Commit | Line | Data |
---|---|---|
05236ea6 BZ |
1 | /* |
2 | * IDE ioctls handling. | |
3 | */ | |
4 | ||
38789fda | 5 | #include <linux/export.h> |
05236ea6 BZ |
6 | #include <linux/hdreg.h> |
7 | #include <linux/ide.h> | |
5a0e3ad6 | 8 | #include <linux/slab.h> |
05236ea6 BZ |
9 | |
10 | static const struct ide_ioctl_devset ide_ioctl_settings[] = { | |
92f1f8fd EO |
11 | { HDIO_GET_32BIT, HDIO_SET_32BIT, &ide_devset_io_32bit }, |
12 | { HDIO_GET_KEEPSETTINGS, HDIO_SET_KEEPSETTINGS, &ide_devset_keepsettings }, | |
13 | { HDIO_GET_UNMASKINTR, HDIO_SET_UNMASKINTR, &ide_devset_unmaskirq }, | |
14 | { HDIO_GET_DMA, HDIO_SET_DMA, &ide_devset_using_dma }, | |
15 | { -1, HDIO_SET_PIO_MODE, &ide_devset_pio_mode }, | |
05236ea6 BZ |
16 | { 0 } |
17 | }; | |
18 | ||
19 | int ide_setting_ioctl(ide_drive_t *drive, struct block_device *bdev, | |
20 | unsigned int cmd, unsigned long arg, | |
21 | const struct ide_ioctl_devset *s) | |
22 | { | |
92f1f8fd | 23 | const struct ide_devset *ds; |
05236ea6 BZ |
24 | int err = -EOPNOTSUPP; |
25 | ||
92f1f8fd EO |
26 | for (; (ds = s->setting); s++) { |
27 | if (ds->get && s->get_ioctl == cmd) | |
05236ea6 | 28 | goto read_val; |
92f1f8fd | 29 | else if (ds->set && s->set_ioctl == cmd) |
05236ea6 BZ |
30 | goto set_val; |
31 | } | |
32 | ||
33 | return err; | |
34 | ||
35 | read_val: | |
36 | mutex_lock(&ide_setting_mtx); | |
92f1f8fd | 37 | err = ds->get(drive); |
05236ea6 BZ |
38 | mutex_unlock(&ide_setting_mtx); |
39 | return err >= 0 ? put_user(err, (long __user *)arg) : err; | |
40 | ||
41 | set_val: | |
42 | if (bdev != bdev->bd_contains) | |
43 | err = -EINVAL; | |
44 | else { | |
45 | if (!capable(CAP_SYS_ADMIN)) | |
46 | err = -EACCES; | |
47 | else { | |
48 | mutex_lock(&ide_setting_mtx); | |
92f1f8fd | 49 | err = ide_devset_execute(drive, ds, arg); |
05236ea6 BZ |
50 | mutex_unlock(&ide_setting_mtx); |
51 | } | |
52 | } | |
53 | return err; | |
54 | } | |
55 | EXPORT_SYMBOL_GPL(ide_setting_ioctl); | |
56 | ||
57 | static int ide_get_identity_ioctl(ide_drive_t *drive, unsigned int cmd, | |
58 | unsigned long arg) | |
59 | { | |
60 | u16 *id = NULL; | |
61 | int size = (cmd == HDIO_GET_IDENTITY) ? (ATA_ID_WORDS * 2) : 142; | |
62 | int rc = 0; | |
63 | ||
97100fc8 | 64 | if ((drive->dev_flags & IDE_DFLAG_ID_READ) == 0) { |
05236ea6 BZ |
65 | rc = -ENOMSG; |
66 | goto out; | |
67 | } | |
68 | ||
e18ed145 CE |
69 | /* ata_id_to_hd_driveid() relies on 'id' to be fully allocated. */ |
70 | id = kmalloc(ATA_ID_WORDS * 2, GFP_KERNEL); | |
05236ea6 BZ |
71 | if (id == NULL) { |
72 | rc = -ENOMEM; | |
73 | goto out; | |
74 | } | |
75 | ||
76 | memcpy(id, drive->id, size); | |
77 | ata_id_to_hd_driveid(id); | |
78 | ||
79 | if (copy_to_user((void __user *)arg, id, size)) | |
80 | rc = -EFAULT; | |
81 | ||
82 | kfree(id); | |
83 | out: | |
84 | return rc; | |
85 | } | |
86 | ||
87 | static int ide_get_nice_ioctl(ide_drive_t *drive, unsigned long arg) | |
88 | { | |
97100fc8 BZ |
89 | return put_user((!!(drive->dev_flags & IDE_DFLAG_DSC_OVERLAP) |
90 | << IDE_NICE_DSC_OVERLAP) | | |
91 | (!!(drive->dev_flags & IDE_DFLAG_NICE1) | |
92 | << IDE_NICE_1), (long __user *)arg); | |
05236ea6 BZ |
93 | } |
94 | ||
95 | static int ide_set_nice_ioctl(ide_drive_t *drive, unsigned long arg) | |
96 | { | |
97 | if (arg != (arg & ((1 << IDE_NICE_DSC_OVERLAP) | (1 << IDE_NICE_1)))) | |
98 | return -EPERM; | |
99 | ||
100 | if (((arg >> IDE_NICE_DSC_OVERLAP) & 1) && | |
5317464d | 101 | (drive->media != ide_tape)) |
05236ea6 BZ |
102 | return -EPERM; |
103 | ||
97100fc8 BZ |
104 | if ((arg >> IDE_NICE_DSC_OVERLAP) & 1) |
105 | drive->dev_flags |= IDE_DFLAG_DSC_OVERLAP; | |
106 | else | |
107 | drive->dev_flags &= ~IDE_DFLAG_DSC_OVERLAP; | |
108 | ||
109 | if ((arg >> IDE_NICE_1) & 1) | |
110 | drive->dev_flags |= IDE_DFLAG_NICE1; | |
111 | else | |
112 | drive->dev_flags &= ~IDE_DFLAG_NICE1; | |
05236ea6 BZ |
113 | |
114 | return 0; | |
115 | } | |
116 | ||
22aa4b32 | 117 | static int ide_cmd_ioctl(ide_drive_t *drive, unsigned long arg) |
05236ea6 BZ |
118 | { |
119 | u8 *buf = NULL; | |
120 | int bufsize = 0, err = 0; | |
121 | u8 args[4], xfer_rate = 0; | |
22aa4b32 BZ |
122 | struct ide_cmd cmd; |
123 | struct ide_taskfile *tf = &cmd.tf; | |
05236ea6 BZ |
124 | |
125 | if (NULL == (void *) arg) { | |
126 | struct request *rq; | |
127 | ||
128 | rq = blk_get_request(drive->queue, READ, __GFP_WAIT); | |
129 | rq->cmd_type = REQ_TYPE_ATA_TASKFILE; | |
130 | err = blk_execute_rq(drive->queue, NULL, rq, 0); | |
131 | blk_put_request(rq); | |
132 | ||
133 | return err; | |
134 | } | |
135 | ||
136 | if (copy_from_user(args, (void __user *)arg, 4)) | |
137 | return -EFAULT; | |
138 | ||
22aa4b32 | 139 | memset(&cmd, 0, sizeof(cmd)); |
05236ea6 BZ |
140 | tf->feature = args[2]; |
141 | if (args[0] == ATA_CMD_SMART) { | |
142 | tf->nsect = args[3]; | |
143 | tf->lbal = args[1]; | |
144 | tf->lbam = 0x4f; | |
145 | tf->lbah = 0xc2; | |
60f85019 SS |
146 | cmd.valid.out.tf = IDE_VALID_OUT_TF; |
147 | cmd.valid.in.tf = IDE_VALID_NSECT; | |
05236ea6 BZ |
148 | } else { |
149 | tf->nsect = args[1]; | |
60f85019 SS |
150 | cmd.valid.out.tf = IDE_VALID_FEATURE | IDE_VALID_NSECT; |
151 | cmd.valid.in.tf = IDE_VALID_NSECT; | |
05236ea6 BZ |
152 | } |
153 | tf->command = args[0]; | |
0dfb991c | 154 | cmd.protocol = args[3] ? ATA_PROT_PIO : ATA_PROT_NODATA; |
05236ea6 BZ |
155 | |
156 | if (args[3]) { | |
22aa4b32 | 157 | cmd.tf_flags |= IDE_TFLAG_IO_16BIT; |
05236ea6 BZ |
158 | bufsize = SECTOR_SIZE * args[3]; |
159 | buf = kzalloc(bufsize, GFP_KERNEL); | |
160 | if (buf == NULL) | |
161 | return -ENOMEM; | |
162 | } | |
163 | ||
164 | if (tf->command == ATA_CMD_SET_FEATURES && | |
165 | tf->feature == SETFEATURES_XFER && | |
a9c41509 | 166 | tf->nsect >= XFER_SW_DMA_0) { |
28c1969f | 167 | xfer_rate = ide_find_dma_mode(drive, tf->nsect); |
a9c41509 BZ |
168 | if (xfer_rate != tf->nsect) { |
169 | err = -EINVAL; | |
05236ea6 BZ |
170 | goto abort; |
171 | } | |
665d66e8 BZ |
172 | |
173 | cmd.tf_flags |= IDE_TFLAG_SET_XFER; | |
05236ea6 BZ |
174 | } |
175 | ||
22aa4b32 | 176 | err = ide_raw_taskfile(drive, &cmd, buf, args[3]); |
05236ea6 BZ |
177 | |
178 | args[0] = tf->status; | |
179 | args[1] = tf->error; | |
180 | args[2] = tf->nsect; | |
05236ea6 BZ |
181 | abort: |
182 | if (copy_to_user((void __user *)arg, &args, 4)) | |
183 | err = -EFAULT; | |
184 | if (buf) { | |
185 | if (copy_to_user((void __user *)(arg + 4), buf, bufsize)) | |
186 | err = -EFAULT; | |
187 | kfree(buf); | |
188 | } | |
189 | return err; | |
190 | } | |
191 | ||
22aa4b32 | 192 | static int ide_task_ioctl(ide_drive_t *drive, unsigned long arg) |
05236ea6 BZ |
193 | { |
194 | void __user *p = (void __user *)arg; | |
195 | int err = 0; | |
196 | u8 args[7]; | |
22aa4b32 | 197 | struct ide_cmd cmd; |
05236ea6 BZ |
198 | |
199 | if (copy_from_user(args, p, 7)) | |
200 | return -EFAULT; | |
201 | ||
22aa4b32 | 202 | memset(&cmd, 0, sizeof(cmd)); |
745483f1 | 203 | memcpy(&cmd.tf.feature, &args[1], 6); |
22aa4b32 | 204 | cmd.tf.command = args[0]; |
60f85019 SS |
205 | cmd.valid.out.tf = IDE_VALID_OUT_TF | IDE_VALID_DEVICE; |
206 | cmd.valid.in.tf = IDE_VALID_IN_TF | IDE_VALID_DEVICE; | |
05236ea6 | 207 | |
22aa4b32 | 208 | err = ide_no_data_taskfile(drive, &cmd); |
05236ea6 | 209 | |
22aa4b32 | 210 | args[0] = cmd.tf.command; |
745483f1 | 211 | memcpy(&args[1], &cmd.tf.feature, 6); |
05236ea6 BZ |
212 | |
213 | if (copy_to_user(p, args, 7)) | |
214 | err = -EFAULT; | |
215 | ||
216 | return err; | |
217 | } | |
218 | ||
219 | static int generic_drive_reset(ide_drive_t *drive) | |
220 | { | |
221 | struct request *rq; | |
222 | int ret = 0; | |
223 | ||
224 | rq = blk_get_request(drive->queue, READ, __GFP_WAIT); | |
225 | rq->cmd_type = REQ_TYPE_SPECIAL; | |
226 | rq->cmd_len = 1; | |
227 | rq->cmd[0] = REQ_DRIVE_RESET; | |
05236ea6 BZ |
228 | if (blk_execute_rq(drive->queue, NULL, rq, 1)) |
229 | ret = rq->errors; | |
230 | blk_put_request(rq); | |
231 | return ret; | |
232 | } | |
233 | ||
1bddd9e6 | 234 | int generic_ide_ioctl(ide_drive_t *drive, struct block_device *bdev, |
05236ea6 BZ |
235 | unsigned int cmd, unsigned long arg) |
236 | { | |
237 | int err; | |
238 | ||
239 | err = ide_setting_ioctl(drive, bdev, cmd, arg, ide_ioctl_settings); | |
240 | if (err != -EOPNOTSUPP) | |
241 | return err; | |
242 | ||
243 | switch (cmd) { | |
244 | case HDIO_OBSOLETE_IDENTITY: | |
245 | case HDIO_GET_IDENTITY: | |
246 | if (bdev != bdev->bd_contains) | |
247 | return -EINVAL; | |
248 | return ide_get_identity_ioctl(drive, cmd, arg); | |
249 | case HDIO_GET_NICE: | |
250 | return ide_get_nice_ioctl(drive, arg); | |
251 | case HDIO_SET_NICE: | |
252 | if (!capable(CAP_SYS_ADMIN)) | |
253 | return -EACCES; | |
254 | return ide_set_nice_ioctl(drive, arg); | |
255 | #ifdef CONFIG_IDE_TASK_IOCTL | |
256 | case HDIO_DRIVE_TASKFILE: | |
257 | if (!capable(CAP_SYS_ADMIN) || !capable(CAP_SYS_RAWIO)) | |
258 | return -EACCES; | |
259 | if (drive->media == ide_disk) | |
22aa4b32 | 260 | return ide_taskfile_ioctl(drive, arg); |
05236ea6 BZ |
261 | return -ENOMSG; |
262 | #endif | |
263 | case HDIO_DRIVE_CMD: | |
264 | if (!capable(CAP_SYS_RAWIO)) | |
265 | return -EACCES; | |
22aa4b32 | 266 | return ide_cmd_ioctl(drive, arg); |
05236ea6 BZ |
267 | case HDIO_DRIVE_TASK: |
268 | if (!capable(CAP_SYS_RAWIO)) | |
269 | return -EACCES; | |
22aa4b32 | 270 | return ide_task_ioctl(drive, arg); |
05236ea6 BZ |
271 | case HDIO_DRIVE_RESET: |
272 | if (!capable(CAP_SYS_ADMIN)) | |
273 | return -EACCES; | |
274 | return generic_drive_reset(drive); | |
275 | case HDIO_GET_BUSSTATE: | |
276 | if (!capable(CAP_SYS_ADMIN)) | |
277 | return -EACCES; | |
278 | if (put_user(BUSSTATE_ON, (long __user *)arg)) | |
279 | return -EFAULT; | |
280 | return 0; | |
281 | case HDIO_SET_BUSSTATE: | |
282 | if (!capable(CAP_SYS_ADMIN)) | |
283 | return -EACCES; | |
284 | return -EOPNOTSUPP; | |
285 | default: | |
286 | return -EINVAL; | |
287 | } | |
288 | } | |
289 | EXPORT_SYMBOL(generic_ide_ioctl); |