ide-ioctls.c revision b2963ac1738542d30305d7e12c8c078a383a425c
1/* 2 * IDE ioctls handling. 3 */ 4 5#include <linux/hdreg.h> 6#include <linux/ide.h> 7 8static const struct ide_ioctl_devset ide_ioctl_settings[] = { 9{ HDIO_GET_32BIT, HDIO_SET_32BIT, &ide_devset_io_32bit }, 10{ HDIO_GET_KEEPSETTINGS, HDIO_SET_KEEPSETTINGS, &ide_devset_keepsettings }, 11{ HDIO_GET_UNMASKINTR, HDIO_SET_UNMASKINTR, &ide_devset_unmaskirq }, 12{ HDIO_GET_DMA, HDIO_SET_DMA, &ide_devset_using_dma }, 13{ -1, HDIO_SET_PIO_MODE, &ide_devset_pio_mode }, 14{ 0 } 15}; 16 17int ide_setting_ioctl(ide_drive_t *drive, struct block_device *bdev, 18 unsigned int cmd, unsigned long arg, 19 const struct ide_ioctl_devset *s) 20{ 21 const struct ide_devset *ds; 22 int err = -EOPNOTSUPP; 23 24 for (; (ds = s->setting); s++) { 25 if (ds->get && s->get_ioctl == cmd) 26 goto read_val; 27 else if (ds->set && s->set_ioctl == cmd) 28 goto set_val; 29 } 30 31 return err; 32 33read_val: 34 mutex_lock(&ide_setting_mtx); 35 err = ds->get(drive); 36 mutex_unlock(&ide_setting_mtx); 37 return err >= 0 ? put_user(err, (long __user *)arg) : err; 38 39set_val: 40 if (bdev != bdev->bd_contains) 41 err = -EINVAL; 42 else { 43 if (!capable(CAP_SYS_ADMIN)) 44 err = -EACCES; 45 else { 46 mutex_lock(&ide_setting_mtx); 47 err = ide_devset_execute(drive, ds, arg); 48 mutex_unlock(&ide_setting_mtx); 49 } 50 } 51 return err; 52} 53EXPORT_SYMBOL_GPL(ide_setting_ioctl); 54 55static int ide_get_identity_ioctl(ide_drive_t *drive, unsigned int cmd, 56 unsigned long arg) 57{ 58 u16 *id = NULL; 59 int size = (cmd == HDIO_GET_IDENTITY) ? (ATA_ID_WORDS * 2) : 142; 60 int rc = 0; 61 62 if ((drive->dev_flags & IDE_DFLAG_ID_READ) == 0) { 63 rc = -ENOMSG; 64 goto out; 65 } 66 67 id = kmalloc(size, GFP_KERNEL); 68 if (id == NULL) { 69 rc = -ENOMEM; 70 goto out; 71 } 72 73 memcpy(id, drive->id, size); 74 ata_id_to_hd_driveid(id); 75 76 if (copy_to_user((void __user *)arg, id, size)) 77 rc = -EFAULT; 78 79 kfree(id); 80out: 81 return rc; 82} 83 84static int ide_get_nice_ioctl(ide_drive_t *drive, unsigned long arg) 85{ 86 return put_user((!!(drive->dev_flags & IDE_DFLAG_DSC_OVERLAP) 87 << IDE_NICE_DSC_OVERLAP) | 88 (!!(drive->dev_flags & IDE_DFLAG_NICE1) 89 << IDE_NICE_1), (long __user *)arg); 90} 91 92static int ide_set_nice_ioctl(ide_drive_t *drive, unsigned long arg) 93{ 94 if (arg != (arg & ((1 << IDE_NICE_DSC_OVERLAP) | (1 << IDE_NICE_1)))) 95 return -EPERM; 96 97 if (((arg >> IDE_NICE_DSC_OVERLAP) & 1) && 98 (drive->media != ide_tape)) 99 return -EPERM; 100 101 if ((arg >> IDE_NICE_DSC_OVERLAP) & 1) 102 drive->dev_flags |= IDE_DFLAG_DSC_OVERLAP; 103 else 104 drive->dev_flags &= ~IDE_DFLAG_DSC_OVERLAP; 105 106 if ((arg >> IDE_NICE_1) & 1) 107 drive->dev_flags |= IDE_DFLAG_NICE1; 108 else 109 drive->dev_flags &= ~IDE_DFLAG_NICE1; 110 111 return 0; 112} 113 114static int ide_cmd_ioctl(ide_drive_t *drive, unsigned long arg) 115{ 116 u8 *buf = NULL; 117 int bufsize = 0, err = 0; 118 u8 args[4], xfer_rate = 0; 119 struct ide_cmd cmd; 120 struct ide_taskfile *tf = &cmd.tf; 121 u16 *id = drive->id; 122 123 if (NULL == (void *) arg) { 124 struct request *rq; 125 126 rq = blk_get_request(drive->queue, READ, __GFP_WAIT); 127 rq->cmd_type = REQ_TYPE_ATA_TASKFILE; 128 err = blk_execute_rq(drive->queue, NULL, rq, 0); 129 blk_put_request(rq); 130 131 return err; 132 } 133 134 if (copy_from_user(args, (void __user *)arg, 4)) 135 return -EFAULT; 136 137 memset(&cmd, 0, sizeof(cmd)); 138 tf->feature = args[2]; 139 if (args[0] == ATA_CMD_SMART) { 140 tf->nsect = args[3]; 141 tf->lbal = args[1]; 142 tf->lbam = 0x4f; 143 tf->lbah = 0xc2; 144 cmd.valid.out.tf = IDE_VALID_OUT_TF; 145 cmd.valid.in.tf = IDE_VALID_NSECT; 146 } else { 147 tf->nsect = args[1]; 148 cmd.valid.out.tf = IDE_VALID_FEATURE | IDE_VALID_NSECT; 149 cmd.valid.in.tf = IDE_VALID_NSECT; 150 } 151 tf->command = args[0]; 152 cmd.protocol = args[3] ? ATA_PROT_PIO : ATA_PROT_NODATA; 153 154 if (args[3]) { 155 cmd.tf_flags |= IDE_TFLAG_IO_16BIT; 156 bufsize = SECTOR_SIZE * args[3]; 157 buf = kzalloc(bufsize, GFP_KERNEL); 158 if (buf == NULL) 159 return -ENOMEM; 160 } 161 162 if (tf->command == ATA_CMD_SET_FEATURES && 163 tf->feature == SETFEATURES_XFER && 164 tf->nsect >= XFER_SW_DMA_0 && 165 (id[ATA_ID_UDMA_MODES] || 166 id[ATA_ID_MWDMA_MODES] || 167 id[ATA_ID_SWDMA_MODES])) { 168 xfer_rate = args[1]; 169 if (tf->nsect > XFER_UDMA_2 && !eighty_ninty_three(drive)) { 170 printk(KERN_WARNING "%s: UDMA speeds >UDMA33 cannot " 171 "be set\n", drive->name); 172 goto abort; 173 } 174 } 175 176 err = ide_raw_taskfile(drive, &cmd, buf, args[3]); 177 178 args[0] = tf->status; 179 args[1] = tf->error; 180 args[2] = tf->nsect; 181 182 if (!err && xfer_rate) { 183 /* active-retuning-calls future */ 184 ide_set_xfer_rate(drive, xfer_rate); 185 ide_driveid_update(drive); 186 } 187abort: 188 if (copy_to_user((void __user *)arg, &args, 4)) 189 err = -EFAULT; 190 if (buf) { 191 if (copy_to_user((void __user *)(arg + 4), buf, bufsize)) 192 err = -EFAULT; 193 kfree(buf); 194 } 195 return err; 196} 197 198static int ide_task_ioctl(ide_drive_t *drive, unsigned long arg) 199{ 200 void __user *p = (void __user *)arg; 201 int err = 0; 202 u8 args[7]; 203 struct ide_cmd cmd; 204 205 if (copy_from_user(args, p, 7)) 206 return -EFAULT; 207 208 memset(&cmd, 0, sizeof(cmd)); 209 memcpy(&cmd.tf.feature, &args[1], 6); 210 cmd.tf.command = args[0]; 211 cmd.valid.out.tf = IDE_VALID_OUT_TF | IDE_VALID_DEVICE; 212 cmd.valid.in.tf = IDE_VALID_IN_TF | IDE_VALID_DEVICE; 213 214 err = ide_no_data_taskfile(drive, &cmd); 215 216 args[0] = cmd.tf.command; 217 memcpy(&args[1], &cmd.tf.feature, 6); 218 219 if (copy_to_user(p, args, 7)) 220 err = -EFAULT; 221 222 return err; 223} 224 225static int generic_drive_reset(ide_drive_t *drive) 226{ 227 struct request *rq; 228 int ret = 0; 229 230 rq = blk_get_request(drive->queue, READ, __GFP_WAIT); 231 rq->cmd_type = REQ_TYPE_SPECIAL; 232 rq->cmd_len = 1; 233 rq->cmd[0] = REQ_DRIVE_RESET; 234 if (blk_execute_rq(drive->queue, NULL, rq, 1)) 235 ret = rq->errors; 236 blk_put_request(rq); 237 return ret; 238} 239 240int generic_ide_ioctl(ide_drive_t *drive, struct block_device *bdev, 241 unsigned int cmd, unsigned long arg) 242{ 243 int err; 244 245 err = ide_setting_ioctl(drive, bdev, cmd, arg, ide_ioctl_settings); 246 if (err != -EOPNOTSUPP) 247 return err; 248 249 switch (cmd) { 250 case HDIO_OBSOLETE_IDENTITY: 251 case HDIO_GET_IDENTITY: 252 if (bdev != bdev->bd_contains) 253 return -EINVAL; 254 return ide_get_identity_ioctl(drive, cmd, arg); 255 case HDIO_GET_NICE: 256 return ide_get_nice_ioctl(drive, arg); 257 case HDIO_SET_NICE: 258 if (!capable(CAP_SYS_ADMIN)) 259 return -EACCES; 260 return ide_set_nice_ioctl(drive, arg); 261#ifdef CONFIG_IDE_TASK_IOCTL 262 case HDIO_DRIVE_TASKFILE: 263 if (!capable(CAP_SYS_ADMIN) || !capable(CAP_SYS_RAWIO)) 264 return -EACCES; 265 if (drive->media == ide_disk) 266 return ide_taskfile_ioctl(drive, arg); 267 return -ENOMSG; 268#endif 269 case HDIO_DRIVE_CMD: 270 if (!capable(CAP_SYS_RAWIO)) 271 return -EACCES; 272 return ide_cmd_ioctl(drive, arg); 273 case HDIO_DRIVE_TASK: 274 if (!capable(CAP_SYS_RAWIO)) 275 return -EACCES; 276 return ide_task_ioctl(drive, arg); 277 case HDIO_DRIVE_RESET: 278 if (!capable(CAP_SYS_ADMIN)) 279 return -EACCES; 280 return generic_drive_reset(drive); 281 case HDIO_GET_BUSSTATE: 282 if (!capable(CAP_SYS_ADMIN)) 283 return -EACCES; 284 if (put_user(BUSSTATE_ON, (long __user *)arg)) 285 return -EFAULT; 286 return 0; 287 case HDIO_SET_BUSSTATE: 288 if (!capable(CAP_SYS_ADMIN)) 289 return -EACCES; 290 return -EOPNOTSUPP; 291 default: 292 return -EINVAL; 293 } 294} 295EXPORT_SYMBOL(generic_ide_ioctl); 296