 0) {
fprintf(stderr, "spdk_nvme_probe() failed\n");
spdk_env_fini();
return 1;
}
qsort(devs, num_devs, sizeof(devs[0]), cmp_devs);
usage();
while (1) {
int cmd;
bool exit_flag = false;
if (!scanf("%d", &cmd)) {
printf("Invalid Command: command must be number 1-8\n");
while (getchar() != '\n');
usage();
continue;
}
switch (cmd) {
case 1:
display_controller_list();
break;
case 2:
add_ns();
break;
case 3:
delete_ns();
break;
case 4:
attach_and_detach_ns(SPDK_NVME_NS_CTRLR_ATTACH);
break;
case 5:
attach_and_detach_ns(SPDK_NVME_NS_CTRLR_DETACH);
break;
case 6:
format_nvm();
break;
case 7:
update_firmware_image();
break;
case 8:
test_opal();
break;
case 9:
exit_flag = true;
break;
default:
printf("Invalid Command\n");
break;
}
if (exit_flag) {
break;
}
while (getchar() != '\n');
printf("press Enter to display cmd menu ...\n");
while (getchar() != '\n');
usage();
}
printf("Cleaning up...\n");
foreach_dev(dev) {
spdk_nvme_detach_async(dev->ctrlr, &detach_ctx);
}
if (detach_ctx) {
spdk_nvme_detach_poll(detach_ctx);
}
spdk_env_fini();
return 0;
}