Commit | Line | Data |
---|---|---|
05236ea6 BZ |
1 | /* |
2 | * IDE ioctls handling. | |
3 | */ | |
4 | ||
5 | #include <linux/hdreg.h> | |
6 | #include <linux/ide.h> | |
5a0e3ad6 | 7 | #include <linux/slab.h> |
05236ea6 BZ |
8 | |
9 | static const struct ide_ioctl_devset ide_ioctl_settings[] = { | |
92f1f8fd EO |
10 | { HDIO_GET_32BIT, HDIO_SET_32BIT, &ide_devset_io_32bit }, |
11 | { HDIO_GET_KEEPSETTINGS, HDIO_SET_KEEPSETTINGS, &ide_devset_keepsettings }, | |
12 | { HDIO_GET_UNMASKINTR, HDIO_SET_UNMASKINTR, &ide_devset_unmaskirq }, | |
13 | { HDIO_GET_DMA, HDIO_SET_DMA, &ide_devset_using_dma }, | |
14 | { -1, HDIO_SET_PIO_MODE, &ide_devset_pio_mode }, | |
05236ea6 BZ |
15 | { 0 } |
16 | }; | |
17 | ||
18 | int ide_setting_ioctl(ide_drive_t *drive, struct block_device *bdev, | |
19 | unsigned int cmd, unsigned long arg, | |
20 | const struct ide_ioctl_devset *s) | |
21 | { | |
92f1f8fd | 22 | const struct ide_devset *ds; |
05236ea6 BZ |
23 | int err = -EOPNOTSUPP; |
24 | ||
92f1f8fd EO |
25 | for (; (ds = s->setting); s++) { |
26 | if (ds->get && s->get_ioctl == cmd) | |
05236ea6 | 27 | goto read_val; |
92f1f8fd | 28 | else if (ds->set && s->set_ioctl == cmd) |
05236ea6 BZ |
29 | goto set_val; |
30 | } | |
31 | ||
32 | return err; | |
33 | ||
34 | read_val: | |
35 | mutex_lock(&ide_setting_mtx); | |
92f1f8fd | 36 | err = ds->get(drive); |
05236ea6 BZ |
37 | mutex_unlock(&ide_setting_mtx); |
38 | return err >= 0 ? put_user(err, (long __user *)arg) : err; | |
39 | ||
40 | set_val: | |
41 | if (bdev != bdev->bd_contains) | |
42 | err = -EINVAL; | |
43 | else { | |
44 | if (!capable(CAP_SYS_ADMIN)) | |
45 | err = -EACCES; | |
46 | else { | |
47 | mutex_lock(&ide_setting_mtx); | |
92f1f8fd | 48 | err = ide_devset_execute(drive, ds, arg); |
05236ea6 BZ |
49 | mutex_unlock(&ide_setting_mtx); |
50 | } | |
51 | } | |
52 | return err; | |
53 | } | |
54 | EXPORT_SYMBOL_GPL(ide_setting_ioctl); | |
55 | ||
56 | static int ide_get_identity_ioctl(ide_drive_t *drive, unsigned int cmd, | |
57 | unsigned long arg) | |
58 | { | |
59 | u16 *id = NULL; | |
60 | int size = (cmd == HDIO_GET_IDENTITY) ? (ATA_ID_WORDS * 2) : 142; | |
61 | int rc = 0; | |
62 | ||
97100fc8 | 63 | if ((drive->dev_flags & IDE_DFLAG_ID_READ) == 0) { |
05236ea6 BZ |
64 | rc = -ENOMSG; |
65 | goto out; | |
66 | } | |
67 | ||
e18ed145 CE |
68 | /* ata_id_to_hd_driveid() relies on 'id' to be fully allocated. */ |
69 | id = kmalloc(ATA_ID_WORDS * 2, GFP_KERNEL); | |
05236ea6 BZ |
70 | if (id == NULL) { |
71 | rc = -ENOMEM; | |
72 | goto out; | |
73 | } | |
74 | ||
75 | memcpy(id, drive->id, size); | |
76 | ata_id_to_hd_driveid(id); | |
77 | ||
78 | if (copy_to_user((void __user *)arg, id, size)) | |
79 | rc = -EFAULT; | |
80 | ||
81 | kfree(id); | |
82 | out: | |
83 | return rc; | |
84 | } | |
85 | ||
86 | static int ide_get_nice_ioctl(ide_drive_t *drive, unsigned long arg) | |
87 | { | |
97100fc8 BZ |
88 | return put_user((!!(drive->dev_flags & IDE_DFLAG_DSC_OVERLAP) |
89 | << IDE_NICE_DSC_OVERLAP) | | |
90 | (!!(drive->dev_flags & IDE_DFLAG_NICE1) | |
91 | << IDE_NICE_1), (long __user *)arg); | |
05236ea6 BZ |
92 | } |
93 | ||
94 | static int ide_set_nice_ioctl(ide_drive_t *drive, unsigned long arg) | |
95 | { | |
96 | if (arg != (arg & ((1 << IDE_NICE_DSC_OVERLAP) | (1 << IDE_NICE_1)))) | |
97 | return -EPERM; | |
98 | ||
99 | if (((arg >> IDE_NICE_DSC_OVERLAP) & 1) && | |
5317464d | 100 | (drive->media != ide_tape)) |
05236ea6 BZ |
101 | return -EPERM; |
102 | ||
97100fc8 BZ |
103 | if ((arg >> IDE_NICE_DSC_OVERLAP) & 1) |
104 | drive->dev_flags |= IDE_DFLAG_DSC_OVERLAP; | |
105 | else | |
106 | drive->dev_flags &= ~IDE_DFLAG_DSC_OVERLAP; | |
107 | ||
108 | if ((arg >> IDE_NICE_1) & 1) | |
109 | drive->dev_flags |= IDE_DFLAG_NICE1; | |
110 | else | |
111 | drive->dev_flags &= ~IDE_DFLAG_NICE1; | |
05236ea6 BZ |
112 | |
113 | return 0; | |
114 | } | |
115 | ||
22aa4b32 | 116 | static int ide_cmd_ioctl(ide_drive_t *drive, unsigned long arg) |
05236ea6 BZ |
117 | { |
118 | u8 *buf = NULL; | |
119 | int bufsize = 0, err = 0; | |
120 | u8 args[4], xfer_rate = 0; | |
22aa4b32 BZ |
121 | struct ide_cmd cmd; |
122 | struct ide_taskfile *tf = &cmd.tf; | |
05236ea6 BZ |
123 | |
124 | if (NULL == (void *) arg) { | |
125 | struct request *rq; | |
126 | ||
127 | rq = blk_get_request(drive->queue, READ, __GFP_WAIT); | |
128 | rq->cmd_type = REQ_TYPE_ATA_TASKFILE; | |
129 | err = blk_execute_rq(drive->queue, NULL, rq, 0); | |
130 | blk_put_request(rq); | |
131 | ||
132 | return err; | |
133 | } | |
134 | ||
135 | if (copy_from_user(args, (void __user *)arg, 4)) | |
136 | return -EFAULT; | |
137 | ||
22aa4b32 | 138 | memset(&cmd, 0, sizeof(cmd)); |
05236ea6 BZ |
139 | tf->feature = args[2]; |
140 | if (args[0] == ATA_CMD_SMART) { | |
141 | tf->nsect = args[3]; | |
142 | tf->lbal = args[1]; | |
143 | tf->lbam = 0x4f; | |
144 | tf->lbah = 0xc2; | |
60f85019 SS |
145 | cmd.valid.out.tf = IDE_VALID_OUT_TF; |
146 | cmd.valid.in.tf = IDE_VALID_NSECT; | |
05236ea6 BZ |
147 | } else { |
148 | tf->nsect = args[1]; | |
60f85019 SS |
149 | cmd.valid.out.tf = IDE_VALID_FEATURE | IDE_VALID_NSECT; |
150 | cmd.valid.in.tf = IDE_VALID_NSECT; | |
05236ea6 BZ |
151 | } |
152 | tf->command = args[0]; | |
0dfb991c | 153 | cmd.protocol = args[3] ? ATA_PROT_PIO : ATA_PROT_NODATA; |
05236ea6 BZ |
154 | |
155 | if (args[3]) { | |
22aa4b32 | 156 | cmd.tf_flags |= IDE_TFLAG_IO_16BIT; |
05236ea6 BZ |
157 | bufsize = SECTOR_SIZE * args[3]; |
158 | buf = kzalloc(bufsize, GFP_KERNEL); | |
159 | if (buf == NULL) | |
160 | return -ENOMEM; | |
161 | } | |
162 | ||
163 | if (tf->command == ATA_CMD_SET_FEATURES && | |
164 | tf->feature == SETFEATURES_XFER && | |
a9c41509 | 165 | tf->nsect >= XFER_SW_DMA_0) { |
28c1969f | 166 | xfer_rate = ide_find_dma_mode(drive, tf->nsect); |
a9c41509 BZ |
167 | if (xfer_rate != tf->nsect) { |
168 | err = -EINVAL; | |
05236ea6 BZ |
169 | goto abort; |
170 | } | |
665d66e8 BZ |
171 | |
172 | cmd.tf_flags |= IDE_TFLAG_SET_XFER; | |
05236ea6 BZ |
173 | } |
174 | ||
22aa4b32 | 175 | err = ide_raw_taskfile(drive, &cmd, buf, args[3]); |
05236ea6 BZ |
176 | |
177 | args[0] = tf->status; | |
178 | args[1] = tf->error; | |
179 | args[2] = tf->nsect; | |
05236ea6 BZ |
180 | abort: |
181 | if (copy_to_user((void __user *)arg, &args, 4)) | |
182 | err = -EFAULT; | |
183 | if (buf) { | |
184 | if (copy_to_user((void __user *)(arg + 4), buf, bufsize)) | |
185 | err = -EFAULT; | |
186 | kfree(buf); | |
187 | } | |
188 | return err; | |
189 | } | |
190 | ||
22aa4b32 | 191 | static int ide_task_ioctl(ide_drive_t *drive, unsigned long arg) |
05236ea6 BZ |
192 | { |
193 | void __user *p = (void __user *)arg; | |
194 | int err = 0; | |
195 | u8 args[7]; | |
22aa4b32 | 196 | struct ide_cmd cmd; |
05236ea6 BZ |
197 | |
198 | if (copy_from_user(args, p, 7)) | |
199 | return -EFAULT; | |
200 | ||
22aa4b32 | 201 | memset(&cmd, 0, sizeof(cmd)); |
745483f1 | 202 | memcpy(&cmd.tf.feature, &args[1], 6); |
22aa4b32 | 203 | cmd.tf.command = args[0]; |
60f85019 SS |
204 | cmd.valid.out.tf = IDE_VALID_OUT_TF | IDE_VALID_DEVICE; |
205 | cmd.valid.in.tf = IDE_VALID_IN_TF | IDE_VALID_DEVICE; | |
05236ea6 | 206 | |
22aa4b32 | 207 | err = ide_no_data_taskfile(drive, &cmd); |
05236ea6 | 208 | |
22aa4b32 | 209 | args[0] = cmd.tf.command; |
745483f1 | 210 | memcpy(&args[1], &cmd.tf.feature, 6); |
05236ea6 BZ |
211 | |
212 | if (copy_to_user(p, args, 7)) | |
213 | err = -EFAULT; | |
214 | ||
215 | return err; | |
216 | } | |
217 | ||
218 | static int generic_drive_reset(ide_drive_t *drive) | |
219 | { | |
220 | struct request *rq; | |
221 | int ret = 0; | |
222 | ||
223 | rq = blk_get_request(drive->queue, READ, __GFP_WAIT); | |
224 | rq->cmd_type = REQ_TYPE_SPECIAL; | |
225 | rq->cmd_len = 1; | |
226 | rq->cmd[0] = REQ_DRIVE_RESET; | |
05236ea6 BZ |
227 | if (blk_execute_rq(drive->queue, NULL, rq, 1)) |
228 | ret = rq->errors; | |
229 | blk_put_request(rq); | |
230 | return ret; | |
231 | } | |
232 | ||
1bddd9e6 | 233 | int generic_ide_ioctl(ide_drive_t *drive, struct block_device *bdev, |
05236ea6 BZ |
234 | unsigned int cmd, unsigned long arg) |
235 | { | |
236 | int err; | |
237 | ||
238 | err = ide_setting_ioctl(drive, bdev, cmd, arg, ide_ioctl_settings); | |
239 | if (err != -EOPNOTSUPP) | |
240 | return err; | |
241 | ||
242 | switch (cmd) { | |
243 | case HDIO_OBSOLETE_IDENTITY: | |
244 | case HDIO_GET_IDENTITY: | |
245 | if (bdev != bdev->bd_contains) | |
246 | return -EINVAL; | |
247 | return ide_get_identity_ioctl(drive, cmd, arg); | |
248 | case HDIO_GET_NICE: | |
249 | return ide_get_nice_ioctl(drive, arg); | |
250 | case HDIO_SET_NICE: | |
251 | if (!capable(CAP_SYS_ADMIN)) | |
252 | return -EACCES; | |
253 | return ide_set_nice_ioctl(drive, arg); | |
254 | #ifdef CONFIG_IDE_TASK_IOCTL | |
255 | case HDIO_DRIVE_TASKFILE: | |
256 | if (!capable(CAP_SYS_ADMIN) || !capable(CAP_SYS_RAWIO)) | |
257 | return -EACCES; | |
258 | if (drive->media == ide_disk) | |
22aa4b32 | 259 | return ide_taskfile_ioctl(drive, arg); |
05236ea6 BZ |
260 | return -ENOMSG; |
261 | #endif | |
262 | case HDIO_DRIVE_CMD: | |
263 | if (!capable(CAP_SYS_RAWIO)) | |
264 | return -EACCES; | |
22aa4b32 | 265 | return ide_cmd_ioctl(drive, arg); |
05236ea6 BZ |
266 | case HDIO_DRIVE_TASK: |
267 | if (!capable(CAP_SYS_RAWIO)) | |
268 | return -EACCES; | |
22aa4b32 | 269 | return ide_task_ioctl(drive, arg); |
05236ea6 BZ |
270 | case HDIO_DRIVE_RESET: |
271 | if (!capable(CAP_SYS_ADMIN)) | |
272 | return -EACCES; | |
273 | return generic_drive_reset(drive); | |
274 | case HDIO_GET_BUSSTATE: | |
275 | if (!capable(CAP_SYS_ADMIN)) | |
276 | return -EACCES; | |
277 | if (put_user(BUSSTATE_ON, (long __user *)arg)) | |
278 | return -EFAULT; | |
279 | return 0; | |
280 | case HDIO_SET_BUSSTATE: | |
281 | if (!capable(CAP_SYS_ADMIN)) | |
282 | return -EACCES; | |
283 | return -EOPNOTSUPP; | |
284 | default: | |
285 | return -EINVAL; | |
286 | } | |
287 | } | |
288 | EXPORT_SYMBOL(generic_ide_ioctl); |