i2o_config.c 26 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145
  1. /*
  2. * I2O Configuration Interface Driver
  3. *
  4. * (C) Copyright 1999-2002 Red Hat
  5. *
  6. * Written by Alan Cox, Building Number Three Ltd
  7. *
  8. * Fixes/additions:
  9. * Deepak Saxena (04/20/1999):
  10. * Added basic ioctl() support
  11. * Deepak Saxena (06/07/1999):
  12. * Added software download ioctl (still testing)
  13. * Auvo Häkkinen (09/10/1999):
  14. * Changes to i2o_cfg_reply(), ioctl_parms()
  15. * Added ioct_validate()
  16. * Taneli Vähäkangas (09/30/1999):
  17. * Fixed ioctl_swdl()
  18. * Taneli Vähäkangas (10/04/1999):
  19. * Changed ioctl_swdl(), implemented ioctl_swul() and ioctl_swdel()
  20. * Deepak Saxena (11/18/1999):
  21. * Added event managmenet support
  22. * Alan Cox <alan@redhat.com>:
  23. * 2.4 rewrite ported to 2.5
  24. * Markus Lidel <Markus.Lidel@shadowconnect.com>:
  25. * Added pass-thru support for Adaptec's raidutils
  26. *
  27. * This program is free software; you can redistribute it and/or
  28. * modify it under the terms of the GNU General Public License
  29. * as published by the Free Software Foundation; either version
  30. * 2 of the License, or (at your option) any later version.
  31. */
  32. #include <linux/miscdevice.h>
  33. #include <linux/smp_lock.h>
  34. #include <linux/compat.h>
  35. #include <asm/uaccess.h>
  36. #define SG_TABLESIZE 30
  37. extern int i2o_parm_issue(struct i2o_device *, int, void *, int, void *, int);
  38. static int i2o_cfg_ioctl(struct inode *, struct file *, unsigned int,
  39. unsigned long);
  40. static spinlock_t i2o_config_lock;
  41. #define MODINC(x,y) ((x) = ((x) + 1) % (y))
  42. struct sg_simple_element {
  43. u32 flag_count;
  44. u32 addr_bus;
  45. };
  46. struct i2o_cfg_info {
  47. struct file *fp;
  48. struct fasync_struct *fasync;
  49. struct i2o_evt_info event_q[I2O_EVT_Q_LEN];
  50. u16 q_in; // Queue head index
  51. u16 q_out; // Queue tail index
  52. u16 q_len; // Queue length
  53. u16 q_lost; // Number of lost events
  54. ulong q_id; // Event queue ID...used as tx_context
  55. struct i2o_cfg_info *next;
  56. };
  57. static struct i2o_cfg_info *open_files = NULL;
  58. static ulong i2o_cfg_info_id = 0;
  59. static int i2o_cfg_getiops(unsigned long arg)
  60. {
  61. struct i2o_controller *c;
  62. u8 __user *user_iop_table = (void __user *)arg;
  63. u8 tmp[MAX_I2O_CONTROLLERS];
  64. int ret = 0;
  65. memset(tmp, 0, MAX_I2O_CONTROLLERS);
  66. list_for_each_entry(c, &i2o_controllers, list)
  67. tmp[c->unit] = 1;
  68. if (copy_to_user(user_iop_table, tmp, MAX_I2O_CONTROLLERS))
  69. ret = -EFAULT;
  70. return ret;
  71. };
  72. static int i2o_cfg_gethrt(unsigned long arg)
  73. {
  74. struct i2o_controller *c;
  75. struct i2o_cmd_hrtlct __user *cmd = (struct i2o_cmd_hrtlct __user *)arg;
  76. struct i2o_cmd_hrtlct kcmd;
  77. i2o_hrt *hrt;
  78. int len;
  79. u32 reslen;
  80. int ret = 0;
  81. if (copy_from_user(&kcmd, cmd, sizeof(struct i2o_cmd_hrtlct)))
  82. return -EFAULT;
  83. if (get_user(reslen, kcmd.reslen) < 0)
  84. return -EFAULT;
  85. if (kcmd.resbuf == NULL)
  86. return -EFAULT;
  87. c = i2o_find_iop(kcmd.iop);
  88. if (!c)
  89. return -ENXIO;
  90. hrt = (i2o_hrt *) c->hrt.virt;
  91. len = 8 + ((hrt->entry_len * hrt->num_entries) << 2);
  92. /* We did a get user...so assuming mem is ok...is this bad? */
  93. put_user(len, kcmd.reslen);
  94. if (len > reslen)
  95. ret = -ENOBUFS;
  96. if (copy_to_user(kcmd.resbuf, (void *)hrt, len))
  97. ret = -EFAULT;
  98. return ret;
  99. };
  100. static int i2o_cfg_getlct(unsigned long arg)
  101. {
  102. struct i2o_controller *c;
  103. struct i2o_cmd_hrtlct __user *cmd = (struct i2o_cmd_hrtlct __user *)arg;
  104. struct i2o_cmd_hrtlct kcmd;
  105. i2o_lct *lct;
  106. int len;
  107. int ret = 0;
  108. u32 reslen;
  109. if (copy_from_user(&kcmd, cmd, sizeof(struct i2o_cmd_hrtlct)))
  110. return -EFAULT;
  111. if (get_user(reslen, kcmd.reslen) < 0)
  112. return -EFAULT;
  113. if (kcmd.resbuf == NULL)
  114. return -EFAULT;
  115. c = i2o_find_iop(kcmd.iop);
  116. if (!c)
  117. return -ENXIO;
  118. lct = (i2o_lct *) c->lct;
  119. len = (unsigned int)lct->table_size << 2;
  120. put_user(len, kcmd.reslen);
  121. if (len > reslen)
  122. ret = -ENOBUFS;
  123. else if (copy_to_user(kcmd.resbuf, lct, len))
  124. ret = -EFAULT;
  125. return ret;
  126. };
  127. static int i2o_cfg_parms(unsigned long arg, unsigned int type)
  128. {
  129. int ret = 0;
  130. struct i2o_controller *c;
  131. struct i2o_device *dev;
  132. struct i2o_cmd_psetget __user *cmd =
  133. (struct i2o_cmd_psetget __user *)arg;
  134. struct i2o_cmd_psetget kcmd;
  135. u32 reslen;
  136. u8 *ops;
  137. u8 *res;
  138. int len = 0;
  139. u32 i2o_cmd = (type == I2OPARMGET ?
  140. I2O_CMD_UTIL_PARAMS_GET : I2O_CMD_UTIL_PARAMS_SET);
  141. if (copy_from_user(&kcmd, cmd, sizeof(struct i2o_cmd_psetget)))
  142. return -EFAULT;
  143. if (get_user(reslen, kcmd.reslen))
  144. return -EFAULT;
  145. c = i2o_find_iop(kcmd.iop);
  146. if (!c)
  147. return -ENXIO;
  148. dev = i2o_iop_find_device(c, kcmd.tid);
  149. if (!dev)
  150. return -ENXIO;
  151. ops = (u8 *) kmalloc(kcmd.oplen, GFP_KERNEL);
  152. if (!ops)
  153. return -ENOMEM;
  154. if (copy_from_user(ops, kcmd.opbuf, kcmd.oplen)) {
  155. kfree(ops);
  156. return -EFAULT;
  157. }
  158. /*
  159. * It's possible to have a _very_ large table
  160. * and that the user asks for all of it at once...
  161. */
  162. res = (u8 *) kmalloc(65536, GFP_KERNEL);
  163. if (!res) {
  164. kfree(ops);
  165. return -ENOMEM;
  166. }
  167. len = i2o_parm_issue(dev, i2o_cmd, ops, kcmd.oplen, res, 65536);
  168. kfree(ops);
  169. if (len < 0) {
  170. kfree(res);
  171. return -EAGAIN;
  172. }
  173. put_user(len, kcmd.reslen);
  174. if (len > reslen)
  175. ret = -ENOBUFS;
  176. else if (copy_to_user(kcmd.resbuf, res, len))
  177. ret = -EFAULT;
  178. kfree(res);
  179. return ret;
  180. };
  181. static int i2o_cfg_swdl(unsigned long arg)
  182. {
  183. struct i2o_sw_xfer kxfer;
  184. struct i2o_sw_xfer __user *pxfer = (struct i2o_sw_xfer __user *)arg;
  185. unsigned char maxfrag = 0, curfrag = 1;
  186. struct i2o_dma buffer;
  187. struct i2o_message *msg;
  188. unsigned int status = 0, swlen = 0, fragsize = 8192;
  189. struct i2o_controller *c;
  190. if (copy_from_user(&kxfer, pxfer, sizeof(struct i2o_sw_xfer)))
  191. return -EFAULT;
  192. if (get_user(swlen, kxfer.swlen) < 0)
  193. return -EFAULT;
  194. if (get_user(maxfrag, kxfer.maxfrag) < 0)
  195. return -EFAULT;
  196. if (get_user(curfrag, kxfer.curfrag) < 0)
  197. return -EFAULT;
  198. if (curfrag == maxfrag)
  199. fragsize = swlen - (maxfrag - 1) * 8192;
  200. if (!kxfer.buf || !access_ok(VERIFY_READ, kxfer.buf, fragsize))
  201. return -EFAULT;
  202. c = i2o_find_iop(kxfer.iop);
  203. if (!c)
  204. return -ENXIO;
  205. msg = i2o_msg_get_wait(c, I2O_TIMEOUT_MESSAGE_GET);
  206. if (IS_ERR(msg))
  207. return PTR_ERR(msg);
  208. if (i2o_dma_alloc(&c->pdev->dev, &buffer, fragsize, GFP_KERNEL)) {
  209. i2o_msg_nop(c, msg);
  210. return -ENOMEM;
  211. }
  212. __copy_from_user(buffer.virt, kxfer.buf, fragsize);
  213. msg->u.head[0] = cpu_to_le32(NINE_WORD_MSG_SIZE | SGL_OFFSET_7);
  214. msg->u.head[1] =
  215. cpu_to_le32(I2O_CMD_SW_DOWNLOAD << 24 | HOST_TID << 12 |
  216. ADAPTER_TID);
  217. msg->u.head[2] = cpu_to_le32(i2o_config_driver.context);
  218. msg->u.head[3] = cpu_to_le32(0);
  219. msg->body[0] =
  220. cpu_to_le32((((u32) kxfer.flags) << 24) | (((u32) kxfer.
  221. sw_type) << 16) |
  222. (((u32) maxfrag) << 8) | (((u32) curfrag)));
  223. msg->body[1] = cpu_to_le32(swlen);
  224. msg->body[2] = cpu_to_le32(kxfer.sw_id);
  225. msg->body[3] = cpu_to_le32(0xD0000000 | fragsize);
  226. msg->body[4] = cpu_to_le32(buffer.phys);
  227. osm_debug("swdl frag %d/%d (size %d)\n", curfrag, maxfrag, fragsize);
  228. status = i2o_msg_post_wait_mem(c, msg, 60, &buffer);
  229. if (status != -ETIMEDOUT)
  230. i2o_dma_free(&c->pdev->dev, &buffer);
  231. if (status != I2O_POST_WAIT_OK) {
  232. // it fails if you try and send frags out of order
  233. // and for some yet unknown reasons too
  234. osm_info("swdl failed, DetailedStatus = %d\n", status);
  235. return status;
  236. }
  237. return 0;
  238. };
  239. static int i2o_cfg_swul(unsigned long arg)
  240. {
  241. struct i2o_sw_xfer kxfer;
  242. struct i2o_sw_xfer __user *pxfer = (struct i2o_sw_xfer __user *)arg;
  243. unsigned char maxfrag = 0, curfrag = 1;
  244. struct i2o_dma buffer;
  245. struct i2o_message *msg;
  246. unsigned int status = 0, swlen = 0, fragsize = 8192;
  247. struct i2o_controller *c;
  248. int ret = 0;
  249. if (copy_from_user(&kxfer, pxfer, sizeof(struct i2o_sw_xfer)))
  250. goto return_fault;
  251. if (get_user(swlen, kxfer.swlen) < 0)
  252. goto return_fault;
  253. if (get_user(maxfrag, kxfer.maxfrag) < 0)
  254. goto return_fault;
  255. if (get_user(curfrag, kxfer.curfrag) < 0)
  256. goto return_fault;
  257. if (curfrag == maxfrag)
  258. fragsize = swlen - (maxfrag - 1) * 8192;
  259. if (!kxfer.buf)
  260. goto return_fault;
  261. c = i2o_find_iop(kxfer.iop);
  262. if (!c)
  263. return -ENXIO;
  264. msg = i2o_msg_get_wait(c, I2O_TIMEOUT_MESSAGE_GET);
  265. if (IS_ERR(msg))
  266. return PTR_ERR(msg);
  267. if (i2o_dma_alloc(&c->pdev->dev, &buffer, fragsize, GFP_KERNEL)) {
  268. i2o_msg_nop(c, msg);
  269. return -ENOMEM;
  270. }
  271. msg->u.head[0] = cpu_to_le32(NINE_WORD_MSG_SIZE | SGL_OFFSET_7);
  272. msg->u.head[1] =
  273. cpu_to_le32(I2O_CMD_SW_UPLOAD << 24 | HOST_TID << 12 | ADAPTER_TID);
  274. msg->u.head[2] = cpu_to_le32(i2o_config_driver.context);
  275. msg->u.head[3] = cpu_to_le32(0);
  276. msg->body[0] =
  277. cpu_to_le32((u32) kxfer.flags << 24 | (u32) kxfer.
  278. sw_type << 16 | (u32) maxfrag << 8 | (u32) curfrag);
  279. msg->body[1] = cpu_to_le32(swlen);
  280. msg->body[2] = cpu_to_le32(kxfer.sw_id);
  281. msg->body[3] = cpu_to_le32(0xD0000000 | fragsize);
  282. msg->body[4] = cpu_to_le32(buffer.phys);
  283. osm_debug("swul frag %d/%d (size %d)\n", curfrag, maxfrag, fragsize);
  284. status = i2o_msg_post_wait_mem(c, msg, 60, &buffer);
  285. if (status != I2O_POST_WAIT_OK) {
  286. if (status != -ETIMEDOUT)
  287. i2o_dma_free(&c->pdev->dev, &buffer);
  288. osm_info("swul failed, DetailedStatus = %d\n", status);
  289. return status;
  290. }
  291. if (copy_to_user(kxfer.buf, buffer.virt, fragsize))
  292. ret = -EFAULT;
  293. i2o_dma_free(&c->pdev->dev, &buffer);
  294. return_ret:
  295. return ret;
  296. return_fault:
  297. ret = -EFAULT;
  298. goto return_ret;
  299. };
  300. static int i2o_cfg_swdel(unsigned long arg)
  301. {
  302. struct i2o_controller *c;
  303. struct i2o_sw_xfer kxfer;
  304. struct i2o_sw_xfer __user *pxfer = (struct i2o_sw_xfer __user *)arg;
  305. struct i2o_message *msg;
  306. unsigned int swlen;
  307. int token;
  308. if (copy_from_user(&kxfer, pxfer, sizeof(struct i2o_sw_xfer)))
  309. return -EFAULT;
  310. if (get_user(swlen, kxfer.swlen) < 0)
  311. return -EFAULT;
  312. c = i2o_find_iop(kxfer.iop);
  313. if (!c)
  314. return -ENXIO;
  315. msg = i2o_msg_get_wait(c, I2O_TIMEOUT_MESSAGE_GET);
  316. if (IS_ERR(msg))
  317. return PTR_ERR(msg);
  318. msg->u.head[0] = cpu_to_le32(SEVEN_WORD_MSG_SIZE | SGL_OFFSET_0);
  319. msg->u.head[1] =
  320. cpu_to_le32(I2O_CMD_SW_REMOVE << 24 | HOST_TID << 12 | ADAPTER_TID);
  321. msg->u.head[2] = cpu_to_le32(i2o_config_driver.context);
  322. msg->u.head[3] = cpu_to_le32(0);
  323. msg->body[0] =
  324. cpu_to_le32((u32) kxfer.flags << 24 | (u32) kxfer.sw_type << 16);
  325. msg->body[1] = cpu_to_le32(swlen);
  326. msg->body[2] = cpu_to_le32(kxfer.sw_id);
  327. token = i2o_msg_post_wait(c, msg, 10);
  328. if (token != I2O_POST_WAIT_OK) {
  329. osm_info("swdel failed, DetailedStatus = %d\n", token);
  330. return -ETIMEDOUT;
  331. }
  332. return 0;
  333. };
  334. static int i2o_cfg_validate(unsigned long arg)
  335. {
  336. int token;
  337. int iop = (int)arg;
  338. struct i2o_message *msg;
  339. struct i2o_controller *c;
  340. c = i2o_find_iop(iop);
  341. if (!c)
  342. return -ENXIO;
  343. msg = i2o_msg_get_wait(c, I2O_TIMEOUT_MESSAGE_GET);
  344. if (IS_ERR(msg))
  345. return PTR_ERR(msg);
  346. msg->u.head[0] = cpu_to_le32(FOUR_WORD_MSG_SIZE | SGL_OFFSET_0);
  347. msg->u.head[1] =
  348. cpu_to_le32(I2O_CMD_CONFIG_VALIDATE << 24 | HOST_TID << 12 | iop);
  349. msg->u.head[2] = cpu_to_le32(i2o_config_driver.context);
  350. msg->u.head[3] = cpu_to_le32(0);
  351. token = i2o_msg_post_wait(c, msg, 10);
  352. if (token != I2O_POST_WAIT_OK) {
  353. osm_info("Can't validate configuration, ErrorStatus = %d\n",
  354. token);
  355. return -ETIMEDOUT;
  356. }
  357. return 0;
  358. };
  359. static int i2o_cfg_evt_reg(unsigned long arg, struct file *fp)
  360. {
  361. struct i2o_message *msg;
  362. struct i2o_evt_id __user *pdesc = (struct i2o_evt_id __user *)arg;
  363. struct i2o_evt_id kdesc;
  364. struct i2o_controller *c;
  365. struct i2o_device *d;
  366. if (copy_from_user(&kdesc, pdesc, sizeof(struct i2o_evt_id)))
  367. return -EFAULT;
  368. /* IOP exists? */
  369. c = i2o_find_iop(kdesc.iop);
  370. if (!c)
  371. return -ENXIO;
  372. /* Device exists? */
  373. d = i2o_iop_find_device(c, kdesc.tid);
  374. if (!d)
  375. return -ENODEV;
  376. msg = i2o_msg_get_wait(c, I2O_TIMEOUT_MESSAGE_GET);
  377. if (IS_ERR(msg))
  378. return PTR_ERR(msg);
  379. msg->u.head[0] = cpu_to_le32(FOUR_WORD_MSG_SIZE | SGL_OFFSET_0);
  380. msg->u.head[1] =
  381. cpu_to_le32(I2O_CMD_UTIL_EVT_REGISTER << 24 | HOST_TID << 12 |
  382. kdesc.tid);
  383. msg->u.head[2] = cpu_to_le32(i2o_config_driver.context);
  384. msg->u.head[3] = cpu_to_le32(i2o_cntxt_list_add(c, fp->private_data));
  385. msg->body[0] = cpu_to_le32(kdesc.evt_mask);
  386. i2o_msg_post(c, msg);
  387. return 0;
  388. }
  389. static int i2o_cfg_evt_get(unsigned long arg, struct file *fp)
  390. {
  391. struct i2o_cfg_info *p = NULL;
  392. struct i2o_evt_get __user *uget = (struct i2o_evt_get __user *)arg;
  393. struct i2o_evt_get kget;
  394. unsigned long flags;
  395. for (p = open_files; p; p = p->next)
  396. if (p->q_id == (ulong) fp->private_data)
  397. break;
  398. if (!p->q_len)
  399. return -ENOENT;
  400. memcpy(&kget.info, &p->event_q[p->q_out], sizeof(struct i2o_evt_info));
  401. MODINC(p->q_out, I2O_EVT_Q_LEN);
  402. spin_lock_irqsave(&i2o_config_lock, flags);
  403. p->q_len--;
  404. kget.pending = p->q_len;
  405. kget.lost = p->q_lost;
  406. spin_unlock_irqrestore(&i2o_config_lock, flags);
  407. if (copy_to_user(uget, &kget, sizeof(struct i2o_evt_get)))
  408. return -EFAULT;
  409. return 0;
  410. }
  411. #ifdef CONFIG_I2O_EXT_ADAPTEC
  412. #ifdef CONFIG_COMPAT
  413. static int i2o_cfg_passthru32(struct file *file, unsigned cmnd,
  414. unsigned long arg)
  415. {
  416. struct i2o_cmd_passthru32 __user *cmd;
  417. struct i2o_controller *c;
  418. u32 __user *user_msg;
  419. u32 *reply = NULL;
  420. u32 __user *user_reply = NULL;
  421. u32 size = 0;
  422. u32 reply_size = 0;
  423. u32 rcode = 0;
  424. struct i2o_dma sg_list[SG_TABLESIZE];
  425. u32 sg_offset = 0;
  426. u32 sg_count = 0;
  427. u32 i = 0;
  428. u32 sg_index = 0;
  429. i2o_status_block *sb;
  430. struct i2o_message *msg;
  431. unsigned int iop;
  432. cmd = (struct i2o_cmd_passthru32 __user *)arg;
  433. if (get_user(iop, &cmd->iop) || get_user(i, &cmd->msg))
  434. return -EFAULT;
  435. user_msg = compat_ptr(i);
  436. c = i2o_find_iop(iop);
  437. if (!c) {
  438. osm_debug("controller %d not found\n", iop);
  439. return -ENXIO;
  440. }
  441. msg = i2o_msg_get_wait(c, I2O_TIMEOUT_MESSAGE_GET);
  442. sb = c->status_block.virt;
  443. if (get_user(size, &user_msg[0])) {
  444. osm_warn("unable to get size!\n");
  445. return -EFAULT;
  446. }
  447. size = size >> 16;
  448. if (size > sb->inbound_frame_size) {
  449. osm_warn("size of message > inbound_frame_size");
  450. return -EFAULT;
  451. }
  452. user_reply = &user_msg[size];
  453. size <<= 2; // Convert to bytes
  454. /* Copy in the user's I2O command */
  455. if (copy_from_user(msg, user_msg, size)) {
  456. osm_warn("unable to copy user message\n");
  457. return -EFAULT;
  458. }
  459. i2o_dump_message(msg);
  460. if (get_user(reply_size, &user_reply[0]) < 0)
  461. return -EFAULT;
  462. reply_size >>= 16;
  463. reply_size <<= 2;
  464. reply = kzalloc(reply_size, GFP_KERNEL);
  465. if (!reply) {
  466. printk(KERN_WARNING "%s: Could not allocate reply buffer\n",
  467. c->name);
  468. return -ENOMEM;
  469. }
  470. sg_offset = (msg->u.head[0] >> 4) & 0x0f;
  471. memset(sg_list, 0, sizeof(sg_list[0]) * SG_TABLESIZE);
  472. if (sg_offset) {
  473. struct sg_simple_element *sg;
  474. if (sg_offset * 4 >= size) {
  475. rcode = -EFAULT;
  476. goto cleanup;
  477. }
  478. // TODO 64bit fix
  479. sg = (struct sg_simple_element *)((&msg->u.head[0]) +
  480. sg_offset);
  481. sg_count =
  482. (size - sg_offset * 4) / sizeof(struct sg_simple_element);
  483. if (sg_count > SG_TABLESIZE) {
  484. printk(KERN_DEBUG "%s:IOCTL SG List too large (%u)\n",
  485. c->name, sg_count);
  486. rcode = -EINVAL;
  487. goto cleanup;
  488. }
  489. for (i = 0; i < sg_count; i++) {
  490. int sg_size;
  491. struct i2o_dma *p;
  492. if (!(sg[i].flag_count & 0x10000000
  493. /*I2O_SGL_FLAGS_SIMPLE_ADDRESS_ELEMENT */ )) {
  494. printk(KERN_DEBUG
  495. "%s:Bad SG element %d - not simple (%x)\n",
  496. c->name, i, sg[i].flag_count);
  497. rcode = -EINVAL;
  498. goto cleanup;
  499. }
  500. sg_size = sg[i].flag_count & 0xffffff;
  501. p = &(sg_list[sg_index]);
  502. /* Allocate memory for the transfer */
  503. if (i2o_dma_alloc
  504. (&c->pdev->dev, p, sg_size,
  505. PCI_DMA_BIDIRECTIONAL)) {
  506. printk(KERN_DEBUG
  507. "%s: Could not allocate SG buffer - size = %d buffer number %d of %d\n",
  508. c->name, sg_size, i, sg_count);
  509. rcode = -ENOMEM;
  510. goto sg_list_cleanup;
  511. }
  512. sg_index++;
  513. /* Copy in the user's SG buffer if necessary */
  514. if (sg[i].
  515. flag_count & 0x04000000 /*I2O_SGL_FLAGS_DIR */ ) {
  516. // TODO 64bit fix
  517. if (copy_from_user
  518. (p->virt,
  519. (void __user *)(unsigned long)sg[i].
  520. addr_bus, sg_size)) {
  521. printk(KERN_DEBUG
  522. "%s: Could not copy SG buf %d FROM user\n",
  523. c->name, i);
  524. rcode = -EFAULT;
  525. goto sg_list_cleanup;
  526. }
  527. }
  528. //TODO 64bit fix
  529. sg[i].addr_bus = (u32) p->phys;
  530. }
  531. }
  532. rcode = i2o_msg_post_wait(c, msg, 60);
  533. if (rcode) {
  534. reply[4] = ((u32) rcode) << 24;
  535. goto sg_list_cleanup;
  536. }
  537. if (sg_offset) {
  538. u32 msg[I2O_OUTBOUND_MSG_FRAME_SIZE];
  539. /* Copy back the Scatter Gather buffers back to user space */
  540. u32 j;
  541. // TODO 64bit fix
  542. struct sg_simple_element *sg;
  543. int sg_size;
  544. // re-acquire the original message to handle correctly the sg copy operation
  545. memset(&msg, 0, I2O_OUTBOUND_MSG_FRAME_SIZE * 4);
  546. // get user msg size in u32s
  547. if (get_user(size, &user_msg[0])) {
  548. rcode = -EFAULT;
  549. goto sg_list_cleanup;
  550. }
  551. size = size >> 16;
  552. size *= 4;
  553. /* Copy in the user's I2O command */
  554. if (copy_from_user(msg, user_msg, size)) {
  555. rcode = -EFAULT;
  556. goto sg_list_cleanup;
  557. }
  558. sg_count =
  559. (size - sg_offset * 4) / sizeof(struct sg_simple_element);
  560. // TODO 64bit fix
  561. sg = (struct sg_simple_element *)(msg + sg_offset);
  562. for (j = 0; j < sg_count; j++) {
  563. /* Copy out the SG list to user's buffer if necessary */
  564. if (!
  565. (sg[j].
  566. flag_count & 0x4000000 /*I2O_SGL_FLAGS_DIR */ )) {
  567. sg_size = sg[j].flag_count & 0xffffff;
  568. // TODO 64bit fix
  569. if (copy_to_user
  570. ((void __user *)(u64) sg[j].addr_bus,
  571. sg_list[j].virt, sg_size)) {
  572. printk(KERN_WARNING
  573. "%s: Could not copy %p TO user %x\n",
  574. c->name, sg_list[j].virt,
  575. sg[j].addr_bus);
  576. rcode = -EFAULT;
  577. goto sg_list_cleanup;
  578. }
  579. }
  580. }
  581. }
  582. sg_list_cleanup:
  583. /* Copy back the reply to user space */
  584. if (reply_size) {
  585. // we wrote our own values for context - now restore the user supplied ones
  586. if (copy_from_user(reply + 2, user_msg + 2, sizeof(u32) * 2)) {
  587. printk(KERN_WARNING
  588. "%s: Could not copy message context FROM user\n",
  589. c->name);
  590. rcode = -EFAULT;
  591. goto sg_list_cleanup;
  592. }
  593. if (copy_to_user(user_reply, reply, reply_size)) {
  594. printk(KERN_WARNING
  595. "%s: Could not copy reply TO user\n", c->name);
  596. rcode = -EFAULT;
  597. }
  598. }
  599. for (i = 0; i < sg_index; i++)
  600. i2o_dma_free(&c->pdev->dev, &sg_list[i]);
  601. cleanup:
  602. kfree(reply);
  603. return rcode;
  604. }
  605. static long i2o_cfg_compat_ioctl(struct file *file, unsigned cmd,
  606. unsigned long arg)
  607. {
  608. int ret;
  609. lock_kernel();
  610. switch (cmd) {
  611. case I2OGETIOPS:
  612. ret = i2o_cfg_ioctl(NULL, file, cmd, arg);
  613. break;
  614. case I2OPASSTHRU32:
  615. ret = i2o_cfg_passthru32(file, cmd, arg);
  616. break;
  617. default:
  618. ret = -ENOIOCTLCMD;
  619. break;
  620. }
  621. unlock_kernel();
  622. return ret;
  623. }
  624. #endif
  625. static int i2o_cfg_passthru(unsigned long arg)
  626. {
  627. struct i2o_cmd_passthru __user *cmd =
  628. (struct i2o_cmd_passthru __user *)arg;
  629. struct i2o_controller *c;
  630. u32 __user *user_msg;
  631. u32 *reply = NULL;
  632. u32 __user *user_reply = NULL;
  633. u32 size = 0;
  634. u32 reply_size = 0;
  635. u32 rcode = 0;
  636. void *sg_list[SG_TABLESIZE];
  637. u32 sg_offset = 0;
  638. u32 sg_count = 0;
  639. int sg_index = 0;
  640. u32 i = 0;
  641. void *p = NULL;
  642. i2o_status_block *sb;
  643. struct i2o_message *msg;
  644. unsigned int iop;
  645. if (get_user(iop, &cmd->iop) || get_user(user_msg, &cmd->msg))
  646. return -EFAULT;
  647. c = i2o_find_iop(iop);
  648. if (!c) {
  649. osm_warn("controller %d not found\n", iop);
  650. return -ENXIO;
  651. }
  652. msg = i2o_msg_get_wait(c, I2O_TIMEOUT_MESSAGE_GET);
  653. sb = c->status_block.virt;
  654. if (get_user(size, &user_msg[0]))
  655. return -EFAULT;
  656. size = size >> 16;
  657. if (size > sb->inbound_frame_size) {
  658. osm_warn("size of message > inbound_frame_size");
  659. return -EFAULT;
  660. }
  661. user_reply = &user_msg[size];
  662. size <<= 2; // Convert to bytes
  663. /* Copy in the user's I2O command */
  664. if (copy_from_user(msg, user_msg, size))
  665. return -EFAULT;
  666. if (get_user(reply_size, &user_reply[0]) < 0)
  667. return -EFAULT;
  668. reply_size >>= 16;
  669. reply_size <<= 2;
  670. reply = kzalloc(reply_size, GFP_KERNEL);
  671. if (!reply) {
  672. printk(KERN_WARNING "%s: Could not allocate reply buffer\n",
  673. c->name);
  674. return -ENOMEM;
  675. }
  676. sg_offset = (msg->u.head[0] >> 4) & 0x0f;
  677. memset(sg_list, 0, sizeof(sg_list[0]) * SG_TABLESIZE);
  678. if (sg_offset) {
  679. struct sg_simple_element *sg;
  680. if (sg_offset * 4 >= size) {
  681. rcode = -EFAULT;
  682. goto cleanup;
  683. }
  684. // TODO 64bit fix
  685. sg = (struct sg_simple_element *)((&msg->u.head[0]) +
  686. sg_offset);
  687. sg_count =
  688. (size - sg_offset * 4) / sizeof(struct sg_simple_element);
  689. if (sg_count > SG_TABLESIZE) {
  690. printk(KERN_DEBUG "%s:IOCTL SG List too large (%u)\n",
  691. c->name, sg_count);
  692. rcode = -EINVAL;
  693. goto cleanup;
  694. }
  695. for (i = 0; i < sg_count; i++) {
  696. int sg_size;
  697. if (!(sg[i].flag_count & 0x10000000
  698. /*I2O_SGL_FLAGS_SIMPLE_ADDRESS_ELEMENT */ )) {
  699. printk(KERN_DEBUG
  700. "%s:Bad SG element %d - not simple (%x)\n",
  701. c->name, i, sg[i].flag_count);
  702. rcode = -EINVAL;
  703. goto sg_list_cleanup;
  704. }
  705. sg_size = sg[i].flag_count & 0xffffff;
  706. /* Allocate memory for the transfer */
  707. p = kmalloc(sg_size, GFP_KERNEL);
  708. if (!p) {
  709. printk(KERN_DEBUG
  710. "%s: Could not allocate SG buffer - size = %d buffer number %d of %d\n",
  711. c->name, sg_size, i, sg_count);
  712. rcode = -ENOMEM;
  713. goto sg_list_cleanup;
  714. }
  715. sg_list[sg_index++] = p; // sglist indexed with input frame, not our internal frame.
  716. /* Copy in the user's SG buffer if necessary */
  717. if (sg[i].
  718. flag_count & 0x04000000 /*I2O_SGL_FLAGS_DIR */ ) {
  719. // TODO 64bit fix
  720. if (copy_from_user
  721. (p, (void __user *)sg[i].addr_bus,
  722. sg_size)) {
  723. printk(KERN_DEBUG
  724. "%s: Could not copy SG buf %d FROM user\n",
  725. c->name, i);
  726. rcode = -EFAULT;
  727. goto sg_list_cleanup;
  728. }
  729. }
  730. //TODO 64bit fix
  731. sg[i].addr_bus = virt_to_bus(p);
  732. }
  733. }
  734. rcode = i2o_msg_post_wait(c, msg, 60);
  735. if (rcode) {
  736. reply[4] = ((u32) rcode) << 24;
  737. goto sg_list_cleanup;
  738. }
  739. if (sg_offset) {
  740. u32 msg[128];
  741. /* Copy back the Scatter Gather buffers back to user space */
  742. u32 j;
  743. // TODO 64bit fix
  744. struct sg_simple_element *sg;
  745. int sg_size;
  746. // re-acquire the original message to handle correctly the sg copy operation
  747. memset(&msg, 0, I2O_OUTBOUND_MSG_FRAME_SIZE * 4);
  748. // get user msg size in u32s
  749. if (get_user(size, &user_msg[0])) {
  750. rcode = -EFAULT;
  751. goto sg_list_cleanup;
  752. }
  753. size = size >> 16;
  754. size *= 4;
  755. /* Copy in the user's I2O command */
  756. if (copy_from_user(msg, user_msg, size)) {
  757. rcode = -EFAULT;
  758. goto sg_list_cleanup;
  759. }
  760. sg_count =
  761. (size - sg_offset * 4) / sizeof(struct sg_simple_element);
  762. // TODO 64bit fix
  763. sg = (struct sg_simple_element *)(msg + sg_offset);
  764. for (j = 0; j < sg_count; j++) {
  765. /* Copy out the SG list to user's buffer if necessary */
  766. if (!
  767. (sg[j].
  768. flag_count & 0x4000000 /*I2O_SGL_FLAGS_DIR */ )) {
  769. sg_size = sg[j].flag_count & 0xffffff;
  770. // TODO 64bit fix
  771. if (copy_to_user
  772. ((void __user *)sg[j].addr_bus, sg_list[j],
  773. sg_size)) {
  774. printk(KERN_WARNING
  775. "%s: Could not copy %p TO user %x\n",
  776. c->name, sg_list[j],
  777. sg[j].addr_bus);
  778. rcode = -EFAULT;
  779. goto sg_list_cleanup;
  780. }
  781. }
  782. }
  783. }
  784. sg_list_cleanup:
  785. /* Copy back the reply to user space */
  786. if (reply_size) {
  787. // we wrote our own values for context - now restore the user supplied ones
  788. if (copy_from_user(reply + 2, user_msg + 2, sizeof(u32) * 2)) {
  789. printk(KERN_WARNING
  790. "%s: Could not copy message context FROM user\n",
  791. c->name);
  792. rcode = -EFAULT;
  793. }
  794. if (copy_to_user(user_reply, reply, reply_size)) {
  795. printk(KERN_WARNING
  796. "%s: Could not copy reply TO user\n", c->name);
  797. rcode = -EFAULT;
  798. }
  799. }
  800. for (i = 0; i < sg_index; i++)
  801. kfree(sg_list[i]);
  802. cleanup:
  803. kfree(reply);
  804. return rcode;
  805. }
  806. #endif
  807. /*
  808. * IOCTL Handler
  809. */
  810. static int i2o_cfg_ioctl(struct inode *inode, struct file *fp, unsigned int cmd,
  811. unsigned long arg)
  812. {
  813. int ret;
  814. switch (cmd) {
  815. case I2OGETIOPS:
  816. ret = i2o_cfg_getiops(arg);
  817. break;
  818. case I2OHRTGET:
  819. ret = i2o_cfg_gethrt(arg);
  820. break;
  821. case I2OLCTGET:
  822. ret = i2o_cfg_getlct(arg);
  823. break;
  824. case I2OPARMSET:
  825. ret = i2o_cfg_parms(arg, I2OPARMSET);
  826. break;
  827. case I2OPARMGET:
  828. ret = i2o_cfg_parms(arg, I2OPARMGET);
  829. break;
  830. case I2OSWDL:
  831. ret = i2o_cfg_swdl(arg);
  832. break;
  833. case I2OSWUL:
  834. ret = i2o_cfg_swul(arg);
  835. break;
  836. case I2OSWDEL:
  837. ret = i2o_cfg_swdel(arg);
  838. break;
  839. case I2OVALIDATE:
  840. ret = i2o_cfg_validate(arg);
  841. break;
  842. case I2OEVTREG:
  843. ret = i2o_cfg_evt_reg(arg, fp);
  844. break;
  845. case I2OEVTGET:
  846. ret = i2o_cfg_evt_get(arg, fp);
  847. break;
  848. #ifdef CONFIG_I2O_EXT_ADAPTEC
  849. case I2OPASSTHRU:
  850. ret = i2o_cfg_passthru(arg);
  851. break;
  852. #endif
  853. default:
  854. osm_debug("unknown ioctl called!\n");
  855. ret = -EINVAL;
  856. }
  857. return ret;
  858. }
  859. static int cfg_open(struct inode *inode, struct file *file)
  860. {
  861. struct i2o_cfg_info *tmp =
  862. (struct i2o_cfg_info *)kmalloc(sizeof(struct i2o_cfg_info),
  863. GFP_KERNEL);
  864. unsigned long flags;
  865. if (!tmp)
  866. return -ENOMEM;
  867. file->private_data = (void *)(i2o_cfg_info_id++);
  868. tmp->fp = file;
  869. tmp->fasync = NULL;
  870. tmp->q_id = (ulong) file->private_data;
  871. tmp->q_len = 0;
  872. tmp->q_in = 0;
  873. tmp->q_out = 0;
  874. tmp->q_lost = 0;
  875. tmp->next = open_files;
  876. spin_lock_irqsave(&i2o_config_lock, flags);
  877. open_files = tmp;
  878. spin_unlock_irqrestore(&i2o_config_lock, flags);
  879. return 0;
  880. }
  881. static int cfg_fasync(int fd, struct file *fp, int on)
  882. {
  883. ulong id = (ulong) fp->private_data;
  884. struct i2o_cfg_info *p;
  885. for (p = open_files; p; p = p->next)
  886. if (p->q_id == id)
  887. break;
  888. if (!p)
  889. return -EBADF;
  890. return fasync_helper(fd, fp, on, &p->fasync);
  891. }
  892. static int cfg_release(struct inode *inode, struct file *file)
  893. {
  894. ulong id = (ulong) file->private_data;
  895. struct i2o_cfg_info *p1, *p2;
  896. unsigned long flags;
  897. lock_kernel();
  898. p1 = p2 = NULL;
  899. spin_lock_irqsave(&i2o_config_lock, flags);
  900. for (p1 = open_files; p1;) {
  901. if (p1->q_id == id) {
  902. if (p1->fasync)
  903. cfg_fasync(-1, file, 0);
  904. if (p2)
  905. p2->next = p1->next;
  906. else
  907. open_files = p1->next;
  908. kfree(p1);
  909. break;
  910. }
  911. p2 = p1;
  912. p1 = p1->next;
  913. }
  914. spin_unlock_irqrestore(&i2o_config_lock, flags);
  915. unlock_kernel();
  916. return 0;
  917. }
  918. static struct file_operations config_fops = {
  919. .owner = THIS_MODULE,
  920. .llseek = no_llseek,
  921. .ioctl = i2o_cfg_ioctl,
  922. #ifdef CONFIG_COMPAT
  923. .compat_ioctl = i2o_cfg_compat_ioctl,
  924. #endif
  925. .open = cfg_open,
  926. .release = cfg_release,
  927. .fasync = cfg_fasync,
  928. };
  929. static struct miscdevice i2o_miscdev = {
  930. I2O_MINOR,
  931. "i2octl",
  932. &config_fops
  933. };
  934. static int __init i2o_config_old_init(void)
  935. {
  936. spin_lock_init(&i2o_config_lock);
  937. if (misc_register(&i2o_miscdev) < 0) {
  938. osm_err("can't register device.\n");
  939. return -EBUSY;
  940. }
  941. return 0;
  942. }
  943. static void i2o_config_old_exit(void)
  944. {
  945. misc_deregister(&i2o_miscdev);
  946. }
  947. MODULE_AUTHOR("Red Hat Software");