ide-ioctls.c 6.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289
  1. /*
  2. * IDE ioctls handling.
  3. */
  4. #include <linux/hdreg.h>
  5. #include <linux/ide.h>
  6. #include <linux/slab.h>
  7. static const struct ide_ioctl_devset ide_ioctl_settings[] = {
  8. { HDIO_GET_32BIT, HDIO_SET_32BIT, &ide_devset_io_32bit },
  9. { HDIO_GET_KEEPSETTINGS, HDIO_SET_KEEPSETTINGS, &ide_devset_keepsettings },
  10. { HDIO_GET_UNMASKINTR, HDIO_SET_UNMASKINTR, &ide_devset_unmaskirq },
  11. { HDIO_GET_DMA, HDIO_SET_DMA, &ide_devset_using_dma },
  12. { -1, HDIO_SET_PIO_MODE, &ide_devset_pio_mode },
  13. { 0 }
  14. };
  15. int ide_setting_ioctl(ide_drive_t *drive, struct block_device *bdev,
  16. unsigned int cmd, unsigned long arg,
  17. const struct ide_ioctl_devset *s)
  18. {
  19. const struct ide_devset *ds;
  20. int err = -EOPNOTSUPP;
  21. for (; (ds = s->setting); s++) {
  22. if (ds->get && s->get_ioctl == cmd)
  23. goto read_val;
  24. else if (ds->set && s->set_ioctl == cmd)
  25. goto set_val;
  26. }
  27. return err;
  28. read_val:
  29. mutex_lock(&ide_setting_mtx);
  30. err = ds->get(drive);
  31. mutex_unlock(&ide_setting_mtx);
  32. return err >= 0 ? put_user(err, (long __user *)arg) : err;
  33. set_val:
  34. if (bdev != bdev->bd_contains)
  35. err = -EINVAL;
  36. else {
  37. if (!capable(CAP_SYS_ADMIN))
  38. err = -EACCES;
  39. else {
  40. mutex_lock(&ide_setting_mtx);
  41. err = ide_devset_execute(drive, ds, arg);
  42. mutex_unlock(&ide_setting_mtx);
  43. }
  44. }
  45. return err;
  46. }
  47. EXPORT_SYMBOL_GPL(ide_setting_ioctl);
  48. static int ide_get_identity_ioctl(ide_drive_t *drive, unsigned int cmd,
  49. unsigned long arg)
  50. {
  51. u16 *id = NULL;
  52. int size = (cmd == HDIO_GET_IDENTITY) ? (ATA_ID_WORDS * 2) : 142;
  53. int rc = 0;
  54. if ((drive->dev_flags & IDE_DFLAG_ID_READ) == 0) {
  55. rc = -ENOMSG;
  56. goto out;
  57. }
  58. /* ata_id_to_hd_driveid() relies on 'id' to be fully allocated. */
  59. id = kmalloc(ATA_ID_WORDS * 2, GFP_KERNEL);
  60. if (id == NULL) {
  61. rc = -ENOMEM;
  62. goto out;
  63. }
  64. memcpy(id, drive->id, size);
  65. ata_id_to_hd_driveid(id);
  66. if (copy_to_user((void __user *)arg, id, size))
  67. rc = -EFAULT;
  68. kfree(id);
  69. out:
  70. return rc;
  71. }
  72. static int ide_get_nice_ioctl(ide_drive_t *drive, unsigned long arg)
  73. {
  74. return put_user((!!(drive->dev_flags & IDE_DFLAG_DSC_OVERLAP)
  75. << IDE_NICE_DSC_OVERLAP) |
  76. (!!(drive->dev_flags & IDE_DFLAG_NICE1)
  77. << IDE_NICE_1), (long __user *)arg);
  78. }
  79. static int ide_set_nice_ioctl(ide_drive_t *drive, unsigned long arg)
  80. {
  81. if (arg != (arg & ((1 << IDE_NICE_DSC_OVERLAP) | (1 << IDE_NICE_1))))
  82. return -EPERM;
  83. if (((arg >> IDE_NICE_DSC_OVERLAP) & 1) &&
  84. (drive->media != ide_tape))
  85. return -EPERM;
  86. if ((arg >> IDE_NICE_DSC_OVERLAP) & 1)
  87. drive->dev_flags |= IDE_DFLAG_DSC_OVERLAP;
  88. else
  89. drive->dev_flags &= ~IDE_DFLAG_DSC_OVERLAP;
  90. if ((arg >> IDE_NICE_1) & 1)
  91. drive->dev_flags |= IDE_DFLAG_NICE1;
  92. else
  93. drive->dev_flags &= ~IDE_DFLAG_NICE1;
  94. return 0;
  95. }
  96. static int ide_cmd_ioctl(ide_drive_t *drive, unsigned long arg)
  97. {
  98. u8 *buf = NULL;
  99. int bufsize = 0, err = 0;
  100. u8 args[4], xfer_rate = 0;
  101. struct ide_cmd cmd;
  102. struct ide_taskfile *tf = &cmd.tf;
  103. if (NULL == (void *) arg) {
  104. struct request *rq;
  105. rq = blk_get_request(drive->queue, READ, __GFP_WAIT);
  106. rq->cmd_type = REQ_TYPE_ATA_TASKFILE;
  107. err = blk_execute_rq(drive->queue, NULL, rq, 0);
  108. blk_put_request(rq);
  109. return err;
  110. }
  111. if (copy_from_user(args, (void __user *)arg, 4))
  112. return -EFAULT;
  113. memset(&cmd, 0, sizeof(cmd));
  114. tf->feature = args[2];
  115. if (args[0] == ATA_CMD_SMART) {
  116. tf->nsect = args[3];
  117. tf->lbal = args[1];
  118. tf->lbam = 0x4f;
  119. tf->lbah = 0xc2;
  120. cmd.valid.out.tf = IDE_VALID_OUT_TF;
  121. cmd.valid.in.tf = IDE_VALID_NSECT;
  122. } else {
  123. tf->nsect = args[1];
  124. cmd.valid.out.tf = IDE_VALID_FEATURE | IDE_VALID_NSECT;
  125. cmd.valid.in.tf = IDE_VALID_NSECT;
  126. }
  127. tf->command = args[0];
  128. cmd.protocol = args[3] ? ATA_PROT_PIO : ATA_PROT_NODATA;
  129. if (args[3]) {
  130. cmd.tf_flags |= IDE_TFLAG_IO_16BIT;
  131. bufsize = SECTOR_SIZE * args[3];
  132. buf = kzalloc(bufsize, GFP_KERNEL);
  133. if (buf == NULL)
  134. return -ENOMEM;
  135. }
  136. if (tf->command == ATA_CMD_SET_FEATURES &&
  137. tf->feature == SETFEATURES_XFER &&
  138. tf->nsect >= XFER_SW_DMA_0) {
  139. xfer_rate = ide_find_dma_mode(drive, tf->nsect);
  140. if (xfer_rate != tf->nsect) {
  141. err = -EINVAL;
  142. goto abort;
  143. }
  144. cmd.tf_flags |= IDE_TFLAG_SET_XFER;
  145. }
  146. err = ide_raw_taskfile(drive, &cmd, buf, args[3]);
  147. args[0] = tf->status;
  148. args[1] = tf->error;
  149. args[2] = tf->nsect;
  150. abort:
  151. if (copy_to_user((void __user *)arg, &args, 4))
  152. err = -EFAULT;
  153. if (buf) {
  154. if (copy_to_user((void __user *)(arg + 4), buf, bufsize))
  155. err = -EFAULT;
  156. kfree(buf);
  157. }
  158. return err;
  159. }
  160. static int ide_task_ioctl(ide_drive_t *drive, unsigned long arg)
  161. {
  162. void __user *p = (void __user *)arg;
  163. int err = 0;
  164. u8 args[7];
  165. struct ide_cmd cmd;
  166. if (copy_from_user(args, p, 7))
  167. return -EFAULT;
  168. memset(&cmd, 0, sizeof(cmd));
  169. memcpy(&cmd.tf.feature, &args[1], 6);
  170. cmd.tf.command = args[0];
  171. cmd.valid.out.tf = IDE_VALID_OUT_TF | IDE_VALID_DEVICE;
  172. cmd.valid.in.tf = IDE_VALID_IN_TF | IDE_VALID_DEVICE;
  173. err = ide_no_data_taskfile(drive, &cmd);
  174. args[0] = cmd.tf.command;
  175. memcpy(&args[1], &cmd.tf.feature, 6);
  176. if (copy_to_user(p, args, 7))
  177. err = -EFAULT;
  178. return err;
  179. }
  180. static int generic_drive_reset(ide_drive_t *drive)
  181. {
  182. struct request *rq;
  183. int ret = 0;
  184. rq = blk_get_request(drive->queue, READ, __GFP_WAIT);
  185. rq->cmd_type = REQ_TYPE_SPECIAL;
  186. rq->cmd_len = 1;
  187. rq->cmd[0] = REQ_DRIVE_RESET;
  188. if (blk_execute_rq(drive->queue, NULL, rq, 1))
  189. ret = rq->errors;
  190. blk_put_request(rq);
  191. return ret;
  192. }
  193. int generic_ide_ioctl(ide_drive_t *drive, struct block_device *bdev,
  194. unsigned int cmd, unsigned long arg)
  195. {
  196. int err;
  197. err = ide_setting_ioctl(drive, bdev, cmd, arg, ide_ioctl_settings);
  198. if (err != -EOPNOTSUPP)
  199. return err;
  200. switch (cmd) {
  201. case HDIO_OBSOLETE_IDENTITY:
  202. case HDIO_GET_IDENTITY:
  203. if (bdev != bdev->bd_contains)
  204. return -EINVAL;
  205. return ide_get_identity_ioctl(drive, cmd, arg);
  206. case HDIO_GET_NICE:
  207. return ide_get_nice_ioctl(drive, arg);
  208. case HDIO_SET_NICE:
  209. if (!capable(CAP_SYS_ADMIN))
  210. return -EACCES;
  211. return ide_set_nice_ioctl(drive, arg);
  212. #ifdef CONFIG_IDE_TASK_IOCTL
  213. case HDIO_DRIVE_TASKFILE:
  214. if (!capable(CAP_SYS_ADMIN) || !capable(CAP_SYS_RAWIO))
  215. return -EACCES;
  216. if (drive->media == ide_disk)
  217. return ide_taskfile_ioctl(drive, arg);
  218. return -ENOMSG;
  219. #endif
  220. case HDIO_DRIVE_CMD:
  221. if (!capable(CAP_SYS_RAWIO))
  222. return -EACCES;
  223. return ide_cmd_ioctl(drive, arg);
  224. case HDIO_DRIVE_TASK:
  225. if (!capable(CAP_SYS_RAWIO))
  226. return -EACCES;
  227. return ide_task_ioctl(drive, arg);
  228. case HDIO_DRIVE_RESET:
  229. if (!capable(CAP_SYS_ADMIN))
  230. return -EACCES;
  231. return generic_drive_reset(drive);
  232. case HDIO_GET_BUSSTATE:
  233. if (!capable(CAP_SYS_ADMIN))
  234. return -EACCES;
  235. if (put_user(BUSSTATE_ON, (long __user *)arg))
  236. return -EFAULT;
  237. return 0;
  238. case HDIO_SET_BUSSTATE:
  239. if (!capable(CAP_SYS_ADMIN))
  240. return -EACCES;
  241. return -EOPNOTSUPP;
  242. default:
  243. return -EINVAL;
  244. }
  245. }
  246. EXPORT_SYMBOL(generic_ide_ioctl);