i2o_config.c 26 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149
  1. /*
  2. * I2O Configuration Interface Driver
  3. *
  4. * (C) Copyright 1999-2002 Red Hat
  5. *
  6. * Written by Alan Cox, Building Number Three Ltd
  7. *
  8. * Fixes/additions:
  9. * Deepak Saxena (04/20/1999):
  10. * Added basic ioctl() support
  11. * Deepak Saxena (06/07/1999):
  12. * Added software download ioctl (still testing)
  13. * Auvo Häkkinen (09/10/1999):
  14. * Changes to i2o_cfg_reply(), ioctl_parms()
  15. * Added ioct_validate()
  16. * Taneli Vähäkangas (09/30/1999):
  17. * Fixed ioctl_swdl()
  18. * Taneli Vähäkangas (10/04/1999):
  19. * Changed ioctl_swdl(), implemented ioctl_swul() and ioctl_swdel()
  20. * Deepak Saxena (11/18/1999):
  21. * Added event managmenet support
  22. * Alan Cox <alan@redhat.com>:
  23. * 2.4 rewrite ported to 2.5
  24. * Markus Lidel <Markus.Lidel@shadowconnect.com>:
  25. * Added pass-thru support for Adaptec's raidutils
  26. *
  27. * This program is free software; you can redistribute it and/or
  28. * modify it under the terms of the GNU General Public License
  29. * as published by the Free Software Foundation; either version
  30. * 2 of the License, or (at your option) any later version.
  31. */
  32. #include <linux/miscdevice.h>
  33. #include <linux/smp_lock.h>
  34. #include <linux/compat.h>
  35. #include <asm/uaccess.h>
  36. #include "core.h"
  37. #define SG_TABLESIZE 30
  38. static int i2o_cfg_ioctl(struct inode *, struct file *, unsigned int,
  39. unsigned long);
  40. static spinlock_t i2o_config_lock;
  41. #define MODINC(x,y) ((x) = ((x) + 1) % (y))
  42. struct sg_simple_element {
  43. u32 flag_count;
  44. u32 addr_bus;
  45. };
  46. struct i2o_cfg_info {
  47. struct file *fp;
  48. struct fasync_struct *fasync;
  49. struct i2o_evt_info event_q[I2O_EVT_Q_LEN];
  50. u16 q_in; // Queue head index
  51. u16 q_out; // Queue tail index
  52. u16 q_len; // Queue length
  53. u16 q_lost; // Number of lost events
  54. ulong q_id; // Event queue ID...used as tx_context
  55. struct i2o_cfg_info *next;
  56. };
  57. static struct i2o_cfg_info *open_files = NULL;
  58. static ulong i2o_cfg_info_id = 0;
  59. static int i2o_cfg_getiops(unsigned long arg)
  60. {
  61. struct i2o_controller *c;
  62. u8 __user *user_iop_table = (void __user *)arg;
  63. u8 tmp[MAX_I2O_CONTROLLERS];
  64. int ret = 0;
  65. memset(tmp, 0, MAX_I2O_CONTROLLERS);
  66. list_for_each_entry(c, &i2o_controllers, list)
  67. tmp[c->unit] = 1;
  68. if (copy_to_user(user_iop_table, tmp, MAX_I2O_CONTROLLERS))
  69. ret = -EFAULT;
  70. return ret;
  71. };
  72. static int i2o_cfg_gethrt(unsigned long arg)
  73. {
  74. struct i2o_controller *c;
  75. struct i2o_cmd_hrtlct __user *cmd = (struct i2o_cmd_hrtlct __user *)arg;
  76. struct i2o_cmd_hrtlct kcmd;
  77. i2o_hrt *hrt;
  78. int len;
  79. u32 reslen;
  80. int ret = 0;
  81. if (copy_from_user(&kcmd, cmd, sizeof(struct i2o_cmd_hrtlct)))
  82. return -EFAULT;
  83. if (get_user(reslen, kcmd.reslen) < 0)
  84. return -EFAULT;
  85. if (kcmd.resbuf == NULL)
  86. return -EFAULT;
  87. c = i2o_find_iop(kcmd.iop);
  88. if (!c)
  89. return -ENXIO;
  90. hrt = (i2o_hrt *) c->hrt.virt;
  91. len = 8 + ((hrt->entry_len * hrt->num_entries) << 2);
  92. /* We did a get user...so assuming mem is ok...is this bad? */
  93. put_user(len, kcmd.reslen);
  94. if (len > reslen)
  95. ret = -ENOBUFS;
  96. if (copy_to_user(kcmd.resbuf, (void *)hrt, len))
  97. ret = -EFAULT;
  98. return ret;
  99. };
  100. static int i2o_cfg_getlct(unsigned long arg)
  101. {
  102. struct i2o_controller *c;
  103. struct i2o_cmd_hrtlct __user *cmd = (struct i2o_cmd_hrtlct __user *)arg;
  104. struct i2o_cmd_hrtlct kcmd;
  105. i2o_lct *lct;
  106. int len;
  107. int ret = 0;
  108. u32 reslen;
  109. if (copy_from_user(&kcmd, cmd, sizeof(struct i2o_cmd_hrtlct)))
  110. return -EFAULT;
  111. if (get_user(reslen, kcmd.reslen) < 0)
  112. return -EFAULT;
  113. if (kcmd.resbuf == NULL)
  114. return -EFAULT;
  115. c = i2o_find_iop(kcmd.iop);
  116. if (!c)
  117. return -ENXIO;
  118. lct = (i2o_lct *) c->lct;
  119. len = (unsigned int)lct->table_size << 2;
  120. put_user(len, kcmd.reslen);
  121. if (len > reslen)
  122. ret = -ENOBUFS;
  123. else if (copy_to_user(kcmd.resbuf, lct, len))
  124. ret = -EFAULT;
  125. return ret;
  126. };
  127. static int i2o_cfg_parms(unsigned long arg, unsigned int type)
  128. {
  129. int ret = 0;
  130. struct i2o_controller *c;
  131. struct i2o_device *dev;
  132. struct i2o_cmd_psetget __user *cmd =
  133. (struct i2o_cmd_psetget __user *)arg;
  134. struct i2o_cmd_psetget kcmd;
  135. u32 reslen;
  136. u8 *ops;
  137. u8 *res;
  138. int len = 0;
  139. u32 i2o_cmd = (type == I2OPARMGET ?
  140. I2O_CMD_UTIL_PARAMS_GET : I2O_CMD_UTIL_PARAMS_SET);
  141. if (copy_from_user(&kcmd, cmd, sizeof(struct i2o_cmd_psetget)))
  142. return -EFAULT;
  143. if (get_user(reslen, kcmd.reslen))
  144. return -EFAULT;
  145. c = i2o_find_iop(kcmd.iop);
  146. if (!c)
  147. return -ENXIO;
  148. dev = i2o_iop_find_device(c, kcmd.tid);
  149. if (!dev)
  150. return -ENXIO;
  151. ops = kmalloc(kcmd.oplen, GFP_KERNEL);
  152. if (!ops)
  153. return -ENOMEM;
  154. if (copy_from_user(ops, kcmd.opbuf, kcmd.oplen)) {
  155. kfree(ops);
  156. return -EFAULT;
  157. }
  158. /*
  159. * It's possible to have a _very_ large table
  160. * and that the user asks for all of it at once...
  161. */
  162. res = kmalloc(65536, GFP_KERNEL);
  163. if (!res) {
  164. kfree(ops);
  165. return -ENOMEM;
  166. }
  167. len = i2o_parm_issue(dev, i2o_cmd, ops, kcmd.oplen, res, 65536);
  168. kfree(ops);
  169. if (len < 0) {
  170. kfree(res);
  171. return -EAGAIN;
  172. }
  173. put_user(len, kcmd.reslen);
  174. if (len > reslen)
  175. ret = -ENOBUFS;
  176. else if (copy_to_user(kcmd.resbuf, res, len))
  177. ret = -EFAULT;
  178. kfree(res);
  179. return ret;
  180. };
  181. static int i2o_cfg_swdl(unsigned long arg)
  182. {
  183. struct i2o_sw_xfer kxfer;
  184. struct i2o_sw_xfer __user *pxfer = (struct i2o_sw_xfer __user *)arg;
  185. unsigned char maxfrag = 0, curfrag = 1;
  186. struct i2o_dma buffer;
  187. struct i2o_message *msg;
  188. unsigned int status = 0, swlen = 0, fragsize = 8192;
  189. struct i2o_controller *c;
  190. if (copy_from_user(&kxfer, pxfer, sizeof(struct i2o_sw_xfer)))
  191. return -EFAULT;
  192. if (get_user(swlen, kxfer.swlen) < 0)
  193. return -EFAULT;
  194. if (get_user(maxfrag, kxfer.maxfrag) < 0)
  195. return -EFAULT;
  196. if (get_user(curfrag, kxfer.curfrag) < 0)
  197. return -EFAULT;
  198. if (curfrag == maxfrag)
  199. fragsize = swlen - (maxfrag - 1) * 8192;
  200. if (!kxfer.buf || !access_ok(VERIFY_READ, kxfer.buf, fragsize))
  201. return -EFAULT;
  202. c = i2o_find_iop(kxfer.iop);
  203. if (!c)
  204. return -ENXIO;
  205. msg = i2o_msg_get_wait(c, I2O_TIMEOUT_MESSAGE_GET);
  206. if (IS_ERR(msg))
  207. return PTR_ERR(msg);
  208. if (i2o_dma_alloc(&c->pdev->dev, &buffer, fragsize, GFP_KERNEL)) {
  209. i2o_msg_nop(c, msg);
  210. return -ENOMEM;
  211. }
  212. if (__copy_from_user(buffer.virt, kxfer.buf, fragsize)) {
  213. i2o_msg_nop(c, msg);
  214. i2o_dma_free(&c->pdev->dev, &buffer);
  215. return -EFAULT;
  216. }
  217. msg->u.head[0] = cpu_to_le32(NINE_WORD_MSG_SIZE | SGL_OFFSET_7);
  218. msg->u.head[1] =
  219. cpu_to_le32(I2O_CMD_SW_DOWNLOAD << 24 | HOST_TID << 12 |
  220. ADAPTER_TID);
  221. msg->u.head[2] = cpu_to_le32(i2o_config_driver.context);
  222. msg->u.head[3] = cpu_to_le32(0);
  223. msg->body[0] =
  224. cpu_to_le32((((u32) kxfer.flags) << 24) | (((u32) kxfer.
  225. sw_type) << 16) |
  226. (((u32) maxfrag) << 8) | (((u32) curfrag)));
  227. msg->body[1] = cpu_to_le32(swlen);
  228. msg->body[2] = cpu_to_le32(kxfer.sw_id);
  229. msg->body[3] = cpu_to_le32(0xD0000000 | fragsize);
  230. msg->body[4] = cpu_to_le32(buffer.phys);
  231. osm_debug("swdl frag %d/%d (size %d)\n", curfrag, maxfrag, fragsize);
  232. status = i2o_msg_post_wait_mem(c, msg, 60, &buffer);
  233. if (status != -ETIMEDOUT)
  234. i2o_dma_free(&c->pdev->dev, &buffer);
  235. if (status != I2O_POST_WAIT_OK) {
  236. // it fails if you try and send frags out of order
  237. // and for some yet unknown reasons too
  238. osm_info("swdl failed, DetailedStatus = %d\n", status);
  239. return status;
  240. }
  241. return 0;
  242. };
  243. static int i2o_cfg_swul(unsigned long arg)
  244. {
  245. struct i2o_sw_xfer kxfer;
  246. struct i2o_sw_xfer __user *pxfer = (struct i2o_sw_xfer __user *)arg;
  247. unsigned char maxfrag = 0, curfrag = 1;
  248. struct i2o_dma buffer;
  249. struct i2o_message *msg;
  250. unsigned int status = 0, swlen = 0, fragsize = 8192;
  251. struct i2o_controller *c;
  252. int ret = 0;
  253. if (copy_from_user(&kxfer, pxfer, sizeof(struct i2o_sw_xfer)))
  254. goto return_fault;
  255. if (get_user(swlen, kxfer.swlen) < 0)
  256. goto return_fault;
  257. if (get_user(maxfrag, kxfer.maxfrag) < 0)
  258. goto return_fault;
  259. if (get_user(curfrag, kxfer.curfrag) < 0)
  260. goto return_fault;
  261. if (curfrag == maxfrag)
  262. fragsize = swlen - (maxfrag - 1) * 8192;
  263. if (!kxfer.buf)
  264. goto return_fault;
  265. c = i2o_find_iop(kxfer.iop);
  266. if (!c)
  267. return -ENXIO;
  268. msg = i2o_msg_get_wait(c, I2O_TIMEOUT_MESSAGE_GET);
  269. if (IS_ERR(msg))
  270. return PTR_ERR(msg);
  271. if (i2o_dma_alloc(&c->pdev->dev, &buffer, fragsize, GFP_KERNEL)) {
  272. i2o_msg_nop(c, msg);
  273. return -ENOMEM;
  274. }
  275. msg->u.head[0] = cpu_to_le32(NINE_WORD_MSG_SIZE | SGL_OFFSET_7);
  276. msg->u.head[1] =
  277. cpu_to_le32(I2O_CMD_SW_UPLOAD << 24 | HOST_TID << 12 | ADAPTER_TID);
  278. msg->u.head[2] = cpu_to_le32(i2o_config_driver.context);
  279. msg->u.head[3] = cpu_to_le32(0);
  280. msg->body[0] =
  281. cpu_to_le32((u32) kxfer.flags << 24 | (u32) kxfer.
  282. sw_type << 16 | (u32) maxfrag << 8 | (u32) curfrag);
  283. msg->body[1] = cpu_to_le32(swlen);
  284. msg->body[2] = cpu_to_le32(kxfer.sw_id);
  285. msg->body[3] = cpu_to_le32(0xD0000000 | fragsize);
  286. msg->body[4] = cpu_to_le32(buffer.phys);
  287. osm_debug("swul frag %d/%d (size %d)\n", curfrag, maxfrag, fragsize);
  288. status = i2o_msg_post_wait_mem(c, msg, 60, &buffer);
  289. if (status != I2O_POST_WAIT_OK) {
  290. if (status != -ETIMEDOUT)
  291. i2o_dma_free(&c->pdev->dev, &buffer);
  292. osm_info("swul failed, DetailedStatus = %d\n", status);
  293. return status;
  294. }
  295. if (copy_to_user(kxfer.buf, buffer.virt, fragsize))
  296. ret = -EFAULT;
  297. i2o_dma_free(&c->pdev->dev, &buffer);
  298. return_ret:
  299. return ret;
  300. return_fault:
  301. ret = -EFAULT;
  302. goto return_ret;
  303. };
  304. static int i2o_cfg_swdel(unsigned long arg)
  305. {
  306. struct i2o_controller *c;
  307. struct i2o_sw_xfer kxfer;
  308. struct i2o_sw_xfer __user *pxfer = (struct i2o_sw_xfer __user *)arg;
  309. struct i2o_message *msg;
  310. unsigned int swlen;
  311. int token;
  312. if (copy_from_user(&kxfer, pxfer, sizeof(struct i2o_sw_xfer)))
  313. return -EFAULT;
  314. if (get_user(swlen, kxfer.swlen) < 0)
  315. return -EFAULT;
  316. c = i2o_find_iop(kxfer.iop);
  317. if (!c)
  318. return -ENXIO;
  319. msg = i2o_msg_get_wait(c, I2O_TIMEOUT_MESSAGE_GET);
  320. if (IS_ERR(msg))
  321. return PTR_ERR(msg);
  322. msg->u.head[0] = cpu_to_le32(SEVEN_WORD_MSG_SIZE | SGL_OFFSET_0);
  323. msg->u.head[1] =
  324. cpu_to_le32(I2O_CMD_SW_REMOVE << 24 | HOST_TID << 12 | ADAPTER_TID);
  325. msg->u.head[2] = cpu_to_le32(i2o_config_driver.context);
  326. msg->u.head[3] = cpu_to_le32(0);
  327. msg->body[0] =
  328. cpu_to_le32((u32) kxfer.flags << 24 | (u32) kxfer.sw_type << 16);
  329. msg->body[1] = cpu_to_le32(swlen);
  330. msg->body[2] = cpu_to_le32(kxfer.sw_id);
  331. token = i2o_msg_post_wait(c, msg, 10);
  332. if (token != I2O_POST_WAIT_OK) {
  333. osm_info("swdel failed, DetailedStatus = %d\n", token);
  334. return -ETIMEDOUT;
  335. }
  336. return 0;
  337. };
  338. static int i2o_cfg_validate(unsigned long arg)
  339. {
  340. int token;
  341. int iop = (int)arg;
  342. struct i2o_message *msg;
  343. struct i2o_controller *c;
  344. c = i2o_find_iop(iop);
  345. if (!c)
  346. return -ENXIO;
  347. msg = i2o_msg_get_wait(c, I2O_TIMEOUT_MESSAGE_GET);
  348. if (IS_ERR(msg))
  349. return PTR_ERR(msg);
  350. msg->u.head[0] = cpu_to_le32(FOUR_WORD_MSG_SIZE | SGL_OFFSET_0);
  351. msg->u.head[1] =
  352. cpu_to_le32(I2O_CMD_CONFIG_VALIDATE << 24 | HOST_TID << 12 | iop);
  353. msg->u.head[2] = cpu_to_le32(i2o_config_driver.context);
  354. msg->u.head[3] = cpu_to_le32(0);
  355. token = i2o_msg_post_wait(c, msg, 10);
  356. if (token != I2O_POST_WAIT_OK) {
  357. osm_info("Can't validate configuration, ErrorStatus = %d\n",
  358. token);
  359. return -ETIMEDOUT;
  360. }
  361. return 0;
  362. };
  363. static int i2o_cfg_evt_reg(unsigned long arg, struct file *fp)
  364. {
  365. struct i2o_message *msg;
  366. struct i2o_evt_id __user *pdesc = (struct i2o_evt_id __user *)arg;
  367. struct i2o_evt_id kdesc;
  368. struct i2o_controller *c;
  369. struct i2o_device *d;
  370. if (copy_from_user(&kdesc, pdesc, sizeof(struct i2o_evt_id)))
  371. return -EFAULT;
  372. /* IOP exists? */
  373. c = i2o_find_iop(kdesc.iop);
  374. if (!c)
  375. return -ENXIO;
  376. /* Device exists? */
  377. d = i2o_iop_find_device(c, kdesc.tid);
  378. if (!d)
  379. return -ENODEV;
  380. msg = i2o_msg_get_wait(c, I2O_TIMEOUT_MESSAGE_GET);
  381. if (IS_ERR(msg))
  382. return PTR_ERR(msg);
  383. msg->u.head[0] = cpu_to_le32(FOUR_WORD_MSG_SIZE | SGL_OFFSET_0);
  384. msg->u.head[1] =
  385. cpu_to_le32(I2O_CMD_UTIL_EVT_REGISTER << 24 | HOST_TID << 12 |
  386. kdesc.tid);
  387. msg->u.head[2] = cpu_to_le32(i2o_config_driver.context);
  388. msg->u.head[3] = cpu_to_le32(i2o_cntxt_list_add(c, fp->private_data));
  389. msg->body[0] = cpu_to_le32(kdesc.evt_mask);
  390. i2o_msg_post(c, msg);
  391. return 0;
  392. }
  393. static int i2o_cfg_evt_get(unsigned long arg, struct file *fp)
  394. {
  395. struct i2o_cfg_info *p = NULL;
  396. struct i2o_evt_get __user *uget = (struct i2o_evt_get __user *)arg;
  397. struct i2o_evt_get kget;
  398. unsigned long flags;
  399. for (p = open_files; p; p = p->next)
  400. if (p->q_id == (ulong) fp->private_data)
  401. break;
  402. if (!p->q_len)
  403. return -ENOENT;
  404. memcpy(&kget.info, &p->event_q[p->q_out], sizeof(struct i2o_evt_info));
  405. MODINC(p->q_out, I2O_EVT_Q_LEN);
  406. spin_lock_irqsave(&i2o_config_lock, flags);
  407. p->q_len--;
  408. kget.pending = p->q_len;
  409. kget.lost = p->q_lost;
  410. spin_unlock_irqrestore(&i2o_config_lock, flags);
  411. if (copy_to_user(uget, &kget, sizeof(struct i2o_evt_get)))
  412. return -EFAULT;
  413. return 0;
  414. }
  415. #ifdef CONFIG_COMPAT
  416. static int i2o_cfg_passthru32(struct file *file, unsigned cmnd,
  417. unsigned long arg)
  418. {
  419. struct i2o_cmd_passthru32 __user *cmd;
  420. struct i2o_controller *c;
  421. u32 __user *user_msg;
  422. u32 *reply = NULL;
  423. u32 __user *user_reply = NULL;
  424. u32 size = 0;
  425. u32 reply_size = 0;
  426. u32 rcode = 0;
  427. struct i2o_dma sg_list[SG_TABLESIZE];
  428. u32 sg_offset = 0;
  429. u32 sg_count = 0;
  430. u32 i = 0;
  431. u32 sg_index = 0;
  432. i2o_status_block *sb;
  433. struct i2o_message *msg;
  434. unsigned int iop;
  435. cmd = (struct i2o_cmd_passthru32 __user *)arg;
  436. if (get_user(iop, &cmd->iop) || get_user(i, &cmd->msg))
  437. return -EFAULT;
  438. user_msg = compat_ptr(i);
  439. c = i2o_find_iop(iop);
  440. if (!c) {
  441. osm_debug("controller %d not found\n", iop);
  442. return -ENXIO;
  443. }
  444. msg = i2o_msg_get_wait(c, I2O_TIMEOUT_MESSAGE_GET);
  445. sb = c->status_block.virt;
  446. if (get_user(size, &user_msg[0])) {
  447. osm_warn("unable to get size!\n");
  448. return -EFAULT;
  449. }
  450. size = size >> 16;
  451. if (size > sb->inbound_frame_size) {
  452. osm_warn("size of message > inbound_frame_size");
  453. return -EFAULT;
  454. }
  455. user_reply = &user_msg[size];
  456. size <<= 2; // Convert to bytes
  457. /* Copy in the user's I2O command */
  458. if (copy_from_user(msg, user_msg, size)) {
  459. osm_warn("unable to copy user message\n");
  460. return -EFAULT;
  461. }
  462. i2o_dump_message(msg);
  463. if (get_user(reply_size, &user_reply[0]) < 0)
  464. return -EFAULT;
  465. reply_size >>= 16;
  466. reply_size <<= 2;
  467. reply = kzalloc(reply_size, GFP_KERNEL);
  468. if (!reply) {
  469. printk(KERN_WARNING "%s: Could not allocate reply buffer\n",
  470. c->name);
  471. return -ENOMEM;
  472. }
  473. sg_offset = (msg->u.head[0] >> 4) & 0x0f;
  474. memset(sg_list, 0, sizeof(sg_list[0]) * SG_TABLESIZE);
  475. if (sg_offset) {
  476. struct sg_simple_element *sg;
  477. if (sg_offset * 4 >= size) {
  478. rcode = -EFAULT;
  479. goto cleanup;
  480. }
  481. // TODO 64bit fix
  482. sg = (struct sg_simple_element *)((&msg->u.head[0]) +
  483. sg_offset);
  484. sg_count =
  485. (size - sg_offset * 4) / sizeof(struct sg_simple_element);
  486. if (sg_count > SG_TABLESIZE) {
  487. printk(KERN_DEBUG "%s:IOCTL SG List too large (%u)\n",
  488. c->name, sg_count);
  489. rcode = -EINVAL;
  490. goto cleanup;
  491. }
  492. for (i = 0; i < sg_count; i++) {
  493. int sg_size;
  494. struct i2o_dma *p;
  495. if (!(sg[i].flag_count & 0x10000000
  496. /*I2O_SGL_FLAGS_SIMPLE_ADDRESS_ELEMENT */ )) {
  497. printk(KERN_DEBUG
  498. "%s:Bad SG element %d - not simple (%x)\n",
  499. c->name, i, sg[i].flag_count);
  500. rcode = -EINVAL;
  501. goto cleanup;
  502. }
  503. sg_size = sg[i].flag_count & 0xffffff;
  504. p = &(sg_list[sg_index]);
  505. /* Allocate memory for the transfer */
  506. if (i2o_dma_alloc
  507. (&c->pdev->dev, p, sg_size,
  508. PCI_DMA_BIDIRECTIONAL)) {
  509. printk(KERN_DEBUG
  510. "%s: Could not allocate SG buffer - size = %d buffer number %d of %d\n",
  511. c->name, sg_size, i, sg_count);
  512. rcode = -ENOMEM;
  513. goto sg_list_cleanup;
  514. }
  515. sg_index++;
  516. /* Copy in the user's SG buffer if necessary */
  517. if (sg[i].
  518. flag_count & 0x04000000 /*I2O_SGL_FLAGS_DIR */ ) {
  519. // TODO 64bit fix
  520. if (copy_from_user
  521. (p->virt,
  522. (void __user *)(unsigned long)sg[i].
  523. addr_bus, sg_size)) {
  524. printk(KERN_DEBUG
  525. "%s: Could not copy SG buf %d FROM user\n",
  526. c->name, i);
  527. rcode = -EFAULT;
  528. goto sg_list_cleanup;
  529. }
  530. }
  531. //TODO 64bit fix
  532. sg[i].addr_bus = (u32) p->phys;
  533. }
  534. }
  535. rcode = i2o_msg_post_wait(c, msg, 60);
  536. if (rcode) {
  537. reply[4] = ((u32) rcode) << 24;
  538. goto sg_list_cleanup;
  539. }
  540. if (sg_offset) {
  541. u32 msg[I2O_OUTBOUND_MSG_FRAME_SIZE];
  542. /* Copy back the Scatter Gather buffers back to user space */
  543. u32 j;
  544. // TODO 64bit fix
  545. struct sg_simple_element *sg;
  546. int sg_size;
  547. // re-acquire the original message to handle correctly the sg copy operation
  548. memset(&msg, 0, I2O_OUTBOUND_MSG_FRAME_SIZE * 4);
  549. // get user msg size in u32s
  550. if (get_user(size, &user_msg[0])) {
  551. rcode = -EFAULT;
  552. goto sg_list_cleanup;
  553. }
  554. size = size >> 16;
  555. size *= 4;
  556. /* Copy in the user's I2O command */
  557. if (copy_from_user(msg, user_msg, size)) {
  558. rcode = -EFAULT;
  559. goto sg_list_cleanup;
  560. }
  561. sg_count =
  562. (size - sg_offset * 4) / sizeof(struct sg_simple_element);
  563. // TODO 64bit fix
  564. sg = (struct sg_simple_element *)(msg + sg_offset);
  565. for (j = 0; j < sg_count; j++) {
  566. /* Copy out the SG list to user's buffer if necessary */
  567. if (!
  568. (sg[j].
  569. flag_count & 0x4000000 /*I2O_SGL_FLAGS_DIR */ )) {
  570. sg_size = sg[j].flag_count & 0xffffff;
  571. // TODO 64bit fix
  572. if (copy_to_user
  573. ((void __user *)(u64) sg[j].addr_bus,
  574. sg_list[j].virt, sg_size)) {
  575. printk(KERN_WARNING
  576. "%s: Could not copy %p TO user %x\n",
  577. c->name, sg_list[j].virt,
  578. sg[j].addr_bus);
  579. rcode = -EFAULT;
  580. goto sg_list_cleanup;
  581. }
  582. }
  583. }
  584. }
  585. sg_list_cleanup:
  586. /* Copy back the reply to user space */
  587. if (reply_size) {
  588. // we wrote our own values for context - now restore the user supplied ones
  589. if (copy_from_user(reply + 2, user_msg + 2, sizeof(u32) * 2)) {
  590. printk(KERN_WARNING
  591. "%s: Could not copy message context FROM user\n",
  592. c->name);
  593. rcode = -EFAULT;
  594. goto sg_list_cleanup;
  595. }
  596. if (copy_to_user(user_reply, reply, reply_size)) {
  597. printk(KERN_WARNING
  598. "%s: Could not copy reply TO user\n", c->name);
  599. rcode = -EFAULT;
  600. }
  601. }
  602. for (i = 0; i < sg_index; i++)
  603. i2o_dma_free(&c->pdev->dev, &sg_list[i]);
  604. cleanup:
  605. kfree(reply);
  606. return rcode;
  607. }
  608. static long i2o_cfg_compat_ioctl(struct file *file, unsigned cmd,
  609. unsigned long arg)
  610. {
  611. int ret;
  612. lock_kernel();
  613. switch (cmd) {
  614. case I2OGETIOPS:
  615. ret = i2o_cfg_ioctl(NULL, file, cmd, arg);
  616. break;
  617. case I2OPASSTHRU32:
  618. ret = i2o_cfg_passthru32(file, cmd, arg);
  619. break;
  620. default:
  621. ret = -ENOIOCTLCMD;
  622. break;
  623. }
  624. unlock_kernel();
  625. return ret;
  626. }
  627. #endif
  628. #ifdef CONFIG_I2O_EXT_ADAPTEC
  629. static int i2o_cfg_passthru(unsigned long arg)
  630. {
  631. struct i2o_cmd_passthru __user *cmd =
  632. (struct i2o_cmd_passthru __user *)arg;
  633. struct i2o_controller *c;
  634. u32 __user *user_msg;
  635. u32 *reply = NULL;
  636. u32 __user *user_reply = NULL;
  637. u32 size = 0;
  638. u32 reply_size = 0;
  639. u32 rcode = 0;
  640. void *sg_list[SG_TABLESIZE];
  641. u32 sg_offset = 0;
  642. u32 sg_count = 0;
  643. int sg_index = 0;
  644. u32 i = 0;
  645. void *p = NULL;
  646. i2o_status_block *sb;
  647. struct i2o_message *msg;
  648. unsigned int iop;
  649. if (get_user(iop, &cmd->iop) || get_user(user_msg, &cmd->msg))
  650. return -EFAULT;
  651. c = i2o_find_iop(iop);
  652. if (!c) {
  653. osm_warn("controller %d not found\n", iop);
  654. return -ENXIO;
  655. }
  656. msg = i2o_msg_get_wait(c, I2O_TIMEOUT_MESSAGE_GET);
  657. sb = c->status_block.virt;
  658. if (get_user(size, &user_msg[0]))
  659. return -EFAULT;
  660. size = size >> 16;
  661. if (size > sb->inbound_frame_size) {
  662. osm_warn("size of message > inbound_frame_size");
  663. return -EFAULT;
  664. }
  665. user_reply = &user_msg[size];
  666. size <<= 2; // Convert to bytes
  667. /* Copy in the user's I2O command */
  668. if (copy_from_user(msg, user_msg, size))
  669. return -EFAULT;
  670. if (get_user(reply_size, &user_reply[0]) < 0)
  671. return -EFAULT;
  672. reply_size >>= 16;
  673. reply_size <<= 2;
  674. reply = kzalloc(reply_size, GFP_KERNEL);
  675. if (!reply) {
  676. printk(KERN_WARNING "%s: Could not allocate reply buffer\n",
  677. c->name);
  678. return -ENOMEM;
  679. }
  680. sg_offset = (msg->u.head[0] >> 4) & 0x0f;
  681. memset(sg_list, 0, sizeof(sg_list[0]) * SG_TABLESIZE);
  682. if (sg_offset) {
  683. struct sg_simple_element *sg;
  684. if (sg_offset * 4 >= size) {
  685. rcode = -EFAULT;
  686. goto cleanup;
  687. }
  688. // TODO 64bit fix
  689. sg = (struct sg_simple_element *)((&msg->u.head[0]) +
  690. sg_offset);
  691. sg_count =
  692. (size - sg_offset * 4) / sizeof(struct sg_simple_element);
  693. if (sg_count > SG_TABLESIZE) {
  694. printk(KERN_DEBUG "%s:IOCTL SG List too large (%u)\n",
  695. c->name, sg_count);
  696. rcode = -EINVAL;
  697. goto cleanup;
  698. }
  699. for (i = 0; i < sg_count; i++) {
  700. int sg_size;
  701. if (!(sg[i].flag_count & 0x10000000
  702. /*I2O_SGL_FLAGS_SIMPLE_ADDRESS_ELEMENT */ )) {
  703. printk(KERN_DEBUG
  704. "%s:Bad SG element %d - not simple (%x)\n",
  705. c->name, i, sg[i].flag_count);
  706. rcode = -EINVAL;
  707. goto sg_list_cleanup;
  708. }
  709. sg_size = sg[i].flag_count & 0xffffff;
  710. /* Allocate memory for the transfer */
  711. p = kmalloc(sg_size, GFP_KERNEL);
  712. if (!p) {
  713. printk(KERN_DEBUG
  714. "%s: Could not allocate SG buffer - size = %d buffer number %d of %d\n",
  715. c->name, sg_size, i, sg_count);
  716. rcode = -ENOMEM;
  717. goto sg_list_cleanup;
  718. }
  719. sg_list[sg_index++] = p; // sglist indexed with input frame, not our internal frame.
  720. /* Copy in the user's SG buffer if necessary */
  721. if (sg[i].
  722. flag_count & 0x04000000 /*I2O_SGL_FLAGS_DIR */ ) {
  723. // TODO 64bit fix
  724. if (copy_from_user
  725. (p, (void __user *)sg[i].addr_bus,
  726. sg_size)) {
  727. printk(KERN_DEBUG
  728. "%s: Could not copy SG buf %d FROM user\n",
  729. c->name, i);
  730. rcode = -EFAULT;
  731. goto sg_list_cleanup;
  732. }
  733. }
  734. //TODO 64bit fix
  735. sg[i].addr_bus = virt_to_bus(p);
  736. }
  737. }
  738. rcode = i2o_msg_post_wait(c, msg, 60);
  739. if (rcode) {
  740. reply[4] = ((u32) rcode) << 24;
  741. goto sg_list_cleanup;
  742. }
  743. if (sg_offset) {
  744. u32 msg[128];
  745. /* Copy back the Scatter Gather buffers back to user space */
  746. u32 j;
  747. // TODO 64bit fix
  748. struct sg_simple_element *sg;
  749. int sg_size;
  750. // re-acquire the original message to handle correctly the sg copy operation
  751. memset(&msg, 0, I2O_OUTBOUND_MSG_FRAME_SIZE * 4);
  752. // get user msg size in u32s
  753. if (get_user(size, &user_msg[0])) {
  754. rcode = -EFAULT;
  755. goto sg_list_cleanup;
  756. }
  757. size = size >> 16;
  758. size *= 4;
  759. /* Copy in the user's I2O command */
  760. if (copy_from_user(msg, user_msg, size)) {
  761. rcode = -EFAULT;
  762. goto sg_list_cleanup;
  763. }
  764. sg_count =
  765. (size - sg_offset * 4) / sizeof(struct sg_simple_element);
  766. // TODO 64bit fix
  767. sg = (struct sg_simple_element *)(msg + sg_offset);
  768. for (j = 0; j < sg_count; j++) {
  769. /* Copy out the SG list to user's buffer if necessary */
  770. if (!
  771. (sg[j].
  772. flag_count & 0x4000000 /*I2O_SGL_FLAGS_DIR */ )) {
  773. sg_size = sg[j].flag_count & 0xffffff;
  774. // TODO 64bit fix
  775. if (copy_to_user
  776. ((void __user *)sg[j].addr_bus, sg_list[j],
  777. sg_size)) {
  778. printk(KERN_WARNING
  779. "%s: Could not copy %p TO user %x\n",
  780. c->name, sg_list[j],
  781. sg[j].addr_bus);
  782. rcode = -EFAULT;
  783. goto sg_list_cleanup;
  784. }
  785. }
  786. }
  787. }
  788. sg_list_cleanup:
  789. /* Copy back the reply to user space */
  790. if (reply_size) {
  791. // we wrote our own values for context - now restore the user supplied ones
  792. if (copy_from_user(reply + 2, user_msg + 2, sizeof(u32) * 2)) {
  793. printk(KERN_WARNING
  794. "%s: Could not copy message context FROM user\n",
  795. c->name);
  796. rcode = -EFAULT;
  797. }
  798. if (copy_to_user(user_reply, reply, reply_size)) {
  799. printk(KERN_WARNING
  800. "%s: Could not copy reply TO user\n", c->name);
  801. rcode = -EFAULT;
  802. }
  803. }
  804. for (i = 0; i < sg_index; i++)
  805. kfree(sg_list[i]);
  806. cleanup:
  807. kfree(reply);
  808. return rcode;
  809. }
  810. #endif
  811. /*
  812. * IOCTL Handler
  813. */
  814. static int i2o_cfg_ioctl(struct inode *inode, struct file *fp, unsigned int cmd,
  815. unsigned long arg)
  816. {
  817. int ret;
  818. switch (cmd) {
  819. case I2OGETIOPS:
  820. ret = i2o_cfg_getiops(arg);
  821. break;
  822. case I2OHRTGET:
  823. ret = i2o_cfg_gethrt(arg);
  824. break;
  825. case I2OLCTGET:
  826. ret = i2o_cfg_getlct(arg);
  827. break;
  828. case I2OPARMSET:
  829. ret = i2o_cfg_parms(arg, I2OPARMSET);
  830. break;
  831. case I2OPARMGET:
  832. ret = i2o_cfg_parms(arg, I2OPARMGET);
  833. break;
  834. case I2OSWDL:
  835. ret = i2o_cfg_swdl(arg);
  836. break;
  837. case I2OSWUL:
  838. ret = i2o_cfg_swul(arg);
  839. break;
  840. case I2OSWDEL:
  841. ret = i2o_cfg_swdel(arg);
  842. break;
  843. case I2OVALIDATE:
  844. ret = i2o_cfg_validate(arg);
  845. break;
  846. case I2OEVTREG:
  847. ret = i2o_cfg_evt_reg(arg, fp);
  848. break;
  849. case I2OEVTGET:
  850. ret = i2o_cfg_evt_get(arg, fp);
  851. break;
  852. #ifdef CONFIG_I2O_EXT_ADAPTEC
  853. case I2OPASSTHRU:
  854. ret = i2o_cfg_passthru(arg);
  855. break;
  856. #endif
  857. default:
  858. osm_debug("unknown ioctl called!\n");
  859. ret = -EINVAL;
  860. }
  861. return ret;
  862. }
  863. static int cfg_open(struct inode *inode, struct file *file)
  864. {
  865. struct i2o_cfg_info *tmp =
  866. (struct i2o_cfg_info *)kmalloc(sizeof(struct i2o_cfg_info),
  867. GFP_KERNEL);
  868. unsigned long flags;
  869. if (!tmp)
  870. return -ENOMEM;
  871. file->private_data = (void *)(i2o_cfg_info_id++);
  872. tmp->fp = file;
  873. tmp->fasync = NULL;
  874. tmp->q_id = (ulong) file->private_data;
  875. tmp->q_len = 0;
  876. tmp->q_in = 0;
  877. tmp->q_out = 0;
  878. tmp->q_lost = 0;
  879. tmp->next = open_files;
  880. spin_lock_irqsave(&i2o_config_lock, flags);
  881. open_files = tmp;
  882. spin_unlock_irqrestore(&i2o_config_lock, flags);
  883. return 0;
  884. }
  885. static int cfg_fasync(int fd, struct file *fp, int on)
  886. {
  887. ulong id = (ulong) fp->private_data;
  888. struct i2o_cfg_info *p;
  889. for (p = open_files; p; p = p->next)
  890. if (p->q_id == id)
  891. break;
  892. if (!p)
  893. return -EBADF;
  894. return fasync_helper(fd, fp, on, &p->fasync);
  895. }
  896. static int cfg_release(struct inode *inode, struct file *file)
  897. {
  898. ulong id = (ulong) file->private_data;
  899. struct i2o_cfg_info *p1, *p2;
  900. unsigned long flags;
  901. lock_kernel();
  902. p1 = p2 = NULL;
  903. spin_lock_irqsave(&i2o_config_lock, flags);
  904. for (p1 = open_files; p1;) {
  905. if (p1->q_id == id) {
  906. if (p1->fasync)
  907. cfg_fasync(-1, file, 0);
  908. if (p2)
  909. p2->next = p1->next;
  910. else
  911. open_files = p1->next;
  912. kfree(p1);
  913. break;
  914. }
  915. p2 = p1;
  916. p1 = p1->next;
  917. }
  918. spin_unlock_irqrestore(&i2o_config_lock, flags);
  919. unlock_kernel();
  920. return 0;
  921. }
  922. static struct file_operations config_fops = {
  923. .owner = THIS_MODULE,
  924. .llseek = no_llseek,
  925. .ioctl = i2o_cfg_ioctl,
  926. #ifdef CONFIG_COMPAT
  927. .compat_ioctl = i2o_cfg_compat_ioctl,
  928. #endif
  929. .open = cfg_open,
  930. .release = cfg_release,
  931. .fasync = cfg_fasync,
  932. };
  933. static struct miscdevice i2o_miscdev = {
  934. I2O_MINOR,
  935. "i2octl",
  936. &config_fops
  937. };
  938. static int __init i2o_config_old_init(void)
  939. {
  940. spin_lock_init(&i2o_config_lock);
  941. if (misc_register(&i2o_miscdev) < 0) {
  942. osm_err("can't register device.\n");
  943. return -EBUSY;
  944. }
  945. return 0;
  946. }
  947. static void i2o_config_old_exit(void)
  948. {
  949. misc_deregister(&i2o_miscdev);
  950. }
  951. MODULE_AUTHOR("Red Hat Software");