Merge branch 'devel' of master.kernel.org:/home/rmk/linux-2.6-arm
[linux-block.git] / drivers / ide / ide-ioctls.c
CommitLineData
05236ea6
BZ
1/*
2 * IDE ioctls handling.
3 */
4
5#include <linux/hdreg.h>
6#include <linux/ide.h>
7
8static const struct ide_ioctl_devset ide_ioctl_settings[] = {
92f1f8fd
EO
9{ HDIO_GET_32BIT, HDIO_SET_32BIT, &ide_devset_io_32bit },
10{ HDIO_GET_KEEPSETTINGS, HDIO_SET_KEEPSETTINGS, &ide_devset_keepsettings },
11{ HDIO_GET_UNMASKINTR, HDIO_SET_UNMASKINTR, &ide_devset_unmaskirq },
12{ HDIO_GET_DMA, HDIO_SET_DMA, &ide_devset_using_dma },
13{ -1, HDIO_SET_PIO_MODE, &ide_devset_pio_mode },
05236ea6
BZ
14{ 0 }
15};
16
17int ide_setting_ioctl(ide_drive_t *drive, struct block_device *bdev,
18 unsigned int cmd, unsigned long arg,
19 const struct ide_ioctl_devset *s)
20{
92f1f8fd 21 const struct ide_devset *ds;
05236ea6
BZ
22 int err = -EOPNOTSUPP;
23
92f1f8fd
EO
24 for (; (ds = s->setting); s++) {
25 if (ds->get && s->get_ioctl == cmd)
05236ea6 26 goto read_val;
92f1f8fd 27 else if (ds->set && s->set_ioctl == cmd)
05236ea6
BZ
28 goto set_val;
29 }
30
31 return err;
32
33read_val:
34 mutex_lock(&ide_setting_mtx);
92f1f8fd 35 err = ds->get(drive);
05236ea6
BZ
36 mutex_unlock(&ide_setting_mtx);
37 return err >= 0 ? put_user(err, (long __user *)arg) : err;
38
39set_val:
40 if (bdev != bdev->bd_contains)
41 err = -EINVAL;
42 else {
43 if (!capable(CAP_SYS_ADMIN))
44 err = -EACCES;
45 else {
46 mutex_lock(&ide_setting_mtx);
92f1f8fd 47 err = ide_devset_execute(drive, ds, arg);
05236ea6
BZ
48 mutex_unlock(&ide_setting_mtx);
49 }
50 }
51 return err;
52}
53EXPORT_SYMBOL_GPL(ide_setting_ioctl);
54
55static int ide_get_identity_ioctl(ide_drive_t *drive, unsigned int cmd,
56 unsigned long arg)
57{
58 u16 *id = NULL;
59 int size = (cmd == HDIO_GET_IDENTITY) ? (ATA_ID_WORDS * 2) : 142;
60 int rc = 0;
61
97100fc8 62 if ((drive->dev_flags & IDE_DFLAG_ID_READ) == 0) {
05236ea6
BZ
63 rc = -ENOMSG;
64 goto out;
65 }
66
e18ed145
CE
67 /* ata_id_to_hd_driveid() relies on 'id' to be fully allocated. */
68 id = kmalloc(ATA_ID_WORDS * 2, GFP_KERNEL);
05236ea6
BZ
69 if (id == NULL) {
70 rc = -ENOMEM;
71 goto out;
72 }
73
74 memcpy(id, drive->id, size);
75 ata_id_to_hd_driveid(id);
76
77 if (copy_to_user((void __user *)arg, id, size))
78 rc = -EFAULT;
79
80 kfree(id);
81out:
82 return rc;
83}
84
85static int ide_get_nice_ioctl(ide_drive_t *drive, unsigned long arg)
86{
97100fc8
BZ
87 return put_user((!!(drive->dev_flags & IDE_DFLAG_DSC_OVERLAP)
88 << IDE_NICE_DSC_OVERLAP) |
89 (!!(drive->dev_flags & IDE_DFLAG_NICE1)
90 << IDE_NICE_1), (long __user *)arg);
05236ea6
BZ
91}
92
93static int ide_set_nice_ioctl(ide_drive_t *drive, unsigned long arg)
94{
95 if (arg != (arg & ((1 << IDE_NICE_DSC_OVERLAP) | (1 << IDE_NICE_1))))
96 return -EPERM;
97
98 if (((arg >> IDE_NICE_DSC_OVERLAP) & 1) &&
5317464d 99 (drive->media != ide_tape))
05236ea6
BZ
100 return -EPERM;
101
97100fc8
BZ
102 if ((arg >> IDE_NICE_DSC_OVERLAP) & 1)
103 drive->dev_flags |= IDE_DFLAG_DSC_OVERLAP;
104 else
105 drive->dev_flags &= ~IDE_DFLAG_DSC_OVERLAP;
106
107 if ((arg >> IDE_NICE_1) & 1)
108 drive->dev_flags |= IDE_DFLAG_NICE1;
109 else
110 drive->dev_flags &= ~IDE_DFLAG_NICE1;
05236ea6
BZ
111
112 return 0;
113}
114
22aa4b32 115static int ide_cmd_ioctl(ide_drive_t *drive, unsigned long arg)
05236ea6
BZ
116{
117 u8 *buf = NULL;
118 int bufsize = 0, err = 0;
119 u8 args[4], xfer_rate = 0;
22aa4b32
BZ
120 struct ide_cmd cmd;
121 struct ide_taskfile *tf = &cmd.tf;
05236ea6
BZ
122
123 if (NULL == (void *) arg) {
124 struct request *rq;
125
126 rq = blk_get_request(drive->queue, READ, __GFP_WAIT);
127 rq->cmd_type = REQ_TYPE_ATA_TASKFILE;
128 err = blk_execute_rq(drive->queue, NULL, rq, 0);
129 blk_put_request(rq);
130
131 return err;
132 }
133
134 if (copy_from_user(args, (void __user *)arg, 4))
135 return -EFAULT;
136
22aa4b32 137 memset(&cmd, 0, sizeof(cmd));
05236ea6
BZ
138 tf->feature = args[2];
139 if (args[0] == ATA_CMD_SMART) {
140 tf->nsect = args[3];
141 tf->lbal = args[1];
142 tf->lbam = 0x4f;
143 tf->lbah = 0xc2;
60f85019
SS
144 cmd.valid.out.tf = IDE_VALID_OUT_TF;
145 cmd.valid.in.tf = IDE_VALID_NSECT;
05236ea6
BZ
146 } else {
147 tf->nsect = args[1];
60f85019
SS
148 cmd.valid.out.tf = IDE_VALID_FEATURE | IDE_VALID_NSECT;
149 cmd.valid.in.tf = IDE_VALID_NSECT;
05236ea6
BZ
150 }
151 tf->command = args[0];
0dfb991c 152 cmd.protocol = args[3] ? ATA_PROT_PIO : ATA_PROT_NODATA;
05236ea6
BZ
153
154 if (args[3]) {
22aa4b32 155 cmd.tf_flags |= IDE_TFLAG_IO_16BIT;
05236ea6
BZ
156 bufsize = SECTOR_SIZE * args[3];
157 buf = kzalloc(bufsize, GFP_KERNEL);
158 if (buf == NULL)
159 return -ENOMEM;
160 }
161
162 if (tf->command == ATA_CMD_SET_FEATURES &&
163 tf->feature == SETFEATURES_XFER &&
a9c41509
BZ
164 tf->nsect >= XFER_SW_DMA_0) {
165 xfer_rate = ide_find_dma_mode(drive, XFER_UDMA_6);
166 if (xfer_rate != tf->nsect) {
167 err = -EINVAL;
05236ea6
BZ
168 goto abort;
169 }
170 }
171
22aa4b32 172 err = ide_raw_taskfile(drive, &cmd, buf, args[3]);
05236ea6
BZ
173
174 args[0] = tf->status;
175 args[1] = tf->error;
176 args[2] = tf->nsect;
177
178 if (!err && xfer_rate) {
179 /* active-retuning-calls future */
180 ide_set_xfer_rate(drive, xfer_rate);
181 ide_driveid_update(drive);
182 }
183abort:
184 if (copy_to_user((void __user *)arg, &args, 4))
185 err = -EFAULT;
186 if (buf) {
187 if (copy_to_user((void __user *)(arg + 4), buf, bufsize))
188 err = -EFAULT;
189 kfree(buf);
190 }
191 return err;
192}
193
22aa4b32 194static int ide_task_ioctl(ide_drive_t *drive, unsigned long arg)
05236ea6
BZ
195{
196 void __user *p = (void __user *)arg;
197 int err = 0;
198 u8 args[7];
22aa4b32 199 struct ide_cmd cmd;
05236ea6
BZ
200
201 if (copy_from_user(args, p, 7))
202 return -EFAULT;
203
22aa4b32 204 memset(&cmd, 0, sizeof(cmd));
745483f1 205 memcpy(&cmd.tf.feature, &args[1], 6);
22aa4b32 206 cmd.tf.command = args[0];
60f85019
SS
207 cmd.valid.out.tf = IDE_VALID_OUT_TF | IDE_VALID_DEVICE;
208 cmd.valid.in.tf = IDE_VALID_IN_TF | IDE_VALID_DEVICE;
05236ea6 209
22aa4b32 210 err = ide_no_data_taskfile(drive, &cmd);
05236ea6 211
22aa4b32 212 args[0] = cmd.tf.command;
745483f1 213 memcpy(&args[1], &cmd.tf.feature, 6);
05236ea6
BZ
214
215 if (copy_to_user(p, args, 7))
216 err = -EFAULT;
217
218 return err;
219}
220
221static int generic_drive_reset(ide_drive_t *drive)
222{
223 struct request *rq;
224 int ret = 0;
225
226 rq = blk_get_request(drive->queue, READ, __GFP_WAIT);
227 rq->cmd_type = REQ_TYPE_SPECIAL;
228 rq->cmd_len = 1;
229 rq->cmd[0] = REQ_DRIVE_RESET;
05236ea6
BZ
230 if (blk_execute_rq(drive->queue, NULL, rq, 1))
231 ret = rq->errors;
232 blk_put_request(rq);
233 return ret;
234}
235
1bddd9e6 236int generic_ide_ioctl(ide_drive_t *drive, struct block_device *bdev,
05236ea6
BZ
237 unsigned int cmd, unsigned long arg)
238{
239 int err;
240
241 err = ide_setting_ioctl(drive, bdev, cmd, arg, ide_ioctl_settings);
242 if (err != -EOPNOTSUPP)
243 return err;
244
245 switch (cmd) {
246 case HDIO_OBSOLETE_IDENTITY:
247 case HDIO_GET_IDENTITY:
248 if (bdev != bdev->bd_contains)
249 return -EINVAL;
250 return ide_get_identity_ioctl(drive, cmd, arg);
251 case HDIO_GET_NICE:
252 return ide_get_nice_ioctl(drive, arg);
253 case HDIO_SET_NICE:
254 if (!capable(CAP_SYS_ADMIN))
255 return -EACCES;
256 return ide_set_nice_ioctl(drive, arg);
257#ifdef CONFIG_IDE_TASK_IOCTL
258 case HDIO_DRIVE_TASKFILE:
259 if (!capable(CAP_SYS_ADMIN) || !capable(CAP_SYS_RAWIO))
260 return -EACCES;
261 if (drive->media == ide_disk)
22aa4b32 262 return ide_taskfile_ioctl(drive, arg);
05236ea6
BZ
263 return -ENOMSG;
264#endif
265 case HDIO_DRIVE_CMD:
266 if (!capable(CAP_SYS_RAWIO))
267 return -EACCES;
22aa4b32 268 return ide_cmd_ioctl(drive, arg);
05236ea6
BZ
269 case HDIO_DRIVE_TASK:
270 if (!capable(CAP_SYS_RAWIO))
271 return -EACCES;
22aa4b32 272 return ide_task_ioctl(drive, arg);
05236ea6
BZ
273 case HDIO_DRIVE_RESET:
274 if (!capable(CAP_SYS_ADMIN))
275 return -EACCES;
276 return generic_drive_reset(drive);
277 case HDIO_GET_BUSSTATE:
278 if (!capable(CAP_SYS_ADMIN))
279 return -EACCES;
280 if (put_user(BUSSTATE_ON, (long __user *)arg))
281 return -EFAULT;
282 return 0;
283 case HDIO_SET_BUSSTATE:
284 if (!capable(CAP_SYS_ADMIN))
285 return -EACCES;
286 return -EOPNOTSUPP;
287 default:
288 return -EINVAL;
289 }
290}
291EXPORT_SYMBOL(generic_ide_ioctl);